Safeguarding Sensitive Data and Information Technology Resources. In accordance with FAR 39.105, this section is included in the contract. This section applies to all users of sensitive data and information technology (IT) resources, including awardees, contractors, subcontractors, lessors, suppliers and manufacturers. The following GSA policies must be followed. These policies can be found at Directives Library. 1. CIO P 2100.1K GSA Information Technology (IT) Security Policy 2. CIO P 2100.2B GSA Wireless Local Area Network (LAN) Security 3. CIO 2100.3C Mandatory Information Technology (IT) Security Training Requirement for Agency and Contractor Employees with Significant Security Responsibilities 4. CIO 2104.1A CIO CHGE 1 GSA Information Technology IT General Rules of Behavior 5. CIO 2105.1 C CHGE 1 GSA Section 508: Managing Electronic and Information Technology for Individuals with Disabilities 6. CIO 2106.1 GSA Social Media Policy 7. CIO 2107.1 Implementation of the Online Resource Reservation Software 8. CIO 2160.4A Provisioning of Information Technology (IT) Devices 9. CIO 2162.1 Digital Signatures
Appears in 5 contracts
Samples: Gsa Contract, Design Build Contract, Construction Contract