Technology Standards Sample Clauses

Technology Standards. AVP shall use at least, and without limitation, the following security protection in connection with use, access, and display of Licensed Listings: ▪The security perimeter is clearly defined and the facilities physically sound. ▪The walls are of solid construction. ▪External doors protect against unauthorized access. ▪Access rights to secure areas are regularly reviewed and updated. ▪Access rights to secure areas are changed when personnel changes. ▪Key storage is physically protected. ▪Media containing sensitive information is protected against unauthorized access. ▪Procedures are in place to handle secure disposal of backup media and other media containing sensitive information. ▪Only users with a specific business requirement are granted remote access capabilities. ▪Users are authenticated prior to accessing corporate network resources. ▪Authentication is in the form of a unique username and password. ▪Secure encrypted communications are used for remote administration of production systems and applications. ▪Remote administration protocols, such as SSH, Telnet, PC Anywhere, Windows ▪Terminal Server, or Remote Desktop, limit access to only trusted networks using a firewall. ▪Access control devices such as a firewall are used to separate public, 3rd party, and corporate networks. ▪Users are located on separate network segments from those containing servers. ▪Users’ segments are separated from server segments by a firewall or equivalent access control device. ▪Network access policies disallow all access by default. ▪Access policies are audited to identify out dated policy rules. ▪Access control measures include username and password authentication. ▪User access is restricted on a need-to-know basis. ▪Maintenance accounts and remote support access are disabled if they are not required. ▪Privileged and administrative accounts are strictly controlled. ▪AVP default security settings are changed on production systems before the system goes into production. ▪Production systems are hardened by removing all unnecessary tools installed by the default configuration. ▪All production systems are updated with the latest security related patches released by the vendors of various components. ▪The router configuration is secured. ▪Egress and ingress filters are installed on all border routers to prevent impersonation with spoofed IP addresses. ▪If routers and other network devices are configured remotely, a secure communication protocol is used to protect the communicati...
Technology Standards a. Supplier will utilize AT&T’s approved Project Management methodologies, tools and practices. Additional Amdocs procedures must be in compliance with AT&T’s current methodologies, tools and practices for testing defect tracking systems and quality initiative approaches, and in compliance with or have an approved exception to the Technology, Strategies, and Standards (TSS) and such other processes as AT&T may implement in the future or as AT&T may require outside of the Technology Development organization; in each case to the extent the same have been communicated to Supplier by AT&T in writing. If AT&T implements new processes or changes in existing processes that result in a significant increase in the cost to Supplier of providing the Services, the Parties shall evaluate such changes and the associated cost using the then-applicable Change Management Process. Supplier will utilize AT&T processes for required deliverables to AT&T, but may follow Supplier methodology and best practices for internal testing activities.
Technology Standards. Vendor Licensee shall securely maintain at all times its computers and websites as secure sites, and the server on which any Licensed Listings or software for the Display Websites reside in a secure location, such that intruders may not access, damage, or alter files located on Vendor Licensee’s computers or access the Licensed Listings or software for the Display Websites. In addition, Vendor Licensee shall use reasonable security measures to prohibit screen scraping and data mining. Exhibit F Display Standards
Technology Standards. We will exercise reasonable efforts to maintain and upgrade all Internet and e-Commerce computer software and information technology, and other technological assets of the System, in a manner which keeps the System competitive. All decisions regarding technology improvements and upgrades will be made, in Our discretion, after consultation with the FOA. We will not implement “cutting edge” technology which does not have a reasonable cost versus benefit basis. When new technology is ready for use in the System, We will notify You.
Technology Standards. Parents and students should use the “Device Specifications” document to inform their choices when purchasing devices. These specifications ensure that the device will be able to connect to the school’s Wi-Fi network and that they will be of greatest advantage in meeting students’ educational needs. ✓ Security and Device Management: Devices will be locked in the students respective classroom through the day. ✓ Students using devices at Adamstown Public School should consider the following: ▪ Strong passwords ▪ Device anti-virus software ▪ Data and network traffic encryption ▪ Privacy controls ▪ Internet filtering ▪ Student Cyber Safety As a student, I understand and agree to abide by the conditions outlined above. I further understand that any violation of the above may lead to the loss of network privileges as well as other disciplinary action. Student Signature _ Date As a parent, I have read and discussed the above with my child and accept the terms of this agreement. I give permission for my child _ of class _ to bring the following device to school for the purpose of educational activities: Device Serial Number _ _ Parent Signature _ Date Please Print Name _ Draft written: 12th June 2016 ~ Revised: 12th August 2016 Revised: 6th June 2017, Revised 20th December 2018 ▇▇ ▇▇▇▇▇▇ ▇▇ Adamstown NSW 2289 Tel: ▇▇▇▇ ▇▇▇▇ Email: ▇▇▇▇▇▇▇▇▇-▇@▇▇▇.▇▇▇.▇▇▇.▇▇ Principal: ▇▇▇▇ ▇▇▇▇▇▇▇▇ Students must read this agreement in the company of their parent/carer unless excused by the principal. This page is to be signed and returned to the school. By signing at the bottom of this page students agree to the following behaviours: ❒ I will only use Adamstown Public School’s Wi-Fi network for learning. ❒ I will use my laptop during school activities at the direction of the teacher. ❒ I will not attach any school-owned equipment to my mobile device without the permission of the school. ❒ I will only use my own portal/internet log-in details and will never share them with others. ❒ I will stay safe by keeping my personal information private. ❒ I will not hack or bypass any hardware and software security implemented by the department or my school. ❒ I will not use my own device to knowingly search for, link to, access or send anything that is: • offensive • obscene • threatening • abusive • defamatory • considered to be bullying ❒ I will report inappropriate behaviour and inappropriate material to my teacher. ❒ I understand that my activity on the internet is recorded and that the...

