Infrastructure Vulnerability Scanning Supplier will scan its internal environments (e.g., servers, network devices, etc.) related to Deliverables monthly and external environments related to Deliverables weekly. Supplier will have a defined process to address any findings but will ensure that any high-risk vulnerabilities are addressed within 30 days.
Information Technology Enterprise Architecture Requirements If this Contract involves information technology-related products or services, the Contractor agrees that all such products or services are compatible with any of the technology standards found at xxxxx://xxx.xx.xxx/iot/2394.htm that are applicable, including the assistive technology standard. The State may terminate this Contract for default if the terms of this paragraph are breached.
Contractor Project Manager The Contractor Project Manager shall serve, from the Effective Date, as the Contractor project manager and primary Contractor representative under this Agreement. The Contractor Project Manager shall (i) have overall responsibility for managing and coordinating the performance of Contractor’s obligations under this Agreement, including the performance of all Subcontractors; and (ii) be authorized to act for and bind Contractor and Subcontractors in connection with all aspects of this Agreement. The Contractor Project Manager shall respond promptly and fully to all inquiries from the JBE Project Manager.
Trunk Group Architecture and Traffic Routing The Parties shall jointly engineer and configure Local/IntraLATA Trunks over the physical Interconnection arrangements as follows:
Drainage Systems (1) Clear culvert inlets, outlets, and sediment catching basins.