{"component": "clause", "props": {"groups": [{"snippet_links": [{"key": "where-applicable", "type": "clause", "offset": [3, 19]}, {"key": "secure-development", "type": "clause", "offset": [59, 77]}, {"key": "system-in-place", "type": "definition", "offset": [88, 103]}, {"key": "consistent-with", "type": "clause", "offset": [104, 119]}, {"key": "industry-standard-best-practices", "type": "definition", "offset": [120, 152]}, {"key": "regular-updates", "type": "clause", "offset": [246, 261]}, {"key": "application-code", "type": "definition", "offset": [370, 386]}, {"key": "prior-to", "type": "definition", "offset": [425, 433]}, {"key": "the-application", "type": "clause", "offset": [534, 549]}, {"key": "development-manager", "type": "clause", "offset": [565, 584]}, {"key": "of-contractor", "type": "clause", "offset": [585, 598]}, {"key": "in-writing", "type": "clause", "offset": [612, 622]}, {"key": "security-review", "type": "definition", "offset": [641, 656]}, {"key": "all-risks", "type": "definition", "offset": [685, 694]}, {"key": "for-further-information", "type": "clause", "offset": [732, 755]}, {"key": "national-institute-of-standards-and-technology", "type": "definition", "offset": [770, 816]}, {"key": "revision-2", "type": "definition", "offset": [853, 863]}, {"key": "protected-information", "type": "clause", "offset": [892, 913]}, {"key": "respond-to", "type": "definition", "offset": [919, 929]}, {"key": "professional-manner", "type": "clause", "offset": [1008, 1027]}, {"key": "the-contractor-must", "type": "clause", "offset": [1029, 1048]}, {"key": "notify-the", "type": "clause", "offset": [1049, 1059]}, {"key": "hours-of", "type": "clause", "offset": [1074, 1082]}, {"key": "potential-risk", "type": "definition", "offset": [1169, 1183]}, {"key": "the-contractor-shall", "type": "clause", "offset": [1214, 1234]}, {"key": "notification-to", "type": "clause", "offset": [1244, 1259]}], "samples": [{"hash": "4uyu2L5sWjz", "uri": "/contracts/4uyu2L5sWjz#application-development", "label": "Non Disclosure / Data Processing Agreement", "score": 34.2345199585, "published": true}, {"hash": "j5KApo8cYy4", "uri": "/contracts/j5KApo8cYy4#application-development", "label": "Non Disclosure / Data Processing Agreement", "score": 29.7243061066, "published": true}, {"hash": "3n6oswgKIVp", "uri": "/contracts/3n6oswgKIVp#application-development", "label": "Non Disclosure/Data Processing Agreement", "score": 22.408624649, "published": true}], "size": 3, "snippet": "A. Where applicable, Contractor shall have a comprehensive secure development lifecycle System in place consistent with industry standard best practices, including policies, training, audits, testing, emergency updates, proactive management, and regular updates to the secure development lifecycle System itself.\nB. Where applicable, Contractor must review and test all application code for security weaknesses and backdoors prior to deployment with DOE. All high\u2010risk findings and exploitable vulnerabilities must be resolved before the Application is released. A development manager of Contractor must certify in writing to the DOE that a security review has been conducted and that all risks are acceptable before every release. For further information, please refer National Institute of Standards and Technology (\u201cNIST\u201d) Special Publication 800\u201064 Revision 2.\nC. Contractors that handle Protected Information must respond to and resolve security\u2010related reports, inquiries and incidents in a timely and professional manner. The Contractor must notify the DOE within 24 hours of when Contractor becomes aware of any such incident or suspected incident that poses a potential risk to the Protected Information. The Contractor shall send the notification to \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587@\u2587\u2587\u2587\u2587\u2587\u2587\u2587.\u2587\u2587\u2587.\u2587\u2587\u2587.", "hash": "b7f71a8360260a99b8a546581029676f", "id": 2}, {"snippet_links": [{"key": "security-precautions", "type": "clause", "offset": [77, 97]}, {"key": "individual-users", "type": "clause", "offset": [146, 162]}, {"key": "not-store", "type": "definition", "offset": [197, 206]}, {"key": "the-network", "type": "definition", "offset": [328, 339]}, {"key": "provide-for", "type": "clause", "offset": [362, 373]}, {"key": "functions-of", "type": "clause", "offset": [441, 453]}], "samples": [{"hash": "4lciP0phJOE", "uri": "/contracts/4lciP0phJOE#application-development", "label": "Data Privacy Agreement", "score": 32.5872764587, "published": true}], "size": 2, "snippet": "Application developers must ensure that their programs contain the following security precautions:\n1. Applications must support authentication of individual users, not groups.