Safeguarding Sensitive Data and Information Technology Resources. In accordance with FAR 39.105, this section is included in the contract. This section applies to all users of sensitive data and information technology (IT) resources, including awardees, contractors, subcontractors, lessors, suppliers and manufacturers. The following GSA policies must be followed. These policies can be found at Directives Library. 1. CIO P 2100.1K GSA Information Technology (IT) Security Policy 2. CIO P 2100.2B GSA Wireless Local Area Network (LAN) Security 3. CIO 2100.3C Mandatory Information Technology (IT) Security Training Requirement for Agency and Contractor Employees with Significant Security Responsibilities 4. CIO 2104.1A CIO CHGE 1 GSA Information Technology IT General Rules of Behavior 5. CIO 2105.1 C CHGE 1 GSA Section 508: Managing Electronic and Information Technology for Individuals with Disabilities 6. CIO 2106.1 GSA Social Media Policy 7. CIO 2107.1 Implementation of the Online Resource Reservation Software 8. CIO 2160.4A Provisioning of Information Technology (IT) Devices 9. CIO 2162.1 Digital Signatures 10. CIO P 2165.2 GSA Telecommunications Policy 11. CIO P 2180.1 GSA Rules of Behavior for Handling Personally Identifiable Information (Pll) 12. CIO 2182.2 Mandatory Use of Personal Identity Verification (PIV) Credentials 13. CIO P 1878.2A Conducting Privacy Impact Assessments (PIAs) in GSA 14. CIO IL-13-01 Mobile Devices and Applications
Appears in 21 contracts
Samples: Design Build Contract, Construction Contract, Design Build Contract
Safeguarding Sensitive Data and Information Technology Resources. In accordance with FAR 39.105, this section is included in the contract. This section applies to all users of sensitive data and information technology (IT) resources, including awardees, contractors, subcontractors, lessors, suppliers and manufacturers. The following GSA policies must be followedbefollowed. These policies can be found at Directives Library.
1. CIO P 2100.1K GSA Information Technology (IT) Security Policy
2. CIO P 2100.2B GSA Wireless Local Area Network (LAN) Security
3. CIO 2100.3C Mandatory Information Technology (IT) Security Training Requirement for Agency and Contractor Employees with Significant Security Responsibilities
4. CIO 2104.1A CIO CHGE 1 GSA Information Technology IT General Rules of Behavior
5. CIO 2105.1 C CHGE 1 GSA Section 508: Managing Electronic and Information Technology for Individuals with Disabilities
6. CIO 2106.1 GSA Social Media Policy
7. CIO 2107.1 Implementation of the Online Resource Reservation Software
8. CIO 2160.4A Provisioning of Information Technology (IT) Devices
9. CIO 2162.1 Digital Signatures
10. CIO P 2165.2 GSA Telecommunications Policy
11. CIO P 2180.1 GSA Rules of Behavior for Handling Personally Identifiable Information (Pll)
12. CIO 2182.2 Mandatory Use of Personal Identity Verification (PIV) Credentials
13. CIO P 1878.2A Conducting Privacy Impact Assessments (PIAs) in GSA 14. CIO IL-13-01 Mobile Devices and Applications
Appears in 1 contract
Samples: Construction Contract
Safeguarding Sensitive Data and Information Technology Resources. In accordance with FAR 39.105, this section is included in the contract. This section applies to all users of sensitive data and information technology (IT) resources, including awardees, contractors, subcontractors, lessors, suppliers and manufacturers. The following GSA policies must be followed. These policies can be found at Directives Library.
1. CIO P 2100.1K GSA Information Technology (IT) Security Policy
2. CIO P 2100.2B GSA Wireless Local Area Network (LAN) Security
3. CIO 2100.3C Mandatory Information Technology (IT) Security Training Requirement for Agency and Contractor Employees with Significant Security Responsibilities
4. CIO 2104.1A CIO CHGE 1 GSA Information Technology IT General Rules of Behavior
5. CIO 2105.1 C CHGE 1 GSA Section 508: Managing Electronic and Information Technology for Individuals with Disabilities
6. CIO 2106.1 GSA Social Media Policy
7. CIO 2107.1 Implementation of the Online Resource Reservation Software
8. CIO 2160.4A Provisioning of Information Technology (IT) Devices
9. CIO 2162.1 Digital Signatures
10. CIO P 2165.2 GSA Telecommunications Policy
11. CIO P 2180.1 GSA Rules of Behavior for Handling Personally Identifiable Information (Pll)
12. CIO 2182.2 Mandatory Use of Personal Identity Verification (PIV) Credentials
13. CIO P 1878.2A Conducting Privacy Impact Assessments (PIAs) in GSA 14. CIO IL-13-01 Mobile Devices and Applications2102.1 Information Technology (IT) Integration Policy 15. HCO 9297.1 GSA Data Release Policy 16. HCO 9297.2B GSA Information Breach Notification Policy
Appears in 1 contract