Information Technology. All information technology acquisitions shall include the appropriate information technology security policies and requirements, including use of common security configurations available from the National Institute of Standards and Technology’s website at xxxx://xxxxxxxxxx.xxxx.xxx commensurate with the mission of the subcontract and conducive to the research and development efforts of the ORNL.
Appears in 45 contracts
Samples: Purchase Order, Purchase Order, Purchase Order Agreement
Information Technology. All information technology acquisitions shall include the appropriate information technology security policies and requirements, including use of common security configurations available from the National Institute of Standards and Technology’s website at xxxx://xxxxxxxxxx.xxxx.xxx commensurate with the mission of the subcontract and conducive to the research and development efforts of the ORNL.
Appears in 4 contracts
Samples: Purchase Order, Purchase Order, Purchase Order