\n2. Applications must not store passwords in clear text or in any easily reversible form.\n3. Applications must not transmit passwords in clear text over the network.\n4. Applications must provide for some sort of role management, such that one user can take over the functions of another without having to know the other's password.", "hash": "69d52b523326d61c77a0a5ac9d286e53", "id": 9}, {"snippet_links": [{"key": "the-application", "type": "clause", "offset": [0, 15]}, {"key": "implement-safeguards", "type": "clause", "offset": [116, 136]}, {"key": "the-data", "type": "clause", "offset": [228, 236]}, {"key": "least-privilege", "type": "definition", "offset": [248, 263]}, {"key": "essential-information", "type": "definition", "offset": [409, 430]}, {"key": "error-handling", "type": "clause", "offset": [438, 452]}, {"key": "log-data", "type": "definition", "offset": [456, 464]}, {"key": "success-and-failure", "type": "clause", "offset": [501, 520]}, {"key": "audit-trail", "type": "clause", "offset": [524, 535]}, {"key": "investigative-requirements", "type": "clause", "offset": [536, 562]}, {"key": "where-appropriate", "type": "definition", "offset": [632, 649]}, {"key": "security-controls", "type": "clause", "offset": [662, 679]}, {"key": "access-controls", "type": "definition", "offset": [691, 706]}, {"key": "error-messages", "type": "clause", "offset": [854, 868]}, {"key": "provide-information", "type": "clause", "offset": [880, 899]}, {"key": "unauthorized-access", "type": "definition", "offset": [927, 946]}, {"key": "test-data", "type": "definition", "offset": [950, 959]}], "samples": [{"hash": "acWjA7kCFzO", "uri": "/contracts/acWjA7kCFzO#application-development", "label": "Data Processing and Security Agreement", "score": 33.5590438843, "published": true}, {"hash": "jsnPpTJXxtF", "uri": "/contracts/jsnPpTJXxtF#application-development", "label": "Data Processing and Security Agreement", "score": 27.2806301117, "published": true}], "size": 2, "snippet": "The application and associated databases must validate all input fields for positive and negative bounds defined. \u2022 Implement safeguards against attacks (e.g., sniffing, password cracking, defacing, backdoor exploits) \u2022 Protect the data by using a least privilege and a defense-in-depth layered strategy tocompartmentalize the data. \u2022 Handle errors and faults by always failing securely without providing non-essential information during error handling. \u2022 Log data to support general troubleshooting, success and failure of audit trail investigative requirements, andregulatory requirements, with support for centralized monitoring where appropriate. \u2022 Built-in security controls \u2013 built-in access controls, security auditing features, fail- overfeatures, etc. \u2022 Prevent buffer overflows. \u2022 Avoid arithmetic errors. \u2022 Implement an error handling scheme. Error messages should not provide information that could be used to gain unauthorized access. \u2022 Test data used during development must be non-production simulated data. \u2022 Implement protocols (TCP/IP, HTTP, etc.) without deviation from standards.", "hash": "429a161a123370024e157fd64ab5c9d7", "id": 6}, {"snippet_links": [{"key": "data-exports", "type": "clause", "offset": [0, 12]}, {"key": "maintenance-plans", "type": "clause", "offset": [14, 31]}, {"key": "data-cleansing", "type": "definition", "offset": [37, 51]}, {"key": "configuration-management", "type": "definition", "offset": [53, 77]}, {"key": "change-management", "type": "definition", "offset": [79, 96]}, {"key": "release-management", "type": "definition", "offset": [98, 116]}, {"key": "problem-management", "type": "definition", "offset": [118, 136]}], "samples": [{"hash": "iXIgqH0cyr", "uri": "/contracts/iXIgqH0cyr#application-development", "label": "Section 75 Agreement", "score": 24.1704311371, "published": true}, {"hash": "b8yVTK8to5s", "uri": "/contracts/b8yVTK8to5s#application-development", "label": "Section 75 Agreement", "score": 23.2929496765, "published": true}], "size": 2, "snippet": "Data exports; Maintenance plans Inc. Data Cleansing; Configuration