REQUIRED PROJECT POLICIES, GUIDELINES AND METHODOLOGIES Sample Clauses

REQUIRED PROJECT POLICIES, GUIDELINES AND METHODOLOGIES. The Contractor shall be required to comply with all applicable laws, regulations, policies, standards and guidelines affecting information technology projects, which may be created or changed periodically. It is the responsibility of the Contractor to insure adherence and to remain abreast of new or revised laws, regulations, policies, standards and guidelines affecting specific project execution. The most recent version of the following policies can be found on the State of Vermont Department of Information and Innovation website at xxxx://xxx.xxxxxxx.xxx/policy/policy: • Incident Response PolicyInformation Security PolicyIntrusion Detection and Prevention Policy • Malicious Software ProtectionPhysical Security for Computer Protection • Third Party Connectivity • Mobile Device Policy • System/Service Password PolicyUser Password Policy and GuidelinesDigital Media and Hardware Disposal Policy, Standard and Procedure
AutoNDA by SimpleDocs
REQUIRED PROJECT POLICIES, GUIDELINES AND METHODOLOGIES. The Contractor shall be required to comply with all applicable laws, regulations, policies, standards and guidelines affecting information technology projects, which may be created or changed periodically. It is the responsibility of the Contractor to ensure adherence and to remain abreast of new or revised laws, regulations, policies, standards and guidelines affecting specific project execution. The most recent version of the following State policies can be found online at xxxxx://xxxxxxxxxxxxxxx.xxxxxxx.xxx/working-us/policies • Information Security Policy xxxxx://xxxxxxxxxxxxxxx.xxxxxxx.xxx/sites/digitalservices/files/docu ments/policy/SoV_Information_Security_Standard.pdf • Cybersecurity Directive 2019 xxxxx://xxxxxxxxxxxxxxx.xxxxxxx.xxx/sites/digitalservices/files/documents/policy/A DS_Cybersecurity_Directive_19-01.pdf • Physical Security for Computer Protection xxxxx://xxxxxxxxxxxxxxx.xxxxxxx.xxx/sites/digitalservices/files/document s/policy/ADS-Physical-Security-for-Computer-Protection.pdf • Third-Party Connectivity xxxxx://xxxxxxxxxxxxxxx.xxxxxxx.xxx/sites/digitalservices/files/docum ents/policy/ADS-Third-Party-Network-Connectivity.pdf • Mobile Device Policy • System/Service Password Policy xxxxx://xxxxxxxxxxxxxxx.xxxxxxx.xxx/sites/digitalservices/files/documents/policy/A DS-InformationSecurityPolicies_FINAL.pdf • User Password Policy and Guidelines xxxxx://xxxxxxxxxxxxxxx.xxxxxxx.xxx/sites/digitalservices/files/documen ts/policy/ADS-InformationSecurityPolicies_FINAL.pdf • Digital Media and Hardware Disposal Policy, Standard and Procedure xxxxx://xxxxxxxxxxxxxxx.xxxxxxx.xxx/sites/digitalservices/files/document s/policy/ADS-Digital-Media-and-Hardware-Disposal-Policy.pdf • Phishing and Incident Response Policy xxxxx://xxxxxxxxxxxxxxx.xxxxxxx.xxx/sites/digitalservices/files/documents/policy/A DS-Phishing%20Incident-Response-Process-9-19-17.pdf • Vermont Accessibility Standard xxxxx://xxxxxxxxxxxxxxx.xxxxxxx.xxx/sites/digitalservices/files/documents
REQUIRED PROJECT POLICIES, GUIDELINES AND METHODOLOGIES. The Contractor shall be required to comply with all applicable laws, regulations, policies, standards and guidelines affecting information technology projects, which may be created or changed periodically. It is the responsibility of the Contractor to insure adherence and to remain abreast of new or revised laws, regulations, policies, standards and guidelines affecting specific project execution. The most recent version of the following policies can be found on the State of Vermont Agency of Digital Services website at xxxx://xxx.xxxxxxx.xxx/policy/policy: • Incident Response PolicyInformation Security PolicyIntrusion Detection and Prevention Policy • Malicious Software ProtectionPhysical Security for Computer Protection • Third Party Connectivity • Mobile Device Policy • System/Service Password PolicyUser Password Policy and GuidelinesDigital Media and Hardware Disposal Policy, Standard and Procedure If required by an SOW Agreement, Contractor’s security controls shall conform to the Health Insurance Portability and Accountability Act of 1996 (“HIPAA”) including the Standards for the Privacy of Individually Identifiable Health Information at 45 CFR Parts 160 and 164 (“Privacy Rule”), the Security Standards at 45 CFR Parts 160 and 164 (“Security Rule”), as amended by subtitle D of the Health Information Technology for Economic and Clinical Health Act and the Federal Information Security Management Act (“FISMA”), 44 U.S.C. 3541 et seq. and Family Education Rights and Privacy Act, 20 U.S.C. § 1232g (FERPA), as applicable.
