Technology Standards Sample Clauses

Technology Standards. AVP shall use at least, and without limitation, the following security protection in connection with use, access, and display of Licensed Listings: ▪The security perimeter is clearly defined and the facilities physically sound. ▪The walls are of solid construction. ▪External doors protect against unauthorized access. ▪Access rights to secure areas are regularly reviewed and updated. ▪Access rights to secure areas are changed when personnel changes. ▪Key storage is physically protected. ▪Media containing sensitive information is protected against unauthorized access. ▪Procedures are in place to handle secure disposal of backup media and other media containing sensitive information. ▪Only users with a specific business requirement are granted remote access capabilities. ▪Users are authenticated prior to accessing corporate network resources. ▪Authentication is in the form of a unique username and password. ▪Secure encrypted communications are used for remote administration of production systems and applications. ▪Remote administration protocols, such as SSH, Telnet, PC Anywhere, Windows ▪Terminal Server, or Remote Desktop, limit access to only trusted networks using a firewall. ▪Access control devices such as a firewall are used to separate public, 3rd party, and corporate networks. ▪Users are located on separate network segments from those containing servers. ▪Users’ segments are separated from server segments by a firewall or equivalent access control device. ▪Network access policies disallow all access by default. ▪Access policies are audited to identify out dated policy rules. ▪Access control measures include username and password authentication. ▪User access is restricted on a need-to-know basis. ▪Maintenance accounts and remote support access are disabled if they are not required. ▪Privileged and administrative accounts are strictly controlled. ▪AVP default security settings are changed on production systems before the system goes into production. ▪Production systems are hardened by removing all unnecessary tools installed by the default configuration. ▪All production systems are updated with the latest security related patches released by the vendors of various components. ▪The router configuration is secured. ▪Egress and ingress filters are installed on all border routers to prevent impersonation with spoofed IP addresses. ▪If routers and other network devices are configured remotely, a secure communication protocol is used to protect the communicati...
AutoNDA by SimpleDocs
Technology Standards a. Supplier will utilize AT&T’s approved Project Management methodologies, tools, and practices. Additional Amdocs procedures must be in compliance with AT&T’s current methodologies, tools, and practices for testing defect tracking systems and quality initiative approaches, and in compliance with or have an approved exception to the Technology, Strategies, and Standards (TSS) and such other processes as AT&T may implement in the future or as AT&T may require outside of the Technology Development organization; in each case to the extent the same have been communicated to Supplier by AT&T in writing. If AT&T implements new processes or changes in existing processes that result in a significant increase in the cost to Supplier of providing the Services, the Parties shall evaluate such changes and the associated cost using the then-applicable Change Management Process. Supplier will utilize AT&T processes for required deliverables to AT&T, but may follow Supplier methodology and best practices for internal testing activities.
Technology Standards. Parents and students should use the “Device Specifications” document to inform their choices when purchasing devices. These specifications ensure that the device will be able to connect to the school’s Wi-Fi network and that they will be of greatest advantage in meeting students’ educational needs. ✓ Security and Device Management: Devices will be locked in the students respective classroom through the day. ✓ Students using devices at Adamstown Public School should consider the following: ▪ Strong passwords ▪ Device anti-virus software ▪ Data and network traffic encryption ▪ Privacy controls ▪ Internet filtering ▪ Student Cyber Safety As a student, I understand and agree to abide by the conditions outlined above. I further understand that any violation of the above may lead to the loss of network privileges as well as other disciplinary action. Student Signature _ Date As a parent, I have read and discussed the above with my child and accept the terms of this agreement. I give permission for my child _ of class _ to bring the following device to school for the purpose of educational activities: Device Serial Number _ _ Parent Signature _ Date Please Print Name _ Draft written: 12th June 2016 ~ Revised: 12th August 2016 Revised: 6th June 2017, Revised 20th December 2018 0X Xxxxxx Xx Adamstown NSW 2289 Tel: 0000 0000 Email: xxxxxxxxx-x@xxx.xxx.xxx.xx Principal: Xxxx Xxxxxxxx Students must read this agreement in the company of their parent/carer unless excused by the principal. This page is to be signed and returned to the school. By signing at the bottom of this page students agree to the following behaviours: ❒ I will only use Adamstown Public School’s Wi-Fi network for learning. ❒ I will use my laptop during school activities at the direction of the teacher. ❒ I will not attach any school-owned equipment to my mobile device without the permission of the school. ❒ I will only use my own portal/internet log-in details and will never share them with others. ❒ I will stay safe by keeping my personal information private. ❒ I will not hack or bypass any hardware and software security implemented by the department or my school. ❒ I will not use my own device to knowingly search for, link to, access or send anything that is: • offensive • obscene • threatening • abusive • defamatory • considered to be bullying ❒ I will report inappropriate behaviour and inappropriate material to my teacher. ❒ I understand that my activity on the internet is recorded and that the...
Technology Standards. Vendor Licensee shall securely maintain at all times its computers and websites as secure sites, and the server on which any Licensed Listings or software for the Display Websites reside in a secure location, such that intruders may not access, damage, or alter files located on Vendor Licensee’s computers or access the Licensed Listings or software for the Display Websites. In addition, Vendor Licensee shall use reasonable security measures to prohibit screen scraping and data mining. Exhibit F Display Standards
Technology Standards. We will exercise reasonable efforts to maintain and upgrade all Internet and e-Commerce computer software and information technology, and other technological assets of the System, in a manner which keeps the System competitive. All decisions regarding technology improvements and upgrades will be made, in Our discretion, after consultation with the FOA. We will not implement “cutting edge” technology which does not have a reasonable cost versus benefit basis. When new technology is ready for use in the System, We will notify You.

