Information Technology Security Standards Sample Clauses

Information Technology Security Standards. (1) The Contractor and its Staff and the Subcontractors and their Staff shall comply with the following:
AutoNDA by SimpleDocs
Information Technology Security Standards. 8.7.1. The Center and its staff shall comply with the following:
Information Technology Security Standards. The Contractor and any subcontractors, dealers, distributors, resellers, and other partners shall adhere to applicableCommonwealth Office of Technology (COT) Policies and Standards: Commonwealth Office of Technology - Home - Commonwealth Office of Technology (Kentucky)
Information Technology Security Standards a. Executive Order 184. Executive Order 184 relating to Cybersecurity and Prohibiting the Use of Certain Foreign Technologies directs the Wisconsin Department of Administration to take measures to ensure certain prohibited vendors and technologies are not used on State IT networks. Accordingly, the following vendors and/or software are prohibited from being provided to any Purchasing Entity: TikTok Huawei Technologies ZTE Corp Hytera Communications Corporation Hangzhou Hikvision Digital Technology Company Dahua Technology Company Tencent Holdings, including but not limited to: o Tencent QQ o QQ Wallet Participating Addendum Number 505ENT-O24-NASPOCOMPUT-10 for COMPUTER EQUIPMENT, PERIPHERALS & RELATED SERVICES Between State of Wisconsin and NetApp U.S. Public Sector, Inc. o WeChat Alibaba products, including but not limited to: o AliPay Kaspersky Lab
Information Technology Security Standards. When working with non-public data from the State of Hawaii, have processes for: • Security incident notification. Notify the State of Hawaii if an incident lead to unauthorized disclosure of non-public information and mitigation steps to reduce further risk to the State of Hawaii. • Technical requirements. Implements technical requirements that are aligned with the CIS controls: xxxxx://xxx.xxxxxxxxxx.xxx/controls/ • Security policies and standards. Implement security policies that are aligned with the NIST 800-53. Based on the sensitivity of the data more stringent controls from 800-53 would be required: xxxxx://xxxx.xxxx.xxx/publications/detail/sp/800-53/rev- 5/final

Related to Information Technology Security Standards

  • INFORMATION TECHNOLOGY The following applies to all contracts for information technology commodities and contractual services. “Information technology” is defined in section 287.012(15), F.S., to have the same meaning as provided in section 282.0041, F.S.

  • Technical Information The Employer agrees to provide to the Union such information that is available relating to employees in the bargaining unit, as may be required by the Union for collective bargaining purposes.

  • Technology Discoveries, innovations, Know-How and inventions, whether patentable or not, including computer software, recognized under U.S. law as intellectual creations to which rights of ownership accrue, including, but not limited to, patents, trade secrets, maskworks and copyrights developed under this Agreement.

Time is Money Join Law Insider Premium to draft better contracts faster.