IT STANDARDS. Any software or hardware provided under this agreement will comply with state standards which can be found at xxxx://xxx.xx.xxx/standards/.
IT STANDARDS. Any software or hardware provided under this agreement will comply with state standards which can be found at xxxx://xxx.xx.xxx/standards/. INDEMNIFICATION: The Sub-Recipient agrees to indemnify the State of South Dakota, its officers, agents and employees, from and against any and all claims or proceedings for actions, suits, damages, liabilities, other losses or equiptable relief that may arise at least in part as a result of an aact or omission in performing services under this Agreement. Sub-Recipient shall defend the State of South Dakota, its officers, agents and employees against any claim, includng any claim, action, suit or other proceeding related to the claim. Sub-Recipient’s obligation to indemnify includes the payment of attorney fees and other costs of defense. In defending the State of South Dakota, its officers, agent and employees, Sub-Recipient shall engage other professionals, subject to the written approval of the State which shall not be unreaonably withheld. Notwithstanding the foregoing, the State may, in its sole discretion and at the expense of Sub-Recipient, engage attorneys and other professionals to defend the State of South Dakota, its officers, agents, and employees, or to assist Sub-Recipientor in the defense. This paragraph does not require the Sub-Recipient to be responsible for or defend against claims or proceedings for damages, liabilities, losses or equitable relief arising solely from errors or omissions of the State, its officers, agents or employees.
IT STANDARDS. The Contractor will comply with and adhere to the following Department and State information technology standards and provide training to Contractor’s employees and subcontractors concerning such standards, procedures and protocols as applicable.
(1) Data Backup Standard: Applicable to Contractors which utilize data systems to process, store, transmit or monitor information essential to the performance of Department required services.
(2) Data Stewardship Standard: Applicable to Contractors which utilize data systems to process, store, transmit or monitor information essential to the performance of Department required services.
(3) Interconnectivity Standard: Applicable to Contractors which utilize data systems to process, store, transmit or monitor information essential to the performance of Department required services.
(4) Laptop Data Protection Standard: Applicable to Contractors which utilize laptops to process, store, transmit or monitor data essential to the performance of Department required services or connects to state owned or managed network.
(5) Removable Storage Encryption Standard: Applicable to Contractors which utilize removable storage devices to process, store, transmit or monitor information essential to the performance of Department required services.
(6) Web Application Security Standard: Applicable to Contractors which develop, manage or utilize state resources including but not limited to websites, data systems, desktop applications and web based services.
(7) Website Accessibility Standard: Applicable to Contractors which develop and maintain Department web pages. Current state information technology standards are accessible online at xxxxx://xxxx.xxxx.xxx/home/standards.
IT STANDARDS. 4.1.1. The Supplier shall ensure that any training is compatible with IT standards of Government departments as specified in the Government Digital Service Standard 10
IT STANDARDS. Any software or hardware provided under this agreement will comply with state standards which can be found at xxxx://xxx.xx.xxx/standards/. INSURANCE: At all times during the term of this Agreement, Sub-Recipient shall obtain and maintain in force insurance coverage of the types and with the limits as follows:
IT STANDARDS. Sub-Recipient warrants that if any software and hardware is developed or purchased for the state it will be in compliance with the BIT Standards including but not limited to the standards for security, file naming conventions, executable module names, Job Control Language, systems software, and systems software release levels, temporary work areas, executable program size, forms management, network access, tape management, hosting requirements, administrative controls, and job stream procedures prior to the installation and acceptance of the final project. BIT standards can be found at xxxx://xxx.xx.xxx/standards/.
IT STANDARDS. To maintain the highest level of service and to ensure the Client’s environment meets our minimum standards, CNS will implement specific changes. If any of these minimum requirements are not met, CNS may cancel this agreement or provide services at an hourly rate while trying to resolve issues. For services that are not elected and mutually agreed not to be used an attestation letter will be submitted to Client outlining the associated risks of not using such services and releases of liability from CNS to Client as stated in the Terms. Minimum security standards are subject to change at any time based on new threats and the external security climate.
a) At all office locations Client must have or purchase a Sonicwall Firewall Appliance with the Advanced Security subscription and continue to pay for the annual security subscription.
b) Client must have a current hardware warranty and/or software maintenance support and subscription services on all systems. Client is financially responsible for paying any additional costs that may occur if the hardware, software or service provider imposes a charge to obtain support or parts.
c) All workstation and server hostnames will be changed to a standard naming convention.
d) All workstations and servers must have a CNS agent, anti-virus and End Point Detection and Response installed.
e) Minimum security standards will be implemented, including but not limited to:
i) Password complexity
ii) Multi Factor Authentication for Microsoft 365.
iii) Lockout policy iv) Password reset frequency v) Firewall security services