Accessibility of Information Technology Sample Clauses

Accessibility of Information Technology. Contractor represents and warrants that any software/ hardware/ communications system/ equipment (collectively “technology”), if any, provided under this Agreement adheres to the standards and/or specifications as may be set forth in the Section 508 of the Rehabilitation Act of 1973 standards guide and is fully compliant with WCAG 2.0 AA standards for accessibility and compliant with any applicable FCC regulations. Technology that will be used on a mobile device must also be navigable with Voiceover on iOS devices in addition to meeting WCAG 2.0 level AA. If portions of the technology or user experience are alleged to be non-compliant or non- accessible at any point, District will provide Contractor with notice of such allegation and Contractor shall use its best efforts to make the technology compliant and accessible. If a state or federal department, office or regulatory agency, or if any other third party administrative agency or organization (“Claimants”), make a claim, allegation, initiates legal or regulatory process, or if a court finds or otherwise determines that technology is non-compliant or non-accessible, Contractor shall indemnify, defend and hold harmless the District from and against any and all such claims, allegations, liabilities, damages, penalties, fees, costs (including but not limited to reasonable attorneys’ fees), arising out of or related to Xxxxxxxxx’ claims. Contractor shall also fully indemnify District for the full cost of any user accommodation that is found to be necessary due to an identifiable lack of accessibility in the Contractor’s technology. If necessary, an independent 3rd party accessibility firm using POUR standards (Perceivable, Operable, Understandable and Robust) may be used to validate the accessibility of the technology.
AutoNDA by SimpleDocs
Accessibility of Information Technology. Contractor hereby warrants that the Work to be provided under this Agreement complies with the accessibility requirements of Section 508 of the Rehabilitation Act of 1973, as amended (29 X.X.X §000x), and its implementing regulations set forth at Title 36, Code of Federal Regulations, Part 1194. Contractor agrees to promptly respond to and resolve any complaint regarding accessibility of its products brought to its attention. Contractor further agrees to indemnify and hold harmless the South Orange County Community College District, the Chancellor’s Office of the California Community Colleges and any California community college using the Contractor’s products from any claim arising out of its failure to comply with the aforesaid requirements. Failure to comply with these requirements shall constitute a breach and be grounds for termination of this Agreement.
Accessibility of Information Technology. Contractor represents and warrants that any software/ hardware/ communications system/ equipment (collectively "technology"), if any, provided under this Agreement adheres to the standards and/or specifications as may be set forth in the Section 508 of the Rehabilitation Act of 1973 standards guide and is fully compliant with WCAG 2.0 AA standards for accessibility and compliant with any applicable FCC regulations. Technology that will be used on a mobile device must also be navigable with Voiceover on iOS devices in addition to meeting WCAG 2.0
Accessibility of Information Technology. Contractor represents and warrants that any software/ hardware/ standards and/or specifications as may be set forth in the Section 508 of the Rehabilitation Act of 1973 standards guide and is fully compliant with WCAG 2.0 AA standards for accessibility and compliant with any applicable FCC regulations. Technology that will be used on a mobile device must also be navigable with Voiceover on iOS devices in addition to meeting WCAG 2.0 level AA. If portions of the technology or user experience are alleged to be non-compliant or non- accessible at any point, District will provide Contractor with notice of such allegation and Contractor shall use its best efforts to make the technology compliant and accessible. If a state or federal department, office or regulatory agency, or regulatory process, or if a court finds or otherwise determines that technology is non-compliant or non-accessible, Contractor shall indemnify, defend and hold harmless the District from and against any and all such claims, allegations, liabilities, damages, penalties, fees, cost Contractor shall also fully indemnify District for the full cost of any user accommodation that is found to be necessary due to an identifiable lack of accessibility in the Contractor independent 3rd party accessibility firm using POUR standards (Perceivable, Operable, Understandable and Robust) may be used to validate the accessibility of the technology.
Accessibility of Information Technology. Contractor hereby warrants that the Work to be provided under this Agreement complies with the accessibility requirements of Section 508 of the Rehabilitation Act of 1973, as amended (29 X.X.X §000x), and its implementing regulations set forth at Title 36, Code of Federal Regulations, Part 1194. Contractor agrees to promptly respond to and resolve any complaint regarding accessibility of its products brought to its attention. Contractor further agrees to indemnify and hold harmless District from any claim arising out of its failure to comply with the aforesaid requirements. Failure to comply with these requirements shall constitute a breach and be grounds for termination of this Agreement.
Accessibility of Information Technology. We hereby warrant that the services to be provided under this Agreement comply with the accessibility requirements of Section 508 of the Rehabilitation Act of 1973, as amended (29 U.S.C §794d), and its implementing regulations set forth at Title 36, Code of Federal Regulations, Part 1194. We agree to promptly respond to and use best endeavors to resolve any complaint regarding accessibility of our products brought to our attention. We further agree to indemnify and hold you harmless from any claim arising out of our failure to comply with the aforesaid requirements. Failure to comply with these requirements shall constitute a breach and be grounds for termination of this Agreement without penalty.
Accessibility of Information Technology. PNC hereby warrants that the systems and services to be provided under this Agreement comply with the accessibility requirements of Section 508 of the Rehabilitation Act of 1973, as amended (29 X.X.X §000x), and its implementing regulations set forth at Title 36, Code of Federal Regulations, Part 1194. PNC agrees to promptly respond to and resolve any complaint regarding accessibility of its products brought to its attention. PNC further agrees to indemnify and hold harmless Client from any claim arising out of its failure to comply with the aforesaid requirements. Failure to comply with these requirements shall constitute a breach and be grounds for termination of this Agreement.
AutoNDA by SimpleDocs
Accessibility of Information Technology. Contractor’s student experience, including its mobile-responsive student experience, is substantially conformant to Section 508 of the Rehabilitation Act of 1973 and WCAG 2.1 AA standards as identified in Contractor’s VPAT. The mobile-responsive student experience is navigable with VoiceOver on iOS devices. If portions of the technology or user experience are alleged to be non-compliant or non- accessible at any point, District will provide Contractor with notice of such allegation and Contractor shall use its best efforts to make the technology compliant and accessible. Please see Xxxxxxx’s accessibility statement located here: xxxxx://xxxxxxx.xxxxxxx.xxx/article/newsela-accessibility-statement/.

