Information Systems Acquisition Development and Maintenance Sample Clauses

Information Systems Acquisition Development and Maintenance a. Client Data – Client Data will only be used by State Street for the purposes specified in this Agreement.
AutoNDA by SimpleDocs
Information Systems Acquisition Development and Maintenance. Security of System Files. To protect City Information Processing Systems and system files containing information, Service Provider will ensure that access to source code is restricted to authorized users whose specific job function necessitates such access.
Information Systems Acquisition Development and Maintenance. Product features are managed through a formalized product management process. Security requirements are discussed and formulated during scoping and design discussions. ● XxxXxxx maintains a QA Department dedicated to reviewing and testing application functionality and stability. ● Application source code is stored in a central repository. Access to source code is limited to authorized individuals. ● Changes to MaxMind software are tested before production deployment. Deployment processes include unit testing at the source environment, as well as integration and functional testing within a test environment prior to implementation in production.
Information Systems Acquisition Development and Maintenance. 8.1. The Manufacturer must implement appropriate procedures to validate input data and to detect data corruption. 8.2. The Manufacturer must implement and update baseline security configurations for its Information Systems in accordance with industry best practices. 8.3. The Manufacturer must maintain written documentation of its ownership of all software licenses, master disks and manuals used to support the Services. The Manufacturer must take all commercially reasonable steps to ensure that all software used to support the Services is kept up to date (at least N-1) and is supported by the software vendor. 8.4. The Manufacturer must ensure that no Altria Data containing Highly Confidential, Personal Information or Ultra Trade Secret Information is stored in a non-production environment.
Information Systems Acquisition Development and Maintenance. (a) Fund Data – Fund Data shall only be used by State Street for the purposes specified in the Existing Agreement.
Information Systems Acquisition Development and Maintenance. 12.1. Input Data Validation. Supplier shall apply checks to the input of business transactions, standing data, parameter tables and Buyer’s data into applications and databases when system development is being performed to ensure that data is correct and appropriate.
Information Systems Acquisition Development and Maintenance. 9.1 NOT USED 9.2 The Contractor shall perform monitoring, security information and event correlation of: 9.2.1 the Service Audit Trails and Security Audit Trails; 9.2.2 Security Logs from all devices used in connection with the provision of the Services; and
AutoNDA by SimpleDocs
Information Systems Acquisition Development and Maintenance. 9.1. Continuous Monitoring - Information resources will be used to identify and maintain awareness of relevant technical vulnerabilities. 9.2. Periodic Maintenance - WFS will schedule, perform, and document routine preventative maintenance on the components of the information system in accordance with manufacturer or vendor specifications and/or agreed to Customer requirements.
Information Systems Acquisition Development and Maintenance. As shown in the above Data Access and Storage matrix, AvePoint employees do not have access to Customer Data. If applicable (e.g. for AvePoint’s Cloud Backup product), Customer Data will be processed by the AvePoint application solely for the purposes specified in each applicable agreement with a customer. Additionally, the following shall apply: • No customer production data is used for any other purpose (e.g., QA testing, development testing, User Acceptance Test areas (UAT), training, demonstration, etc.). • The production environment is a separate environment from any other non- production environment (e.g., development, UAT, etc.).
Information Systems Acquisition Development and Maintenance. Contractor shall utilize a comprehensive application security program to help ensure that external high-risk applications are consistent with industry security requirements. This should include full application compliance testing and software development reviews.
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!