System Development Sample Clauses

System Development. If the Contractor provides system development, Protected University Data shall not be used in the development or test environments. Records that contain these types of data elements may be used if that data is first de-identified, masked or altered so that the original value is not recoverable. For programs that process Protected University Data, initial implementation as well as applied updates and modifications must be produced from specifically authorized and trusted program source libraries and personnel. Contractor shall provide documentation of a risk assessment of new system development or changes to a system.
AutoNDA by SimpleDocs
System Development. The System prototypes must meet each milestone stated on Exhibit C (“System Milestone”) and [***] (“System Requirements”).
System Development. (1) To the extent that Company provides the Services, the Company and its Subcontractors shall agree to apply the following requirements: i. Establish policies and procedures that ensure the application system has been designed, built and implemented in a secure manner according to industry recognized best practices or frameworks (e.g., Build Security in Maturity Model (BSIMM) benchmarks, Open Group ACS Trusted Technology Provider framework, NIST, OWASP, etc.). ii. Establish policies and procedures that ensure data security has been designed, built, and implemented into the application system according to industry recognized best practices or frameworks (e.g.,CDSA, MULITSAFE, CSA Trusted Cloud Architectural Standard, FedRAMP, CAESARS, etc.). iii. Establish policies and procedures that ensure the application system has been properly tested, including the development of a security test plan that defines an approach for testing or otherwise establishing that each of the security requirements has been met. iv. Perform vulnerability assessment and penetration test on the application system to identify any security issues prior to the application system being placed into production. The Company or its Subcontractors verify that appropriate and reasonable action will be taken to mitigate any security issues identified prior to the system being placed into production. v. Upon Central Xxxxxx’x request, the Company and each Subcontractor shall promptly provide the results of any vulnerability assessment and penetration test. vi. Establish policies and procedures that ensure the application system has a proper change management and patch management process that includes applying, testing, and validating the appropriate changes / patches before being placed in the production system. vii. Upon Central Xxxxxx’x request, the Company and each Subcontractor shall promptly provide a self-certification letter to Central Xxxxxx verifying that the application system meets the security requirements stated in the Data Security Rider, that all security activities have been performed, and all identified security issues have been documented and resolved. (2) Company warrants that the application system contains no virus, Trojan, worm, undocumented shutdown mechanism or other code or feature which is intended, or is known by Company as likely, to disable, damage, destroy, deny access to or degrade the performance of the application system, or Confidential Information, Data or other ...
System Development. Carrying out of marketing strategies to package and market the MEH system and its marine information and other products, and the services it could provide.
System Development. (a) You shall develop the System to provide the facilities and functions and performance set out in the specification and the detailed design to meet our requirements for the System. The System shall comply with the best practice of the software and computer services industry and to the structured programming and documentation standards set out in the Documents. (b) You shall verify that the specification and all Documents provided are accurate and complete and shall agree with us any changes that we may consider to be necessary under the Change Order procedure. (c) You shall keep all work, data and Documents safe and secure from loss or damage and maintain up-to-date back-up copies in a separate and secure location.
System Development. 12.1 CyberGRX has an established software development lifecycle for the purpose of defining, acquiring, developing, enhancing, modifying, testing, and implementing information systems.
System Development. As an outcome from the General Discovery phase and GECF-A Discovery, First Data will identify general system differences, which will require systems development on the First Data System. First Data will identify final specific differences for RCSI’s approval within each Wave that may require systems development on the First Data System. With respect to differences that require systems development, First Data will: • Write programming requests for all First Data System changes identified during GECF-A Discovery and outlined in the Resolution Agreements. • Design First Data System enhancements and write detailed documents describing the specific First Data System changes. • Quality inspects designs by the requester as well as members of the Systems and Programming organization. • Provide detail designs to RCSI for review and approval. • Code and construct the First Data System changes, including individual unit and system testing of the programs that are changed. • Merge the new code with production code into an integration testing environment, which is executed by First Data development and testing staff to identify specific coding errors. • Move all applicable programs into the Client Acceptance Test environment where the new functionality can be tested in a production-like system by RCSI and First Data. • Install completed programs into production according to the standard release schedule. First Data will: • Receive and analyze the RCSI system masterfiles. • Prepare a mapping specifications document, which details how fields are mapped from the RCSI masterfiles to First Data masterfiles. • Review mapping specifications with the RCSI. Table of Contents • Code the Conversion programs from the mapping specifications. The Conversion programs create new First Data System masterfiles. • Test the Conversion programs using a series of “Mock” Conversions. First Data will receive the production masterfiles from RCSI and run them through the Conversion programs to create output reports showing each masterfile field and value. First Data will verify the information against the mapping specifications. • Execute the Conversion programs on conversion weekend and merge the new masterfiles into production. First Data or RCSI, in accordance with the Discovery Plan, will: • Establish RCSI defined parameters on the Product Control File and fully document deviations from the RCSI standard template for each portfolio. • Create Account Level Processing/Transaction Level Proces...
AutoNDA by SimpleDocs
System Development. In accordance with the Development Project ------------------ Work Statement attached hereto as Exhibit "B", the parties shall perform their ----------- respective Development Project obligations (at their own cost) to develop, implement, execute, integrate and test the software code (including the CNC Code), hardware and software systems, procedures and installation to develop an overall system to offer the Internet Services (collectively, the "System"). During the Term of this Agreement, CNC (i) warrants that the CNC Code shall meet all its specifications to support Intuit's provision of the Internet Services, (ii) will provide to Intuit at no ---------------- [*] Certain information on this page has been omitted and filed separately with the Securities and Exchange Commission. Confidential treatment has been requested with respect to the omitted portions. charge unlimited telephone access to CNC's technical support staff to obtain assistance relating to the CNC Code, and (iii) will develop and deliver to Intuit at no charge any maintenance or feature releases, and related documentation, to correct a programming error or other defect or to increase or enhance the features or functionality of the CNC Code which CNC makes available as a standard feature of its standard commercial release during the Term.
System Development. Subject to the terms hereof, Seller shall at its sole cost and expense undertake commercially reasonable efforts to obtain required permits and financing for, and to construct the System in a manner such that the System qualifies as a CDG Host Facility in accordance with the Utility’s CDG Procedural Requirements for Value Stack Customers, the Utility’s CDG Net Crediting Manual, and the Utility’s Value Stack Tariff and arrange for interconnection of the System to the Utility’s electrical grid. At no time shall Buyer have any duty to construct, operate, or maintain the System, or to perform any other obligations of Seller. Seller is responsible for submitting Allocation Requests to the Utility from time to time as needed to allocate Bill Credits associated with the output of the System. Buyer shall irrevocably accept and assume the allocation and assignment of Bill Credits as reflected in the Allocation Requests consistent with the terms of this Agreement.
System Development. Supplier will use commercially reasonable efforts to ensure that the System uses industry-standard software, and will be compatible with commonly used operating systems and software, including the most recent versions of Microsoft Internet Explorer, Apple Safari and Mozilla Firefox Web browsers or the applicable client software and two prior major releases.
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!