Information Technology and Security Requirements Clause Samples

POPULAR SAMPLE Copied 3 times
Information Technology and Security Requirements. MOD Corporate Internet Accessibility Policy. JSP 440 - The Defence Manual of Security. JSP 440 is the single MOD reference on Security Policy issued under the Authority of DGS&S. It draws on the Government wider Security Policy guidance produced by the Cabinet Office Security Policy Division. JSP 717 - Using the MOD Metadata Standard. JSP 740 - Acceptable Use Policy for Users of MOD Information Technology and telecommunications networks (MOD IT and Telecoms). JSP 745 - Ministry of Defence Web Publishing Policy. JSP 747 - Information Management Policy and Protocols. ISO/IEC 12207 - Software Life Cycle Systems and software engineering - Software life cycle processes. ISO 90003 - Guidance for the application of ISO 9001 to software. Tasks to be performed under the contract shall be approved by the Projects Team on Task Data Sheets(TDS), copy attached at Annex A ANNEX A TASK DATA FORM CONTRACT CTLBC/2015 Task Number Part 1 – The Requirement Signature Name Post Date Part 2 – Company Proposal Detail (use continuation sheet if necessary) Signature Name Post Date Signature Name Post Date Part 4 – MAA Financial Authority to Proceed Signature Name Post Date Part 5– MAA Commercial Authority to Proceed Signature Name Post Date Part 6 – Vistair Confirmed Actual Expenditure Net Cost VAT Amount Total Invoice Amount Signature Name Post Date Part 7 – MAA Acceptance Signature Name Post Date
Information Technology and Security Requirements. Contractor agrees to perform the work set forth in this Agreement in accordance with the City’s Information Technology and Security Requirements, which are attached hereto as Exhibit G and incorporated herein.
Information Technology and Security Requirements. The requirements below define additional City Information Technology and Security Requirements as they pertain to this Agreement. Contractor shall comply with the following requirements in providing all Information Technology-related software, services, and equipment.

Related to Information Technology and Security Requirements

  • Information Technology The following applies to all contracts for information technology commodities and contractual services. “Information technology” is defined in section 287.012(15), F.S., to have the same meaning as provided in section 282.0041, F.S.

  • Information Technology Accessibility Standards Any information technology related products or services purchased, used or maintained through this Grant must be compatible with the principles and goals contained in the Electronic and Information Technology Accessibility Standards adopted by the Architectural and Transportation Barriers Compliance Board under Section 508 of the federal Rehabilitation Act of 1973 (29 U.S.C. §794d), as amended. The federal Electronic and Information Technology Accessibility Standards can be found at: ▇▇▇▇://▇▇▇.▇▇▇▇▇▇-▇▇▇▇▇.▇▇▇/508.htm.

  • DATA PROTECTION AND SECURITY A. In this Agreement the following terms shall have the meanings respectively ascribed to them:

  • Data Security Requirements Without limiting Contractor’s obligation of confidentiality as further described in this Contract, Contractor must establish, maintain, and enforce a data privacy program and an information and cyber security program, including safety, physical, and technical security and resiliency policies and procedures, that comply with the requirements set forth in this Contract and, to the extent such programs are consistent with and not less protective than the requirements set forth in this Contract and are at least equal to applicable best industry practices and standards (NIST 800-53).

  • Electronic and Information Resources Accessibility and Security Standards a. Applicability: The following Electronic and Information Resources (“EIR”) requirements apply to the Contract because the Grantee performs services that include EIR that the System Agency's employees are required or permitted to access or members of the public are required or permitted to access. This Section does not apply to incidental uses of EIR in the performance of the Agreement, unless the Parties agree that the EIR will become property of the State of Texas or will be used by HHSC’s clients or recipients after completion of the Agreement. Nothing in this section is intended to prescribe the use of particular designs or technologies or to prevent the use of alternative technologies, provided they result in substantially equivalent or greater access to and use of a Product.