Software Installed in County’s Network Sample Clauses

Software Installed in County’s Network. To the extent Contractor provides any Software to be installed in County’s network, Contractor must:
AutoNDA by SimpleDocs
Software Installed in County’s Network. Provider shall advise County of any third- party software (e.g., Java, Adobe Reader/Flash, Silverlight) required to be installed and all versions supported. Provider shall support updates for critical vulnerabilities discovered in applicable third-party software. Provider shall ensure that the Software is developed based on industry standards and best practices, including following secure programming techniques and incorporating security throughout the software-development life cycle. Provider must develop and maintain the Software to operate on County-supported and approved operating systems and firmware versions. Provider must mitigate critical or high risk vulnerabilities to the Provider Platform as defined by Common Vulnerability and Exposures (CVE) scoring system within 30 days of patch release. If Provider is unable to apply a patch to remedy the vulnerability, Provider must notify County of proposed mitigation steps to be taken and timeline for resolution. Provider shall ensure the Software provides for role-based access controls and runs with least privilege access. Provider shall support electronic delivery of digitally signed upgrades from Provider’s or the third-party licensor’s website. Provider shall enable auditing by default in software for any privileged access or changes. The Software must not be within three (3) years from Software's end of life date and the Software must run as least privilege without using fixed or default passwords. Provider shall regularly provide County with end-of-life-schedules for all applicable Software. Provider will support encryption using at a minimum Advanced Encryption Standard 256-bit encryption keys (“AES-256”) or current industry security standards, whichever is higher, for confidential data at rest. Provider will use transport layer security (TLS) 1.1 or current industry standards, whichever is higher, for data in motion.

Related to Software Installed in County’s Network

  • Software Installation The AGENCY shall request approval in writing from the COUNTY prior to installation of any software on COUNTY computer equipment. All software installations must be supervised by COUNTY technical support staff and proof of licensing is required. Upon completion, the AGENCY is responsible for reconfiguring the computers back to the original state.

  • Installations 2.1. This test shall be conducted with either the complete REESS or with a related REESS subsystem(s) including the cells and their electrical connections. If the manufacturer chooses to test with related subsystem(s), the manufacturer shall demonstrate that the test result can reasonably represent the performance of the complete REESS with respect to its safety performance under the same conditions. If the electronic management unit for the REESS is not integrated in the casing enclosing the cells, then the electronic management unit may be omitted from installation on the Tested-Device if so requested by the manufacturer.

  • Installation Services 3.1 The Bitstream 2a Service includes a Standard Install as set out below (in each case to the extent that the relevant provisioning works are not already complete for the relevant Service Order).1

  • Electrical Installations 3.1 Wiring and accessories for lighting of Common Areas.

  • ALTERATIONS & IMPROVEMENTS Tenant shall not make any alterations, additions or improvements or do any type of construction to the Property without first obtaining Landlord's written consent. Unless prior written agreement is reached between Tenant and Landlord, any such alterations, additions, improvements or construction shall become part of the Property and shall remain at the expiration of Tenant's Lease term. If Landlord approves of alterations, additions, improvements or construction in writing and Tenant intends to use contractors to undertake such work, the contractors must first be approved in writing by Landlord. Tenant must also place any funds to cover the amount of any alterations, additions, improvements or construction in an escrow account approved by Landlord before the commencement of the work. Landlord shall designate the times and manner of the work being done, exclusively.

  • Selection of Subcontractors, Procurement of Materials and Leasing of Equipment The contractor shall not discriminate on the grounds of race, color, religion, sex, national origin, age or disability in the selection and retention of subcontractors, including procurement of materials and leases of equipment. The contractor shall take all necessary and reasonable steps to ensure nondiscrimination in the administration of this contract.

  • Filing Systems and Equipment A complete and comprehensive catalog of filing systems including vertical and lateral files, bookcases, mobile cabinets and freestanding file cabinets.

  • Access to Work Locations Reasonable access to employee work locations shall be granted officers of the Association and their officially designated representatives for the purpose of processing grievances or contacting members of the Association concerning business within the scope of representation. Such officers or representatives shall not enter any work location without the consent of the City Manager. Access shall be restricted so as not to interfere with the normal operations of the department or with established safety or security requirements. Solicitation of membership and activities concerned with the internal management of the Association, such as collecting dues, holding membership meetings, campaigning for office, conducting elections and distributing literature, shall not be conducted during working hours.

  • Installation, Maintenance, Testing and Repair Unless otherwise agreed in writing by the Parties, to the extent required by Applicable Law, Interconnection provided by a Party shall be equal in quality to that provided by such Party to itself, any subsidiary, affiliates or third party. If either Party is unable to fulfill its obligations under this Section 14.2, it shall notify the other Party of its inability to do so and will negotiate alternative intervals in good faith. The Parties agree that to the extent required by Applicable Law, the standards to be used by a Party for isolating and clearing any disconnections and/or other outages or troubles shall be at parity with standards used by such Party with respect to itself, any subsidiary, affiliate or third party.

  • Software Use Case Red Hat Enterprise Virtualization Supported on physical hardware solely to support virtual quests. Red Hat Enterprise Virtualization is designed to run and manage virtual instances and does not support user-space applications. Red Hat Enterprise Virtualization may be used as a virtual desktop infrastructure solution, however, the Subscription does not come with any software or support for the desktop operating system. You must purchase the operating system for each instance of a desktop or server separately.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!