Information Technology (IT Clause Samples

The Information Technology (IT) clause defines the responsibilities and requirements related to the use, management, and security of technology systems within an agreement. It typically outlines standards for data protection, software usage, and access controls, and may specify obligations for maintaining system integrity or reporting breaches. This clause ensures that both parties understand their roles in safeguarding IT resources, thereby reducing the risk of data loss, unauthorized access, or technology-related disputes.
Information Technology (IT. Security
Information Technology (IT. CLASSIFICATIONS Page 23 of 73 CATEGORY A: *IT = means Information Technology Page 24 of 73 Payment – Invoicing Instructions: The Contractor will provide an invoice on the Contractor’s letterhead for services rendered. Invoices must be submitted to address indicated in the Subordinate Contract created by the individual agency/department. Each invoice must have a unique number and must include the following information: a) Contractor’s name and address; b) Contractor’s remittance address; c) Contractor’s Federal Tax I.D. Number; d) Name of County Agency/Department; e) Delivery/Service address; f) DO Number/Subordinate Agreement Number g) Date of order/services rendered; h) Service description, # hours, and hourly rate(s) i) Total 1. Billing shall cover services not previously invoiced. The Contractor shall reimburse the County for any monies paid to the Contractor for services not provided or when services do not meet the Contract requirements. 2. Payments made by the County shall not preclude the right of the County from thereafter disputing any services involved or billed under this Contract and shall not be construed as acceptance of any part of the services.
Information Technology (IT. SCI runs its IT group centrally, allowing for specialists (programmers, help-desk, system administrators, etc.) to perform services at all Hotel/Casinos. This centralization and allocation eliminates the need for each Hotel/Casino to hire specialists and purchase related equipment. Direct costs, such as maintenance or service agreements for on- property equipment, are billed directly to the applicable Hotel/Casinos. Indirect costs (primarily payroll and related benefits costs) are allocated to the Hotel/Casinos based upon percentage of total revenue.
Information Technology (IT. IT provides oversight of the Parties’ technology plans. This includes strategic planning, system standardization and information security, as well as management of the Subsidiaries’ IT managers. The expense reimbursement methodology is based on estimated costs incurred by the applicable Party.
Information Technology (IT. All aspects of technology used to develop, transfer and store information and data including but not limited to Products, software, IT systems, networks, Internet-enabled applications, cloud applications used by them and common IT interfaces.
Information Technology (IT. All electronic information-processing hardware and software, including: (a) maintenance; (b) telecommunications; and (c) associated consulting services.
Information Technology (IT. 41 The symbols indicating the right to sign urban planning documents are defined in the Regulation on the organization and operation of the Romanian Register of Urban Planners (cf. Decision 101/2010 of the RUR Scientific Council, Annex 2, Article 16, § 11 (5). The correspondence between the symbols used in the 2006 Regulation and those in the 2010 Regulation is available at: ▇▇▇▇▇://▇▇▇.▇▇/2Ihwl48 [29 September 2023 08:57:22]. 42 Cf. MO no. 2701/2010 and MO no. 233/2016, as consolidated up to 29 September 2023 08:57:22. 43 Decision 101/2010 of the RUR Scientific Council, Annex 1, Article 11, § 1 (a). 44 The words "or equivalent" must be read in accordance with Decision 101/2010 of the RUR Scientific Council, Annex 1, Article 6, §§ 4-6. 45 CF. ibid., Annex 1, Article 11, § 2. 46 Cf. MO no. 2701/2010 and MO no. 233/2016, both as consolidated up to 29 September 2023 08:57:22. 47 Cf. Decision 101/2010 of the RUR Scientific Council, Annex 1, Article 12, § 3 (a). 48 CF. ibid., Annex 1, Article 11, § 2. 49 Cf. MO no. 233/2016, in its consolidated form valid on 29 September 2023 08:57:22, Annex 2. 50 Cf. Decision 101/2010 of the RUR Scientific Council, Annex 1, Article 12, § 3 (b). 51 CF. ibid., Annex 1, Article 11, § 2. 52 Cf. MO no. 233/2016, in its consolidated form valid on 29 September 2023 08:57:22, Annex 2. 53 Cf. Decision 101/2010 of the RUR Scientific Council, Annex 1, Article 12, § 3 (c). 54 CF. ibid., Annex 1, Article 11, § 2. 55 Cf. MO no. 233/2016, in its consolidated form valid on 29 September 2023 08:57:22, Annex 2. 56 Cf. Decision 101/2010 of the RUR Scientific Council, Annex 1, Article 12, § 3 (d). 57 CF. ibid., Annex 1, Article 11, § 2. 58 Cf. MO no. 233/2016, in its consolidated form valid on 29 September 2023 08:57:22, Annex 2. 59 Cf. Decision 101/2010 of the RUR Scientific Council, Annex 1, Article 12, § 3 (e). 60 CF. ibid., Annex 1, Article 11, § 2. 61 Cf. MO no. 562/2003, in its updated form valid on 29 September 2023 08:57:22, Annex. 62 Cf. MO no. 233/2016, in its consolidated form valid on 29 September 2023 08:57:22, Annex 2. 63 Cf. Decision 101/2010 of the RUR Scientific Council, Annex 1, Article 12, § 3 (f). 64 CF. ibid., Annex 1, Article 11, § 2. 65 Cf. MO no. 233/2016, in its consolidated form valid on 29 September 2023 08:57:22, Annex 2. 66 Cf. Decision 101/2010 of the RUR Scientific Council, Annex 1, Article 12, § 3 (g). 67 CF. ibid., Annex 1, Article 11, § 2. 68 Cf. MO no. 233/2016, in its consolidated form valid on 29 September 202...
