IT STANDARDS Sample Clauses

IT STANDARDS. Any software or hardware provided under this agreement will comply with state standards which can be found at ▇▇▇▇://▇▇▇.▇▇.▇▇▇/standards/.
IT STANDARDS. Any software or hardware provided under this agreement will comply with state standards which can be found at ▇▇▇▇://▇▇▇.▇▇.▇▇▇/standards/. INDEMNIFICATION: Sub-recipient agrees to indemnify the State of South Dakota, its officers, agents, and employees, from and against all claims or proceedings for actions, suits, damages, liabilities, other losses or equitable relief that may arise at least in part as a result of an act or omission in performing services under this Agreement. Sub-recipient shall defend the State of South Dakota, its officers, agents, and employees against any claim, including any claim, action, suit, or other proceeding related to the claim. Sub-recipient’s obligation to indemnify includes the payment of attorney fees and other costs of defense. In defending the State of South Dakota, its officers, agents, and employees, Sub-recipient shall engage other professionals, subject to the written approval of the State which shall not be unreasonably withheld. Notwithstanding the foregoing, the State may, in its sole discretion and at the expense of Sub-recipient, engage attorneys and other professionals to defend the State of South Dakota, its officers, agents, and employees, or to assist Sub-recipient in the defense. This section does not require Sub-recipient to be responsible for or defend against claims or proceedings for damages, liabilities, losses or equitable relief arising solely from errors or omissions of the State, its officers, agents or employees.
IT STANDARDS. The Contractor will comply with and adhere to the following Department and State information technology standards and provide training to Contractor’s employees and subcontractors concerning such standards, procedures and protocols as applicable. (1) Data Backup Standard: Applicable to Contractors which utilize data systems to process, store, transmit or monitor information essential to the performance of Department required services. (2) Data Stewardship Standard: Applicable to Contractors which utilize data systems to process, store, transmit or monitor information essential to the performance of Department required services. (3) Interconnectivity Standard: Applicable to Contractors which utilize data systems to process, store, transmit or monitor information essential to the performance of Department required services. (4) Laptop Data Protection Standard: Applicable to Contractors which utilize laptops to process, store, transmit or monitor data essential to the performance of Department required services or connects to state owned or managed network. (5) Removable Storage Encryption Standard: Applicable to Contractors which utilize removable storage devices to process, store, transmit or monitor information essential to the performance of Department required services. (6) Web Application Security Standard: Applicable to Contractors which develop, manage or utilize state resources including but not limited to websites, data systems, desktop applications and web based services. (7) Website Accessibility Standard: Applicable to Contractors which develop and maintain Department web pages. Current state information technology standards are accessible online at ▇▇▇▇▇://▇▇▇▇.▇▇▇▇.▇▇▇/home/standards.
IT STANDARDS. Any software or hardware provided under this agreement will comply with state standards which can be found at ▇▇▇▇://▇▇▇.▇▇.▇▇▇/standards/. INSURANCE: At all times during the term of this Agreement, Sub-Recipient shall obtain and maintain in force insurance coverage of the types and with the limits as follows:
IT STANDARDS. To maintain the highest level of service and to ensure the Client’s environment meets our minimum standards, CNS will implement specific changes. If any of these minimum requirements are not met, CNS may cancel this agreement or provide services at an hourly rate while trying to resolve issues. For services that are not elected and mutually agreed not to be used an attestation letter will be submitted to Client outlining the associated risks of not using such services and releases of liability from CNS to Client as stated in the Terms. Minimum security standards are subject to change at any time based on new threats and the external security climate. a) At all office locations Client must have or purchase a Firewall Appliance with a Security subscription and continue to pay for the annual security subscription. b) Client must have a current hardware warranty and/or software maintenance support and subscription services on all systems. Client is financially responsible for paying any additional costs that may occur if the hardware, software or service provider imposes a charge to obtain support or parts. c) All workstations and servers must have a CNS agent, DNS filter agent and Endpoint Detection and Response installed. d) Minimum security standards will be implemented, including but not limited to: i) Advanced Firewall Security ii) Windows Critical and Security Updates iii) Endpoint Detection & Response iv) Endpoint Automatic Screen Lock Timer v) Endpoint Disk Encryption
IT STANDARDS. Sub-Recipient warrants that if any software and hardware is developed or purchased for the state it will be in compliance with the BIT Standards including but not limited to the standards for security, file naming conventions, executable module names, Job Control Language, systems software, and systems software release levels, temporary work areas, executable program size, forms management, network access, tape management, hosting requirements, administrative controls, and job stream procedures prior to the installation and acceptance of the final project. BIT standards can be found at ▇▇▇▇://▇▇▇.▇▇.▇▇▇/standards/.
IT STANDARDS. 4.1.1. The Supplier shall ensure that any training is compatible with IT standards of Government departments as specified in the Government Digital Service Standard 10