REQUIRED PROJECT POLICIES, GUIDELINES AND METHODOLOGIES. The Contractor shall be required to comply with all applicable laws, regulations, policies, standards and guidelines affecting information technology projects, which may be created
REQUIRED PROJECT POLICIES, GUIDELINES AND METHODOLOGIES. The Contractor shall be required to comply with all applicable laws, regulations, policies, standards and guidelines affecting information technology projects, which may be created or changed periodically. It is the responsibility of the Contractor to insure adherence and to remain abreast of new or revised laws, regulations, policies, standards and guidelines affecting specific project execution. The most recent version of the following policies can be found on the State of Vermont Agency of Digital Services website at xxxxx://xxxxxxxxxxxxxxx.xxxxxxx.xxx/working-us/policies Incident Response Policy Information Security Policy Intrusion Detection and Prevention Policy Malicious Software Protection Physical Security for Computer Protection Third Party Connectivity Mobile Device Policy System/Service Password Policy User Password Policy and Guidelines Digital Media and Hardware Disposal Policy, Standard and Procedure
REQUIRED PROJECT POLICIES, GUIDELINES AND METHODOLOGIES. The Contractor shall comply with all applicable State security policies and adhere to all legal, statutory, and regulatory requirements, as determined by Vermont leadership. The Contractor shall implement security controls in accordance with all Federal and State security policy and regulations. The Contractor will be required to comply with all applicable laws, regulations, policies, standards, and guidelines affecting information technology projects, which may be created or changed periodically. It is the responsibility of the Contractor to insure adherence to and to remain abreast of new or revised laws, regulations, policies, standards, and guidelines affecting project execution. Agency-specific confidentiality and privacy policies, such as Health Insurance Portability and Accountability Act (HIPAA), may apply. These may include, but are not limited to: • The State’s Information Technology Policies & Procedures at: xxxx://xxx.xxxxxxx.xxx/Policy_Central • The State’s Record Management Best Practice at: xxxx://xxxxxxx- xxxxxxxx.xxx/xxxxxxx/xxxxxxxxx/xxx/XxxxxxxXxxxxxxxxxXxxxXxxxxxxx.xxx • The State Information Security Best Practice Guideline at: xxxx://xxxxxxx- xxxxxxxx.xxx/xxxxxxx/xxxxxxxxx/xxx/XxxxxxxxxxxXxxxxxxxXxxxXxxxxxxx_Xxx.00000000.xxx • The State Digital Imaging Guidelines at: xxxx://xxxxxxx- xxxxxxxx.xxx/xxxxxxx/xxxxxxxxx/xxx/XxxxxxxXxxxxxxxx0000.xxx • The State File Formats Best Practice at: xxxx://xxxxxxx- xxxxxxxx.xxx/xxxxxxx/xxxxxxxxx/xxx/XxxxXxxxxxxXxxxXxxxxxxx_Xxx.00000000.xxx • The State File Formats Guideline at: xxxx://xxxxxxx- xxxxxxxx.xxx/xxxxxxx/xxxxxxxxx/xxx/XxxxXxxxxxxXxxxxxxxx0000.xxx • The State Metadata Guideline at: xxxx://xxxxxxx- xxxxxxxx.xxx/xxxxxxx/xxxxxxxxx/xxx/XxxxxxxxXxxxxxxxx0000.xxx The State will have the right to review the Contractor’s information security program prior to the commencement of services and from time to time during the term of this Agreement. During the performance of the services, on an ongoing basis from time to time and without notice, the State, at its own expense, will be entitled to perform, or to have performed, an on-site audit of the Contractor’s information security program. In lieu of an on-site audit, upon request by the State, the Contractor agrees to complete, within forty-five (45 days) of receipt, an audit questionnaire provided by the State regarding the Contractor’s information security program. The Contractor will implement any required safeguards as identified by the State or inf...

