Security requirements for information systems Sample Clauses

Security requirements for information systems. 1. The Information Security requirements are included in the requirements for new information systems or expansions of existing information systems, on the basis of a risk analysis. The requirements are justified, agreed and documented as part of the total business case for an information system.
AutoNDA by SimpleDocs

Related to Security requirements for information systems

  • Electronic and Information Resources Accessibility and Security Standards a. Applicability: The following Electronic and Information Resources (“EIR”) requirements apply to the Contract because the Grantee performs services that include EIR that the System Agency's employees are required or permitted to access or members of the public are required or permitted to access. This Section does not apply to incidental uses of EIR in the performance of the Agreement, unless the Parties agree that the EIR will become property of the State of Texas or will be used by HHSC’s clients or recipients after completion of the Agreement. Nothing in this section is intended to prescribe the use of particular designs or technologies or to prevent the use of alternative technologies, provided they result in substantially equivalent or greater access to and use of a Product.

  • Requests for Information (RFI) In the event the Contract Documents are not complete, definite, and clear, the Contractor shall request the Design Professional in writing for additional instructions and shall furnish the Owner a copy of the RFI. With reasonable promptness but not more than five days thereafter, the Design Professional shall furnish complete, definite, and clear instructions in writing, or by means of drawings, or both. In the event such additional instructions are given orally for expediency, they shall be confirmed in writing or by drawings or both within five days following the oral instructions. Any such additional instructions shall be consistent with the Contract Documents and reasonably inferable therefrom. The Work shall be executed in conformity with the aforesaid instructions. The Design Professional shall furnish the Owner a copy of all additional instructions issued to the Contractor. If, because of events beyond its reasonable control, the Design Professional is not able to meet the specified time period, then it is entitled to ask for additional time from the Owner.

  • Accessibility of Information Technology Contractor represents and warrants that any software/ hardware/ communications system/ equipment (collectively “technology”), if any, provided under this Agreement adheres to the standards and/or specifications as may be set forth in the Section 508 of the Rehabilitation Act of 1973 standards guide and is fully compliant with WCAG 2.0 AA standards for accessibility and compliant with any applicable FCC regulations. Technology that will be used on a mobile device must also be navigable with Voiceover on iOS devices in addition to meeting WCAG 2.0 level AA. If portions of the technology or user experience are alleged to be non-compliant or non- accessible at any point, District will provide Contractor with notice of such allegation and Contractor shall use its best efforts to make the technology compliant and accessible. If a state or federal department, office or regulatory agency, or if any other third party administrative agency or organization (“Claimants”), make a claim, allegation, initiates legal or regulatory process, or if a court finds or otherwise determines that technology is non-compliant or non-accessible, Contractor shall indemnify, defend and hold harmless the District from and against any and all such claims, allegations, liabilities, damages, penalties, fees, costs (including but not limited to reasonable attorneys’ fees), arising out of or related to Xxxxxxxxx’ claims. Contractor shall also fully indemnify District for the full cost of any user accommodation that is found to be necessary due to an identifiable lack of accessibility in the Contractor’s technology. If necessary, an independent 3rd party accessibility firm using POUR standards (Perceivable, Operable, Understandable and Robust) may be used to validate the accessibility of the technology.

  • Requests for Information The Grantee shall fully and promptly comply with all reporting requirements and requests for information issued by the Department or its authorized designee. The Grantee shall provide such information in the format requested by the Department. The Grantee shall ensure that its staff, interns, volunteers, and subcontractors comply in a timely and complete manner with all the Department’s requests for information. The Grantee shall comply in a timely manner with requests by the Department or its authorized designee for financial information, records, and documents related to evaluating costs of programs and ser vices provided by the Grantee’s probation department. The Grantee shall timely submit any files or records of the Grantee’s juvenile probation department, or any facility or program operated by or under the authority of the Grantee, requested by the Department or its authorized designee as a part of the monitoring, auditing, or investigatory process.

  • Provisions for Covered Entity to Inform Business Associate of Privacy Practices and Restrictions (a) Covered Entity shall notify Business Associate of any limitation(s) in the notice of privacy practices of Covered Entity under 45 CFR 164.520, to the extent that such limitation may affect Business Associate’s use or disclosure of protected health information.

  • Contact Information for Privacy and Security Officers and Reports 2.1 Business Associate shall provide, within ten (10) days of the execution of this Agreement, written notice to the Contract or Grant manager the names and contact information of both the HIPAA Privacy Officer and HIPAA Security Officer of the Business Associate. This information must be updated by Business Associate any time these contacts change.

  • Information Systems 5.1. The Customer is aware that vehicles manufactured, supplied or marketed by a company within the Volvo Group are equipped with one or more systems which may gather and store information about the vehicle (the “Information Systems”), including but not limited to information relating to vehicle condition and performance and information relating to the operation of the vehicle (together, the “Vehicle Data”). The Customer agrees not to interfere with the operation of the Information System in any way.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!