Related to Technology Standards

  • Technical Standards The Generation System shall be installed and operated by the Interconnection Customer consistent with the requirements of this Agreement; the Technical Requirements; the applicable requirements located in the National Electrical Code (NEC); the applicable standards published by the American National Standards Institute (ANSI) and the Institute of Electrical and Electronic Engineers (IEEE); and local building and other applicable ordinances in effect at the time of the installation of the Generation System.

  • Quality Standards Each Party agrees that the nature and quality of its products and services supplied in connection with the other Party's Marks will conform to quality standards set by the other Party. Each Party agrees to supply the other Party, upon request, with a reasonable number of samples of any Materials publicly disseminated by such Party which utilize the other Party's Marks. Each Party will comply with all applicable laws, regulations, and customs and obtain any required government approvals pertaining to use of the other Party's marks.

  • Safety Standards Performance of the Contract for all commodities or contractual services must comply with requirements of the Occupational Safety and Health Act and other applicable State of Florida and federal requirements.

  • Security Standards The Provider shall implement and maintain commercially reasonable security procedures and practices that otherwise meet or exceed industry standards designed to protect Student Data from unauthorized access, destruction, use, modification, or disclosure, including but not limited to the unauthorized acquisition of computerized data that compromises the security, confidentiality, or integrity of the Student Data (a "Security Breach"). For purposes of the DPA and this Exhibit G, "Security Breach" does not include the good faith acquisition of Student Data by an employee or agent of the Provider or LEA for a legitimate educational or administrative purpose of the Provider or LEA, so long as the Student Data is used solely for purposes permitted by SOPPA and other applicable law, and so long as the Student Data is restricted from further unauthorized disclosure.

  • OMB Standards Unless specified otherwise within this agreement, the Subrecipient shall procure all materials, property, or services in accordance with the requirements of 24 CFR 84.40−48.