Management; Change Management; Release Management; Problem Management; Process Design; forms; documents; templates; alerts; optional settings; tray management.", "hash": "f89676fc1d6df2994aa878a52d03c0bf", "id": 5}, {"snippet_links": [{"key": "contractor-agrees", "type": "clause", "offset": [0, 17]}, {"key": "engage-in-any", "type": "definition", "offset": [35, 48]}, {"key": "the-provisions-of", "type": "clause", "offset": [126, 143]}, {"key": "general-conditions", "type": "clause", "offset": [150, 168]}, {"key": "exhibit-b", "type": "definition", "offset": [173, 182]}], "samples": [{"hash": "aRB2cgHa93E", "uri": "/contracts/aRB2cgHa93E#application-development", "label": "Contract", "score": 26.9154510498, "published": true}, {"hash": "1PWl8hpq4pR", "uri": "/contracts/1PWl8hpq4pR#application-development", "label": "Contract", "score": 26.0358963013, "published": true}, {"hash": "iWQwy5SS19t", "uri": "/contracts/iWQwy5SS19t#application-development", "label": "Contract", "score": 25.7918491364, "published": true}], "size": 4, "snippet": "Contractor agrees that it will not engage in any application development without or until it has demonstrated compliance with the provisions of these General Conditions and Exhibit B and Exhibit C.", "hash": "86cf0da584d0931681a0816a576670db", "id": 1}, {"snippet_links": [{"key": "contractor-must", "type": "clause", "offset": [0, 15]}, {"key": "develop-and-implement", "type": "clause", "offset": [133, 154]}, {"key": "web-services", "type": "clause", "offset": [155, 167]}, {"key": "access-tools", "type": "definition", "offset": [182, 194]}, {"key": "agency-data", "type": "definition", "offset": [282, 293]}, {"key": "usability-testing", "type": "clause", "offset": [321, 338]}, {"key": "source-code", "type": "clause", "offset": [390, 401]}, {"key": "by-the-state", "type": "clause", "offset": [450, 462]}, {"key": "and-maintenance", "type": "clause", "offset": [494, 509]}, {"key": "additional-deliverables", "type": "clause", "offset": [539, 562]}, {"key": "statement-of-work", "type": "definition", "offset": [584, 601]}, {"key": "ada-compliance", "type": "definition", "offset": [634, 648]}, {"key": "acceptance-criteria", "type": "definition", "offset": [661, 680]}, {"key": "document-deliverables", "type": "definition", "offset": [685, 706]}, {"key": "software-deliverables", "type": "definition", "offset": [711, 732]}, {"key": "compliance-with-the", "type": "clause", "offset": [791, 810]}, {"key": "section-508", "type": "definition", "offset": [811, 822]}, {"key": "rehabilitation-act", "type": "definition", "offset": [830, 848]}, {"key": "as-amended", "type": "definition", "offset": [866, 876]}, {"key": "workforce-investment-act-of-1998", "type": "definition", "offset": [884, 916]}, {"key": "web-content-accessibility-guidelines", "type": "definition", "offset": [931, 967]}, {"key": "delivery-of", "type": "clause", "offset": [990, 1001]}, {"key": "necessary-for", "type": "definition", "offset": [1053, 1066]}, {"key": "implementation-and-support", "type": "clause", "offset": [1078, 1104]}, {"key": "web-applications", "type": "definition", "offset": [1131, 1147]}, {"key": "enterprise-architecture", "type": "definition", "offset": [1175, 1198]}, {"key": "user-experience", "type": "definition", "offset": [1327, 1342]}], "samples": [{"hash": "50txMksu5Tb", "uri": "/contracts/50txMksu5Tb#application-development", "label": "Custom Software Development Contract", "score": 26.1704311371, "published": true}], "size": 2, "snippet": "Contractor must utilize State technology stack to complete development.\n1. Development for RMA or mobile friendly web application\n2. Develop and implement web services or other data access tools necessary to accurately, efficiently, and securely access and/or update approved State agency data.\n3. Unit, integration, and usability testing for RMA or mobile friendly web application.