Related to Accessibility of Information Technology

  • Information Technology Accessibility Standards Any information technology related products or services purchased, used or maintained through this Grant must be compatible with the principles and goals contained in the Electronic and Information Technology Accessibility Standards adopted by the Architectural and Transportation Barriers Compliance Board under Section 508 of the federal Rehabilitation Act of 1973 (29 U.S.C. §794d), as amended. The federal Electronic and Information Technology Accessibility Standards can be found at: xxxx://xxx.xxxxxx-xxxxx.xxx/508.htm.

  • Supply of Information Following service of a notice by the Contractor pursuant to clause 16.1 (Notice), the Contractor shall promptly supply to the Authority any further information relating to the delay which:

  • INFORMATION TECHNOLOGY The following applies to all contracts for information technology commodities and contractual services. “Information technology” is defined in section 287.012(15), F.S., to have the same meaning as provided in section 282.0041, F.S.

  • DATA PROTECTION AND FREEDOM OF INFORMATION 7.1. Each party will:-

  • Availability of Information To make DHCS PI and PII available to the DHCS and/or 15 COUNTY for purposes of oversight, inspection, amendment, and response to requests for records, 16 injunctions, judgments, and orders for production of DHCS PI and PII. If CONTRACTOR receives 17 DHCS PII, upon request by COUNTY and/or DHCS, CONTRACTOR shall provide COUNTY and/or 18 DHCS with a list of all employees, contractors and agents who have access to DHCS PII, including 19 employees, contractors and agents of its subcontractors and agents.

  • Security of Information Unless otherwise specifically authorized by the DOH Chief Information Security Officer, Contractor receiving confidential information under this contract assures that: • Encryption is selected and applied using industry standard algorithms validated by the National Institute of Standards and Technology (NIST) Cryptographic Algorithm Validation Program against all information stored locally and off-site. Information must be encrypted both in-transit and at rest and applied in such a way that it renders data unusable to anyone but authorized personnel, and the confidential process, encryption key or other means to decipher the information is protected from unauthorized access. • It is compliant with the applicable provisions of the Washington State Office of the Chief Information Officer (OCIO) policy 141, Securing Information Technology Assets, available at: xxxxx://xxxx.xx.xxx/policy/securing-information-technology-assets. • It will provide DOH copies of its IT security policies, practices and procedures upon the request of the DOH Chief Information Security Officer. • DOH may at any time conduct an audit of the Contractor’s security practices and/or infrastructure to assure compliance with the security requirements of this contract. • It has implemented physical, electronic and administrative safeguards that are consistent with OCIO security standard 141.10 and ISB IT guidelines to prevent unauthorized access, use, modification or disclosure of DOH Confidential Information in any form. This includes, but is not limited to, restricting access to specifically authorized individuals and services through the use of: o Documented access authorization and change control procedures; o Card key systems that restrict, monitor and log access; o Locked racks for the storage of servers that contain Confidential Information or use AES encryption (key lengths of 256 bits or greater) to protect confidential data at rest, standard algorithms validated by the National Institute of Standards and Technology (NIST) Cryptographic Algorithm Validation Program (CMVP); o Documented patch management practices that assure all network systems are running critical security updates within 6 days of release when the exploit is in the wild, and within 30 days of release for all others; o Documented anti-virus strategies that assure all systems are running the most current anti-virus signatures within 1 day of release; o Complex passwords that are systematically enforced and password expiration not to exceed 120 days, dependent user authentication types as defined in OCIO security standards; o Strong multi-factor authentication mechanisms that assure the identity of individuals who access Confidential Information; o Account lock-out after 5 failed authentication attempts for a minimum of 15 minutes, or for Confidential Information, until administrator reset; o AES encryption (using key lengths 128 bits or greater) session for all data transmissions, standard algorithms validated by NIST CMVP; o Firewall rules and network address translation that isolate database servers from web servers and public networks; o Regular review of firewall rules and configurations to assure compliance with authorization and change control procedures; o Log management and intrusion detection/prevention systems; o A documented and tested incident response plan Any breach of this clause may result in termination of the contract and the demand for return of all personal information.

Time is Money Join Law Insider Premium to draft better contracts faster.