  • Clinical Data and Regulatory Compliance The preclinical tests and clinical trials, and other studies (collectively, “studies”) that are described in, or the results of which are referred to in, the Registration Statement or the Prospectus were and, if still pending, are being conducted in all material respects in accordance with the protocols, procedures and controls designed and approved for such studies and with standard medical and scientific research procedures; each description of the results of such studies is accurate and complete in all material respects and fairly presents the data derived from such studies, and the Company and its subsidiaries have no knowledge of any other studies the results of which are inconsistent with, or otherwise call into question, the results described or referred to in the Registration Statement or the Prospectus; the Company and its subsidiaries have made all such filings and obtained all such approvals as may be required by the Food and Drug Administration of the U.S. Department of Health and Human Services or any committee thereof or from any other U.S. or foreign government or drug or medical device regulatory agency, or health care facility Institutional Review Board (collectively, the “Regulatory Agencies”); neither the Company nor any of its subsidiaries has received any notice of, or correspondence from, any Regulatory Agency requiring the termination, suspension or modification of any clinical trials that are described or referred to in the Registration Statement or the Prospectus; and the Company and its subsidiaries have each operated and currently are in compliance in all material respects with all applicable rules, regulations and policies of the Regulatory Agencies.

  • Service Level Standards In addition to all other requirements in this Agreement, and in accordance with the Best Claims Practices & Estimating Guidelines, Vendor shall use reasonable and good faith efforts to meet the Service Level Standards set forth below.

  • Ethical Standards ‌ 7.8.1 Within ninety (90) days after the Effective Date, Developer shall adopt written policies establishing ethical standards of conduct for all Developer-Related Entities, including Developer’s supervisory and management personnel, in dealing with (a) IFA and the Department and (b) employment relations. Such policy shall be subject to review and comment by IFA prior to adoption. Such policy shall include standards of ethical conduct concerning the following: 7.8.1.1 Restrictions on gifts and contributions to, and lobbying of, IFA, the Department and any of their respective members, commissioners, directors, officers and employees, and elected State officials; 7.8.1.2 Protection of employees from unethical practices in selection, use, hiring, compensation or other terms and conditions of employment, or in firing, promotion and termination of employees; 7.8.1.3 Protection of employees from retaliatory actions (including discharge, demotion, suspension, threat, harassment, pay reduction or other discrimination in the terms and conditions of employment) in response to reporting of illegal (including the making of a false claim), unethical or unsafe actions or failures to act by any Developer-Related Entity; 7.8.1.4 Restrictions on directors, members, officers or supervisory or management personnel of any Developer-Related Entity engaging in any transaction or activity, including receiving or offering a financial incentive, benefit, loan or other financial interest, that is, or to a reasonable person appears to be, in conflict with or incompatible with the proper discharge of duties or independence of judgment or action in the performance of duties, or adverse to the interests of the Project or employees; 7.8.1.5 Restrictions on use of office or job position for a purpose that is, or would to a reasonable person appear to be, primarily for the private benefit of a director, member, officer or supervisory or management person, rather than primarily for the benefit of Developer or the Project, or primarily to achieve a private gain or an exemption from duty or responsibility for a director, member, officer or supervisory or management person; and 7.8.1.6 Restrictions on directors, members, officers or employees of any Developer-Related Entity performing any of the Work if the performance of such services would be prohibited under IFA’s conflict of interest rules and policies. 7.8.2 Developer shall cause its directors, members, officers and supervisory and management personnel, and require those of all other Developer-Related Entities, to adhere to and enforce the adopted policy on ethical standards of conduct. Developer shall establish reasonable systems and procedures to promote and monitor compliance with the policy. 7.8.3 Notwithstanding the foregoing in this Section 7.8, Developer has an affirmative obligation under this Agreement to disclose to IFA and to the Indiana State Ethics Commission when an interested party is or becomes an employee of IFA or the State. This obligation extends only to those facts that Developer knows or reasonably could know. For purposes of this Section 7.8.3, “interested party” means (a) the individual executing this Agreement, (b) an individual who has an interest of three percent (3%) or more of Developer, (c) any member of the immediate family of an individual specified in clause (a) or (b). For purposes of the preceding sentence, “immediate family” means the spouse and the unemancipated children of an individual.‌

  • Technology Research Analyst Job# 1810 General Characteristics

  • Design Criteria and Standards All Projects/Services shall be performed in accordance with instructions, criteria and standards set forth by the Director.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!