Security Requirements of Information Systems. Correct processing in applications Contractor shall validate data input to applications to ensure the data is correct and appropriate, and incorporate validation checks to detect any corruption of information through processing errors or deliberate acts; Contractor has identified the requirements for ensuring authenticity and protecting message integrity in applications, and identified and implemented appropriate controls; and Contractor has validated the data output from an application to ensure that the processing of stored information is correct and appropriate to the circumstances.
Appears in 4 contracts
Samples: Information Security Agreement, Information Security Agreement, Information Security Agreement
Security Requirements of Information Systems. a. Correct processing in applications applications
i. Contractor shall validate data input to applications to ensure the data is correct and appropriate, and incorporate validation checks to detect any corruption of information through processing errors or deliberate acts; ;
ii. Contractor has identified the requirements for ensuring authenticity and protecting message integrity in applications, and identified and implemented appropriate controls; and and
iii. Contractor has validated the data output from an application to ensure that the processing of stored information is correct and appropriate to the circumstances.
Appears in 1 contract
Samples: Information Security Agreement