Technology Security Requirements Sample Clauses

The Technology Security Requirements clause sets out the standards and obligations for protecting information systems and data from unauthorized access, breaches, or other security threats. It typically requires parties to implement specific technical and organizational measures, such as encryption, access controls, regular security assessments, and incident response protocols. By establishing clear security expectations, this clause helps prevent data breaches and ensures compliance with relevant laws and industry standards, thereby reducing the risk of security incidents and associated liabilities.
Technology Security Requirements. The security requirements in this document reflect the applicable requirements of Standard 141.10 (▇▇▇▇▇://▇▇▇▇.▇▇.▇▇▇/policies) of the Office of the Chief Information Officer for the state of Washington, which by this reference are incorporated into this agreement. The Subcontractor acknowledges it is required to comply with WaTech Office of Chief Information Officer (OCIO) IT Security Policy 141 and OCIO IT Security Standard 141.10, Securing Information Technology Assets. OCIO IT Security Standard 141.10, Securing Information Technology Assets, applies to all Superintendent assets stored as part of a service, application, data, system, portal, module, components or plug-in product(s) that are secured as defined by the WaTech OCIO's IT Security Policy 141 and OCIO IT Security Standard 141.10, Securing Information Technology Assets. As part of OCIO IT Security Standard 141.10, a design review checklist and/or other action may be required. These activities will be managed and coordinated between AWC and the Subcontractor. Any related costs to performing these activities shall be at the expense of the Subcontractor. Any such activities and resulting checklist and/or other products must be shared with AWC.
Technology Security Requirements. Grantee must ensure that all data and devices used to carry out Program follow all applicable state and federal data privacy and protection requirements. Grantee must ensure that data is properly secured and protected from outside intrusion from parties not association with the Program.