Security Requirements of Information Systems. a. Correct processing in applications i. Contractor shall validate data input to applications to ensure the data is correct and appropriate, and incorporate validation checks to detect any corruption of information through processing errors or deliberate acts; ii. Contractor has identified the requirements for ensuring authenticity and protecting message integrity in applications, and identified and implemented appropriate controls; and iii. Contractor has validated the data output from an application to ensure that the processing of stored information is correct and appropriate to the circumstances.
Appears in 9 contracts
Samples: Department Terms and Conditions, Department Terms and Conditions, Department Terms and Conditions