Information Technology (IT. Security 1.9 Lidská práva Zdravotnické zařízení bude respektovat práva svých zaměstnanců na svobodu sdružování a prohlašuje a zaručuje se podle svého nejlepšího vědomí, že v souvislosti s touto Smlouvou respektuje lidská práva svých zaměstnanců a nevyužívá dětskou práci, nucenou práci, nebezpečné pracovní podmínky, neuplatňuje diskriminaci na základě chráněných charakteristik ani kruté nebo hrubé disciplinární postupy na pracovišti, a že vyplácí každému zaměstnanci alespoň minimální mzdu, poskytuje každému zaměstnanci všechny zákonem stanovené výhody a dodržuje platné zákony o pracovní době a zaměstnaneckých právech v zemích, kde působí. Zdravotnické zařízení bude respektovat práva svých zaměstnanců na svobodu sdružování a bude k dodržování těchto norem také nabádat všechny případné dodavatele zboží nebo služeb, které využívá při plnění svých povinností ze Smlouvy.
Information Technology (IT. The facilities are supported by some of the most advanced technologies available. To stay ahead of its class, BCCK employs the best in advanced technology for its infrastructure and equipment. • category 6 cabling throughout • under-floor trunking system • wireless LAN – 802.11 a, b & g • telecommunication and multimedia facilities • digital audiovisual facilities Among the cutting edge technologies that could contribute to successful events: • high speed internet connectivity (wired or wireless) • extensive LAN setup • digital voice communication via IP networkVideo conferencing facilities and more. Our team comprises of experience technical, to offer clients: • Onsite support for all those last minute requirements • Pre and post production facilitiesEquipment hire - every size and scale • Reliable access and scalable Internet access • Wide coverage of wireless and wireless networking points throughout the Centre • Dedicated IT coordinator • IT specialists who provide computer and network hire with on-site support • Gigabit Fibre Optic Backbone to all areas
Information Technology (IT. Cyber Security Requirements 8.1) All participant information must be protected from cyber-attacks. Safeguards must include computers equipped with antivirus software that receive regular patches and updates from software vendors to correct security problems, improve functionality, and defend against viruses, malware, and other online threats. 8.2) Configure all software (operating system, anti-malware, and applications), to install updates automatically. 8.3) Set antivirus software to run a scan after each update. 8.4) All operating systems must have a firewall enabled or firewall software installed for Internet connection. 8.5) Data must be backed up at least weekly on all computers storing participant information. Data includes email, documents, spreadsheets, databases, financial, human resources, and accounts receivable/payable files. 8.6) All computers and portable devices containing participant information must be stored and locked when not in use and be set for automatic locking after a period of nonuse (e.g., five (5) minutes). 8.7) All mobile devices containing participant information must be password protected and use data encryption and security apps to prevent unauthorized access while the phone is on public networks. 8.8) Ensure Wi-Fi networks are secure, encrypted, and hidden from public access. 8.9) Password protect router access and disable guest Wi-Fi access. 8.10) Use unique passwords and full disk encryption protection. 8.11) Set the operating system to change passwords every three (3) months. 8.12) Use passwords that are at least eight (8) characters, complex, contain a special character like #, $, and a capitalized letter and changed every 90 days. 8.13) Maintain company policies on cyber security. Policies must include: 8.13)1. Penalties for violating company information technology security policies. 8.13)2. Instructions on how to report lost or stolen equipment.