\n4. All source code must be provided to the State and will be owned by the State for modification, enhancement, and maintenance. \uf0b7 Documented source code. \uf0b7 Additional deliverables to be defined in the Statement of Work. \uf0b7 Complete self-assessment for ADA compliance. High-level acceptance criteria for Document Deliverables and Software Deliverables are listed in Section 1.501. \uf0b7 Review and verification of compliance with the Section 508 of the Rehabilitation Act (29 U.S.C. 794d) as amended by the Workforce Investment Act of 1998, specifically Web Content Accessibility Guidelines (WCAG) 2.0AA. WCAG. \uf0b7 Delivery of working source code \uf0b7 Verification of all IT tools necessary for production implementation and support of RMA or mobile friendly web applications are listed on the attached Enterprise Architecture Solution Assessment or approved through the MCOE. \uf0b7 Verification of adherence to DTMB standards for technology tools, security, user experience, branding, testing, and deployment of RMA and mobile friendly web applications. \uf0b7 Specific acceptance criteria to be outlined in each SOW.", "hash": "5ad32ad9eb41752980cc265ac8bd6b9e", "id": 10}, {"snippet_links": [{"key": "software-provided", "type": "clause", "offset": [60, 77]}, {"key": "the-service", "type": "definition", "offset": [81, 92]}, {"key": "secure-coding-practices", "type": "definition", "offset": [112, 135]}, {"key": "the-open", "type": "clause", "offset": [162, 170]}, {"key": "security-project", "type": "definition", "offset": [187, 203]}, {"key": "security-checks", "type": "clause", "offset": [311, 326]}, {"key": "the-development", "type": "clause", "offset": [379, 394]}, {"key": "of-activities", "type": "clause", "offset": [437, 450]}, {"key": "for-example", "type": "definition", "offset": [475, 486]}, {"key": "not-limited", "type": "clause", "offset": [491, 502]}, {"key": "web-server", "type": "clause", "offset": [506, 516]}, {"key": "provider-system", "type": "definition", "offset": [691, 706]}, {"key": "own-cost", "type": "clause", "offset": [812, 820]}, {"key": "independent-application", "type": "clause", "offset": [835, 858]}, {"key": "services-provided", "type": "definition", "offset": [904, 921]}, {"key": "customer-group-company", "type": "definition", "offset": [929, 951]}, {"key": "evidence-of", "type": "definition", "offset": [1015, 1026]}, {"key": "independent-testing", "type": "clause", "offset": [1027, 1046]}, {"key": "in-writing", "type": "clause", "offset": [1077, 1087]}, {"key": "vulnerability-scans", "type": "clause", "offset": [1092, 1111]}, {"key": "security-patches", "type": "definition", "offset": [1184, 1200]}, {"key": "within-thirty", "type": "clause", "offset": [1201, 1214]}, {"key": "the-vendor", "type": "definition", "offset": [1228, 1238]}, {"key": "release-date", "type": "definition", "offset": [1241, 1253]}], "samples": [{"hash": "cRzfBYknXZX", "uri": "/contracts/cRzfBYknXZX#application-development", "label": "Data Processing Agreement", "score": 27.5037651062, "published": true}, {"hash": "ckz7TNYh1XV", "uri": "/contracts/ckz7TNYh1XV#application-development", "label": "Data Processing Agreement", "score": 27.2566738129, "published": true}, {"hash": "gfV8TVNmOoz", "uri": "/contracts/gfV8TVNmOoz#application-development", "label": "Data Processing Agreement", "score": 26.5133476257, "published": true}], "size": 3, "snippet": "a. Stack provides software as a solution. In developing the software provided as the Service, Stack shall adopt secure coding practices that address at a minimum the Open Web Application Security Project (OWASP) top ten vulnerabilities.\nb. Stack will have documented policies and/or processes identifying where security checks, and the associated methods, are applied throughout the development lifecycle.\nc. Stack will ensure that logs of activities on customer interfaces (for example but not limited to web server and database logs) and IT admin activity logs, both at server and GUI level, are logged remotely from the servers themselves (if the Service is hosted on Stack\u2019s third-party provider system). The logs will be retained as per \u2587\u2587\u2587\u2587\u2587\u2019s retention policies.\nd. At least annually, Stack shall, at its own cost, undertake an independent application and/or infrastructure penetration testing of Services provided to the Customer Group Company using an internationally recognised methodology such as OWASP. Evidence of independent testing can be provided, if requested in writing.