Related to Technology Standards

  • Information Technology Accessibility Standards Any information technology related products or services purchased, used or maintained through this Grant must be compatible with the principles and goals contained in the Electronic and Information Technology Accessibility Standards adopted by the Architectural and Transportation Barriers Compliance Board under Section 508 of the federal Rehabilitation Act of 1973 (29 U.S.C. §794d), as amended. The federal Electronic and Information Technology Accessibility Standards can be found at: ▇▇▇▇://▇▇▇.▇▇▇▇▇▇-▇▇▇▇▇.▇▇▇/508.htm.

  • Technical Standards The Generation System shall be installed and operated by the Interconnection Customer consistent with the requirements of this Agreement; the Technical Requirements; the applicable requirements located in the National Electrical Code (NEC); the applicable standards published by the American National Standards Institute (ANSI) and the Institute of Electrical and Electronic Engineers (IEEE); and local building and other applicable ordinances in effect at the time of the installation of the Generation System.

  • Quality Standards Each Party agrees that the nature and quality of its products and services supplied in connection with the other Party's Marks will conform to quality standards set by the other Party. Each Party agrees to supply the other Party, upon request, with a reasonable number of samples of any Materials publicly disseminated by such Party which utilize the other Party's Marks. Each Party will comply with all applicable laws, regulations, and customs and obtain any required government approvals pertaining to use of the other Party's marks.

  • Safety Standards Performance of the Contract for all commodities or contractual services must comply with requirements of the Occupational Safety and Health Act and other applicable State of Florida and federal requirements.

  • Security Standards The Provider shall implement and maintain commercially reasonable security procedures and practices that otherwise meet or exceed industry standards designed to protect Student Data from unauthorized access, destruction, use, modification, or disclosure, including but not limited to the unauthorized acquisition of computerized data that compromises the security, confidentiality, or integrity of the Student Data (a "Security Breach"). For purposes of the DPA and this Exhibit G, "Security Breach" does not include the good faith acquisition of Student Data by an employee or agent of the Provider or LEA for a legitimate educational or administrative purpose of the Provider or LEA, so long as the Student Data is used solely for purposes permitted by SOPPA and other applicable law, and so long as the Student Data is restricted from further unauthorized disclosure.