Safeguarding Sensitive Data and Information Technology Resources Sample Clauses

Safeguarding Sensitive Data and Information Technology Resources. In accordance with FAR 39.105, this section is included in the contract. This section applies to all users of sensitive data and information technology (IT) resources, including awardees, contractors, subcontractors, lessors, suppliers and manufacturers. The following GSA policies must be followed. These policies can be found at Directives Library. 1. CIO P 2100.1K GSA Information Technology (IT) Security Policy 2. CIO P 2100.2B GSA Wireless Local Area Network (LAN) Security 3. CIO 2100.3C Mandatory Information Technology (IT) Security Training Requirement for Agency and Contractor Employees with Significant Security Responsibilities 4. CIO 2104.1A CIO CHGE 1 GSA Information Technology IT General Rules of Behavior 5. CIO 2105.1 C CHGE 1 GSA Section 508: Managing Electronic and Information Technology for Individuals with Disabilities 6. CIO 2106.1 GSA Social Media Policy 7. CIO 2107.1 Implementation of the Online Resource Reservation Software 8. CIO 2160.4A Provisioning of Information Technology (IT) Devices 9. CIO 2162.1 Digital Signatures 10. CIO P 2165.2 GSA Telecommunications Policy 11. CIO P 2180.1 GSA Rules of Behavior for Handling Personally Identifiable Information (Pll) 12. CIO 2182.2 Mandatory Use of Personal Identity Verification (PIV) Credentials 13. CIO P 1878.2A Conducting Privacy Impact Assessments (PIAs) in GSA 14. CIO IL-13-01 Mobile Devices and Applications
AutoNDA by SimpleDocs
Safeguarding Sensitive Data and Information Technology Resources. In accordance with FAR 39.105, this section is included in the Master Contract. This section applies to all users of sensitive data and information technology (IT) resources, including contractors, subcontractors, lessors, suppliers and manufacturers. Agency- specific IT Security guidelines will be identified in individual Task Orders by the issuing agency OCO.
Safeguarding Sensitive Data and Information Technology Resources. In accordance with FAR 39.105, this section is included in the contract. This section applies to all users of sensitive data and information technology (IT) resources, including awardees, contractors, subcontractors, lessors, suppliers and manufacturers. The following GSA policies must be followed. These policies can be found at Directives Library.
Safeguarding Sensitive Data and Information Technology Resources. In accordance with FAR 39.105, this section is included in the contract. This section applies to all users of sensitive data and information technology (IT) resources, including awardees, contractors, subcontractors, lessors, suppliers and manufacturers. The following GSA policies must be followed. These policies can be found at Directives Library. 1. CIO P 2100.1K GSA Information Technology (IT) Security Policy 2. CIO P 2100.2B GSA Wireless Local Area Network (LAN) Security 3. CIO 2100.3C Mandatory Information Technology (IT) Security Training Requirement for Agency and Contractor Employees with Significant Security Responsibilities 4. CIO 2104.1A CIO CHGE 1 GSA Information Technology IT General Rules of Behavior 5. CIO 2105.1 C CHGE 1 GSA Section 508: Managing Electronic and Information Technology for Individuals with Disabilities 6. CIO 2106.1 GSA Social Media Policy 7. CIO 2107.1 Implementation of the Online Resource Reservation Software 8. CIO 2160.4A Provisioning of Information Technology (IT) Devices 9. CIO 2162.1 Digital Signatures
Safeguarding Sensitive Data and Information Technology Resources. In accordance with FAR 39.105, this section is included in the contract. This section applies to all users of sensitive data and information technology (IT) resources, including awardees, contractors, subcontractors, lessors, suppliers and manufacturers. The following GSA policies must be followed. These policies can be found at xxxx://xxx.xxx.xxx/directives. 1. CIO P 2100.1 GSA Information Technology (IT) Security Policy 2. CIO P 2100.2B GSA Wireless Local Area Network (LAN) Security 3. CIO 2100.3B Mandatory Information Technology (IT) Security Training Requirement for Agency and Contractor Employees with Significant Security Responsibilities 4. CIO 2104.1A GSA Information Technology IT General Rules of Behavior 5. CIO 2105.1 B GSA Section 508: Managing Electronic and Information Technology for Individuals with Disabilities
Safeguarding Sensitive Data and Information Technology Resources. In accordance with FAR 39.105, this section is included in the contract. This section applies to all users of sensitive data and information technology (IT) resources, including awardees, contractors, subcontractors, lessors, suppliers and manufacturers. The following GSA policies must be followed. These policies can be found at xxxxx://xxx.xxx.xxx/directives-library or xxxxx://xxxxxx.xxx.xxx/xxxxxxxxxx. 1. CIO P 2100.1 GSA Information Technology (IT) Security Policy 2. CIO P 2100.2B GSA Wireless Local Area Network (LAN) Security 3. CIO 2100.3B Mandatory Information Technology (IT) Security Training Requirement for Agency and Contractor Employees with Significant Security Responsibilities 4. CIO 2104.1A GSA Information Technology IT General Rules of Behavior 5. CIO 2105.1 B GSA Section 508: Managing Electronic and Information Technology for Individuals with Disabilities

Related to Safeguarding Sensitive Data and Information Technology Resources

  • Information Technology The following applies to all contracts for information technology commodities and contractual services. “Information technology” is defined in section 287.012(15), F.S., to have the same meaning as provided in section 282.0041, F.S.