\ne. Vulnerability scans shall be performed at least quarterly. Stack shall install (a) critical security patches within thirty (30) days of the vendor\u2019s release date; and (b) non-critical security patches within ninety (90) days of the vendor\u2019s release date.", "hash": "06a79be501835cd73fe22fd208a113d3", "id": 3}, {"snippet_links": [{"key": "the-application", "type": "clause", "offset": [2, 17]}, {"key": "implement-safeguards", "type": "clause", "offset": [70, 90]}, {"key": "the-data", "type": "clause", "offset": [181, 189]}, {"key": "least-privilege", "type": "definition", "offset": [201, 216]}, {"key": "essential-information", "type": "definition", "offset": [363, 384]}, {"key": "error-handling", "type": "clause", "offset": [392, 406]}, {"key": "log-data", "type": "definition", "offset": [410, 418]}, {"key": "audit-trail", "type": "clause", "offset": [455, 466]}, {"key": "investigative-requirements", "type": "clause", "offset": [467, 493]}, {"key": "regulatory-requirements", "type": "definition", "offset": [499, 522]}, {"key": "where-appropriate", "type": "definition", "offset": [564, 581]}, {"key": "security-controls", "type": "clause", "offset": [594, 611]}, {"key": "access-controls", "type": "definition", "offset": [623, 638]}, {"key": "error-messages", "type": "clause", "offset": [786, 800]}, {"key": "provide-information", "type": "clause", "offset": [812, 831]}, {"key": "unauthorized-access", "type": "definition", "offset": [859, 878]}, {"key": "test-data", "type": "definition", "offset": [882, 891]}], "samples": [{"hash": "3nUx54q7fgn", "uri": "/contracts/3nUx54q7fgn#application-development", "label": "Data Processing and Security Agreement", "score": 32.2998085022, "published": true}], "size": 2, "snippet": "\u25aa The application and associated databases must validate all input. \u25aa Implement safeguards against attacks (e.g. sniffing, password cracking, defacing, backdoor exploits) \u25aa Protect the data by using a least privilege and a defense-in-depth layered strategy to compartmentalize the data. \u25aa Handle errors and faults by always failing securely without providing non-essential information during error handling. \u25aa Log data to support general troubleshooting, audit trail investigative requirements, and regulatory requirements, with support for centralized monitoring where appropriate. \u25aa Built-in security controls \u2013 built-in access controls, security auditing features, fail-over features, etc. \u25aa Prevent buffer overflows. \u25aa Avoid arithmetic errors. \u25aa Implement an error handling scheme. Error messages should not provide information that could be used to gain unauthorized access. \u25aa Test data used during development must be non-production simulated data. \u25aa Implement protocols (TCP/IP, HTTP, etc.) without deviation from standards.", "hash": "bda4a717a92671d54b4cde796fa43ed6", "id": 7}, {"snippet_links": [{"key": "development-of", "type": "clause", "offset": [31, 45]}, {"key": "new-applications", "type": "clause", "offset": [46, 62]}, {"key": "application-maintenance-and-support", "type": "clause", "offset": [192, 227]}, {"key": "legacy-systems", "type": "definition", "offset": [312, 326]}, {"key": "production-environment", "type": "definition", "offset": [370, 392]}, {"key": "software-applications", "type": "definition", "offset": [460, 481]}, {"key": "business-needs", "type": "clause", "offset": [503, 517]}, {"key": "the-applications", "type": "clause", "offset": [636, 652]}, {"key": "and-documentation", "type": "clause", "offset": [833, 850]}], "samples": [{"hash": "8IMs5zpLtkP", "uri": "/contracts/8IMs5zpLtkP#application-development", "label": "Master Services Agreement", "score": 33.1506576538, "published": true}, {"hash": "7bhfaLcUMF8", "uri": "/contracts/7bhfaLcUMF8#application-development", "label": "Master Services Agreement", "score": 33.1111297607, "published": true}], "size": 2, "snippet": "Application Development is the development of new applications which may be server, network-based, cloud-based, web-based or a combination and may require interfaces to existing applications. Application Maintenance and Support includes troubleshooting, modifying, maintaining, improving security, and enhancing legacy systems and applications which may be running in a production environment. Examples may include: Designing, developing, and deploying custom software applications to meet our specific business needs. Creating user-friendly interfaces and intuitive user experiences. Ensuring scalability, performance, and security of the applications. Utilizing modern development frameworks and technologies. Enhancing and maintaining existing applications to meet evolving business needs. Conducting thorough testing, debugging, and documentation of applications.", "hash": "79eb675178a3e5b34565e0467886e5c4", "id": 4}, {"snippet_links": [{"key": "development-of", "type": "clause", "offset": [31, 