Common use of Security Requirements of Information Systems Clause in Contracts

Security Requirements of Information Systems. Correct processing in applications Contractor shall validate data input to applications to ensure the data is correct and appropriate, and incorporate validation checks to detect any corruption of information through processing errors or deliberate acts; Contractor has identified the requirements for ensuring authenticity and protecting message integrity in applications, and identified and implemented appropriate controls; and Contractor has validated the data output from an application to ensure that the processing of stored information is correct and appropriate to the circumstances.

Appears in 4 contracts

Samples: Information Security Agreement, Information Security Agreement, Information Security Agreement

AutoNDA by SimpleDocs

Security Requirements of Information Systems. a. Correct processing in applications applications i. Contractor shall validate data input to applications to ensure the data is correct and appropriate, and incorporate validation checks to detect any corruption of information through processing errors or deliberate acts; ; ii. Contractor has identified the requirements for ensuring authenticity and protecting message integrity in applications, and identified and implemented appropriate controls; and and iii. Contractor has validated the data output from an application to ensure that the processing of stored information is correct and appropriate to the circumstances.

Appears in 1 contract

Samples: Information Security Agreement

AutoNDA by SimpleDocs
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!