Common use of Safeguarding Sensitive Data and Information Technology Resources Clause in Contracts

Safeguarding Sensitive Data and Information Technology Resources. In accordance with FAR 39.105, this section is included in the contract. This section applies to all users of sensitive data and information technology (IT) resources, including awardees, contractors, subcontractors, lessors, suppliers and manufacturers. The following GSA policies must be followed. These policies can be found at Directives Library. 1. CIO P 2100.1K GSA Information Technology (IT) Security Policy 2. CIO P 2100.2B GSA Wireless Local Area Network (LAN) Security 3. CIO 2100.3C Mandatory Information Technology (IT) Security Training Requirement for Agency and Contractor Employees with Significant Security Responsibilities 4. CIO 2104.1A CIO CHGE 1 GSA Information Technology IT General Rules of Behavior 5. CIO 2105.1 C CHGE 1 GSA Section 508: Managing Electronic and Information Technology for Individuals with Disabilities 6. CIO 2106.1 GSA Social Media Policy 7. CIO 2107.1 Implementation of the Online Resource Reservation Software 8. CIO 2160.4A Provisioning of Information Technology (IT) Devices 9. CIO 2162.1 Digital Signatures 10. CIO P 2165.2 GSA Telecommunications Policy 11. CIO P 2180.1 GSA Rules of Behavior for Handling Personally Identifiable Information (Pll) 12. CIO 2182.2 Mandatory Use of Personal Identity Verification (PIV) Credentials 13. CIO P 1878.2A Conducting Privacy Impact Assessments (PIAs) in GSA 14. CIO IL-13-01 Mobile Devices and Applications

Appears in 21 contracts

Samples: Design Build Contract, Construction Contract, Design Build Contract

AutoNDA by SimpleDocs

Safeguarding Sensitive Data and Information Technology Resources. In accordance with FAR 39.105, this section is included in the contract. This section applies to all users of sensitive data and information technology (IT) resources, including awardees, contractors, subcontractors, lessors, suppliers and manufacturers. The following GSA policies must be followedbefollowed. These policies can be found at Directives Library. 1. CIO P 2100.1K GSA Information Technology (IT) Security Policy 2. CIO P 2100.2B GSA Wireless Local Area Network (LAN) Security 3. CIO 2100.3C Mandatory Information Technology (IT) Security Training Requirement for Agency and Contractor Employees with Significant Security Responsibilities 4. CIO 2104.1A CIO CHGE 1 GSA Information Technology IT General Rules of Behavior 5. CIO 2105.1 C CHGE 1 GSA Section 508: Managing Electronic and Information Technology for Individuals with Disabilities 6. CIO 2106.1 GSA Social Media Policy 7. CIO 2107.1 Implementation of the Online Resource Reservation Software 8. CIO 2160.4A Provisioning of Information Technology (IT) Devices 9. CIO 2162.1 Digital Signatures 10. CIO P 2165.2 GSA Telecommunications Policy 11. CIO P 2180.1 GSA Rules of Behavior for Handling Personally Identifiable Information (Pll) 12. CIO 2182.2 Mandatory Use of Personal Identity Verification (PIV) Credentials 13. CIO P 1878.2A Conducting Privacy Impact Assessments (PIAs) in GSA 14. CIO IL-13-01 Mobile Devices and Applications

Appears in 1 contract

Samples: Construction Contract

AutoNDA by SimpleDocs

Safeguarding Sensitive Data and Information Technology Resources. In accordance with FAR 39.105, this section is included in the contract. This section applies to all users of sensitive data and information technology (IT) resources, including awardees, contractors, subcontractors, lessors, suppliers and manufacturers. The following GSA policies must be followed. These policies can be found at Directives Library. 1. CIO P 2100.1K GSA Information Technology (IT) Security Policy 2. CIO P 2100.2B GSA Wireless Local Area Network (LAN) Security 3. CIO 2100.3C Mandatory Information Technology (IT) Security Training Requirement for Agency and Contractor Employees with Significant Security Responsibilities 4. CIO 2104.1A CIO CHGE 1 GSA Information Technology IT General Rules of Behavior 5. CIO 2105.1 C CHGE 1 GSA Section 508: Managing Electronic and Information Technology for Individuals with Disabilities 6. CIO 2106.1 GSA Social Media Policy 7. CIO 2107.1 Implementation of the Online Resource Reservation Software 8. CIO 2160.4A Provisioning of Information Technology (IT) Devices 9. CIO 2162.1 Digital Signatures 10. CIO P 2165.2 GSA Telecommunications Policy 11. CIO P 2180.1 GSA Rules of Behavior for Handling Personally Identifiable Information (Pll) 12. CIO 2182.2 Mandatory Use of Personal Identity Verification (PIV) Credentials 13. CIO P 1878.2A Conducting Privacy Impact Assessments (PIAs) in GSA 14. CIO IL-13-01 Mobile Devices and Applications2102.1 Information Technology (IT) Integration Policy 15. HCO 9297.1 GSA Data Release Policy 16. HCO 9297.2B GSA Information Breach Notification Policy

Appears in 1 contract

Samples: Simplified Acquisition Construction Contract

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!