45]}, {"key": "new-applications", "type": "clause", "offset": [46, 62]}, {"key": "application-maintenance-and-support", "type": "clause", "offset": [192, 227]}, {"key": "legacy-systems", "type": "definition", "offset": [312, 326]}, {"key": "production-environment", "type": "definition", "offset": [370, 392]}, {"key": "software-applications", "type": "definition", "offset": [462, 483]}, {"key": "business-needs", "type": "clause", "offset": [505, 519]}, {"key": "the-applications", "type": "clause", "offset": [642, 658]}, {"key": "and-documentation", "type": "clause", "offset": [845, 862]}, {"key": "services-for", "type": "clause", "offset": [1240, 1252]}, {"key": "to-ensure", "type": "clause", "offset": [1329, 1338]}, {"key": "response-and-resolution", "type": "clause", "offset": [1378, 1401]}, {"key": "bug-fixes", "type": "definition", "offset": [1466, 1475]}, {"key": "industry-best-practices", "type": "definition", "offset": [1597, 1620]}, {"key": "measures-to", "type": "clause", "offset": [1635, 1646]}], "samples": [{"hash": "hLd8JcV26jC", "uri": "/contracts/hLd8JcV26jC#application-development", "label": "Master Services Agreement", "score": 33.0618591309, "published": true}], "size": 2, "snippet": "Application Development is the development of new applications which may be server, network-based, cloud-based, web-based or a combination and may require interfaces to existing applications. Application Maintenance and Support includes troubleshooting, modifying, maintaining, improving security, and enhancing legacy systems and applications which may be running in a production environment. Examples may include: \u2022 Designing, developing, and deploying custom software applications to meet our specific business needs. \u2022 Creating user-friendly interfaces and intuitive user experiences. \u2022 Ensuring scalability, performance, and security of the applications. \u2022 Utilizing modern development frameworks and technologies. \u2022 Enhancing and maintaining existing applications to meet evolving business needs. \u2022 Conducting thorough testing, debugging, and documentation of applications. Doc2u.SignAEpnpvelilocpaetiIDon: 5MC14a4inA6teBn-BaCn4cDe-4a7n37d-8S9Eu 9p-p74o4r5tE\u201328A85p3pBl3ication Maintenance and Support includes troubleshooting, modifying, maintaining, improving security, and enhancing legacy systems and applications which may be running in a production environment. Examples may include: \u2022 Providing ongoing maintenance and support services for our existing applications. \u2022 Conducting regular monitoring and enhancements to ensure optimal performance. \u2022 Offering timely response and resolution to reported issues and incidents. \u2022 Performing routine updates, bug fixes, and troubleshooting. \u2022 Ensuring the availability, responsiveness, performance, and security of applications. \u2022 Applying industry best practices and proactive measures to minimize downtime.", "hash": "8dae43401b456d8ce91b6ba16b5da55c", "id": 8}], "next_curs": "CmASWmoVc35sYXdpbnNpZGVyY29udHJhY3RzcjwLEhZDbGF1c2VTbmlwcGV0R3JvdXBfdjU2IiBhcHBsaWNhdGlvbi1kZXZlbG9wbWVudCMwMDAwMDAwYQyiAQJlbhgAIAA=", "clause": {"title": "Application Development", "size": 61, "parents": [["additional-requirements", "Additional Requirements"], ["use-of-pge-data", "Use of Pge Data"], ["domestic-preference", "Domestic Preference"], ["survival", "SURVIVAL"], ["subcontracts", "SUBCONTRACTS"]], "children": [["additional-application-development", "Additional Application Development"], ["application-development", "Application Development"], ["reduction-to-ad-fte-baseline", "Reduction to AD FTE Baseline"], ["ad-fte-consumption", "AD FTE Consumption"], ["services-to-be-provided", "Services to be Provided"]], "id": "application-development", "related": [["design-development", "Design Development", "Design Development"], ["job-family-applications-development", "JOB FAMILY: APPLICATIONS DEVELOPMENT\u200c", "JOB FAMILY: APPLICATIONS DEVELOPMENT\u200c"], ["program-development", "Program Development", "Program Development"], ["staff-development", "Staff Development", "Staff Development"], ["information-systems-acquisition-development-and-maintenance", "Information Systems Acquisition Development and Maintenance", "Information Systems Acquisition Development and Maintenance"]], "related_snippets": [], "updated": "2025-07-15T00:51:33+00:00"}, "json": true, "cursor": ""}}