Related to REQUIRED PROJECT POLICIES, GUIDELINES AND METHODOLOGIES

  • Ordering Guidelines and Processes 1.13.1 For information regarding Ordering Guidelines and Processes for various Network Elements, Combinations and Other Services, AFN should refer to the “Guides” section of the BellSouth Interconnection Web site, which is incorporated herein by reference, as amended from time to time. The Web site address is: http//xxx.xxxxxxxxxxxxxxx.xxxxxxxxx.xxx/. 1.13.2 Additional information may also be found in the individual CLEC Information Packages, which are incorporated herein by reference, as amended from time to time, located at the “CLEC UNE Products” Web site address: xxxx://xxx.xxxxxxxxxxxxxxx.xxxxxxxxx.xxx/guides/html/unes.html. 1.13.3 The provisioning of Network Elements, Combinations and Other Services to AFN’s Collocation Space will require cross-connections within the central office to connect the Network Element, Combinations or Other Services to the demarcation point associated with AFN’s Collocation Space. These cross- connects are separate components that are not considered a part of the Network Element, Combinations or Other Services and, thus, have a separate charge pursuant to Attachment 4.

  • HIV/AIDS Model Workplace Guidelines Grantee will: a. implement the System Agency’s policies based on the Human Immunodeficiency Virus/Acquired Immunodeficiency Syndrome (HIV/AIDS), AIDS Model Workplace Guidelines for Businesses at xxxx://xxx.xxxx.xxxxx.xx.xx/hivstd/policy/policies.shtm, State Agencies and State Grantees Policy No. 090.021. b. educate employees and clients concerning HIV and its related conditions, including AIDS, in accordance with the Texas. Health & Safety Code §§ 85.112-114.

  • Hot Weather Guidelines For the purposes of site based discussions regarding the need to plan and perform work during expected periods of hot weather, the following issues shall be considered in conjunction with proper consideration of Occupational Health and Safety issues.

  • Policies and Procedures i) The policies and procedures of the designated employer apply to the employee while working at both sites. ii) Only the designated employer shall have exclusive authority over the employee in regard to discipline, reporting to the College of Nurses of Ontario and/or investigations of family/resident complaints. iii) The designated employer will ensure that the employee is covered by WSIB at all times, regardless of worksite, while in the employ of either home. iv) The designated employer will ensure that the employee is covered by liability insurance at all times, regardless of worksite, while in the employ of either home. v) The designated employer shall have exclusive authority over the employee’s personnel files and health records. These files will be maintained on the site of the designated employer.

  • General Guidelines Conduct yourself in a responsible manner at all times in the laboratory.

  • Maintenance Manual No later than 60 (sixty) days prior to the Project Completion Date, the Contractor shall, in consultation with the Authority’s Engineer, evolve a maintenance manual (the “Maintenance Manual”) for the regular and preventive maintenance of the Project Highway in conformity with the Specifications and Standards, safety requirements and Good Industry Practice, and shall provide 5 (five) copies thereof to the Authority’s Engineer. The Authority’s Engineer shall review the Maintenance Manual within 15 (fifteen) days of its receipt and communicate its comments to the Contractor for necessary modifications, if any.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!