  • Electronic and Information Resources Accessibility and Security Standards a. Applicability: The following Electronic and Information Resources (“EIR”) requirements apply to the Contract because the Grantee performs services that include EIR that the System Agency's employees are required or permitted to access or members of the public are required or permitted to access. This Section does not apply to incidental uses of EIR in the performance of the Agreement, unless the Parties agree that the EIR will become property of the State of Texas or will be used by HHSC’s clients or recipients after completion of the Agreement. Nothing in this section is intended to prescribe the use of particular designs or technologies or to prevent the use of alternative technologies, provided they result in substantially equivalent or greater access to and use of a Product.

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes. 11.2 We may (i) compile statistical and other information related to the performance, operation and use of the Services, and (ii) use data from the Services in aggregated form for security and operations management, to create statistical analyses, and for research and development purposes (clauses i and ii are collectively referred to as “Service Analyses”). We may make Service Analyses publicly available; however, Service Analyses will not incorporate Your Content, Personal Data or Confidential Information in a form that could serve to identify You or any individual. We retain all intellectual property rights in Service Analyses. 11.3 We may provide You with the ability to obtain certain Oracle Software (as defined below) for use with the Services. If we provide Oracle Software to You and do not specify separate terms for such software, then such Oracle Software is provided as part of the Services and You have the non-exclusive, worldwide, limited right to use such Oracle Software, subject to the terms of this Agreement and Your order (except for separately licensed elements of the Oracle Software, which separately licensed elements are governed by the applicable separate terms), solely to facilitate Your use of the Services. You may allow Your Users to use the Oracle Software for this purpose, and You are responsible for their compliance with the license terms. Your right to use any Oracle Software will terminate upon the earlier of our notice (by web posting or otherwise) or the end of the Services associated with the Oracle Software. Notwithstanding the foregoing, if Oracle Software is licensed to You under separate terms, then Your use of such software is governed by the separate terms. Your right to use any part of the Oracle Software that is licensed under the separate terms is not restricted in any way by this Agreement.

  • Accessibility of Information Technology Contractor represents and warrants that any software/ hardware/ communications system/ equipment (collectively “technology”), if any, provided under this Agreement adheres to the standards and/or specifications as may be set forth in the Section 508 of the Rehabilitation Act of 1973 standards guide and is fully compliant with WCAG 2.0 AA standards for accessibility and compliant with any applicable FCC regulations. Technology that will be used on a mobile device must also be navigable with Voiceover on iOS devices in addition to meeting WCAG 2.0 level AA. If portions of the technology or user experience are alleged to be non-compliant or non- accessible at any point, District will provide Contractor with notice of such allegation and Contractor shall use its best efforts to make the technology compliant and accessible. If a state or federal department, office or regulatory agency, or if any other third party administrative agency or organization (“Claimants”), make a claim, allegation, initiates legal or regulatory process, or if a court finds or otherwise determines that technology is non-compliant or non-accessible, Contractor shall indemnify, defend and hold harmless the District from and against any and all such claims, allegations, liabilities, damages, penalties, fees, costs (including but not limited to reasonable attorneys’ fees), arising out of or related to Xxxxxxxxx’ claims. Contractor shall also fully indemnify District for the full cost of any user accommodation that is found to be necessary due to an identifiable lack of accessibility in the Contractor’s technology. If necessary, an independent 3rd party accessibility firm using POUR standards (Perceivable, Operable, Understandable and Robust) may be used to validate the accessibility of the technology.

  • Confidential System Information HHSC prohibits the unauthorized disclosure of Other Confidential Information. Grantee and all Grantee Agents will not disclose or use any Other Confidential Information in any manner except as is necessary for the Project or the proper discharge of obligations and securing of rights under the Contract. Grantee will have a system in effect to protect Other Confidential Information. Any disclosure or transfer of Other Confidential Information by Xxxxxxx, including information requested to do so by HHSC, will be in accordance with the Contract. If Grantee receives a request for Other Confidential Information, Xxxxxxx will immediately notify HHSC of the request, and will make reasonable efforts to protect the Other Confidential Information from disclosure until further instructed by the HHSC. Grantee will notify HHSC promptly of any unauthorized possession, use, knowledge, or attempt thereof, of any Other Confidential Information by any person or entity that may become known to Grantee. Grantee will furnish to HHSC all known details of the unauthorized possession, use, or knowledge, or attempt thereof, and use reasonable efforts to assist HHSC in investigating or preventing the reoccurrence of any unauthorized possession, use, or knowledge, or attempt thereof, of Other Confidential Information. HHSC will have the right to recover from Grantee all damages and liabilities caused by or arising from Grantee or Grantee Agents’ failure to protect HHSC’s Confidential Information as required by this section.

  • Access to Protected Information If BA maintains a designated record set on behalf of CE, BA shall make Protected Information maintained by BA or its agents or subcontractors in Designated Record Sets available to CE for inspection and copying within five (5) days of a request by CE to enable CE to fulfill its obligations under state law [Health and Safety Code Section 123110] and the Privacy Rule, including, but not limited to, 45 C.F.R. Section 164.524 [45 C.F.R. Section 164.504(e)(2)(ii)(E)]. If BA maintains Protected Information in electronic format, BA shall provide such information in electronic format as necessary to enable CE to fulfill its obligations under the HITECH Act and HIPAA Regulations, including, but not limited to, 42 U.S.C. Section 17935(e) and 45 C.F.R. Section 164.524.

  • Contractor Information The Contractor will provide up to date information for each of the following in the form and manner specified by OGS:

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!