{"component": "clause", "props": {"groups": [{"snippet_links": [{"key": "the-system", "type": "definition", "offset": [22, 32]}, {"key": "the-facilities", "type": "clause", "offset": [44, 58]}, {"key": "set-out", "type": "definition", "offset": [89, 96]}, {"key": "the-specification", "type": "clause", "offset": [100, 117]}, {"key": "the-detailed-design", "type": "clause", "offset": [122, 141]}, {"key": "requirements-for-the", "type": "clause", "offset": [154, 174]}, {"key": "comply-with-the", "type": "clause", "offset": [200, 215]}, {"key": "best-practice", "type": "clause", "offset": [216, 229]}, {"key": "software-and-computer-services", "type": "clause", "offset": [237, 267]}, {"key": "documentation-standards", "type": "clause", "offset": [315, 338]}, {"key": "the-documents", "type": "clause", "offset": [350, 363]}, {"key": "documents-provided", "type": "clause", "offset": [417, 435]}, {"key": "accurate-and-complete", "type": "clause", "offset": [440, 461]}, {"key": "change-order-procedure", "type": "clause", "offset": [545, 567]}, {"key": "all-work", "type": "clause", "offset": [588, 596]}, {"key": "safe-and-secure", "type": "clause", "offset": [617, 632]}, {"key": "loss-or-damage", "type": "clause", "offset": [638, 652]}, {"key": "a-separate", "type": "definition", "offset": [695, 705]}, {"key": "secure-location", "type": "clause", "offset": [710, 725]}], "snippet": "(a) You shall develop the System to provide the facilities and functions and performance set out in the specification and the detailed design to meet our requirements for the System. The System shall comply with the best practice of the software and computer services industry and to the structured programming and documentation standards set out in the Documents.\n(b) You shall verify that the specification and all Documents provided are accurate and complete and shall agree with us any changes that we may consider to be necessary under the Change Order procedure.\n(c) You shall keep all work, data and Documents safe and secure from loss or damage and maintain up-to-date back-up copies in a separate and secure location.", "size": 4, "samples": [{"hash": "ehEWy4HN5ma", "uri": "/contracts/ehEWy4HN5ma#system-development", "label": "Master Services Agreement", "score": 31.4759063721, "published": true}, {"hash": "6ADlBpoNy82", "uri": "/contracts/6ADlBpoNy82#system-development", "label": "Master Services Agreement", "score": 30.75050354, "published": true}], "hash": "aa04513b2d396981060668509ee8485b", "id": 4}, {"snippet_links": [{"key": "software-development-lifecycle", "type": "clause", "offset": [33, 63]}, {"key": "for-the-purpose-of", "type": "definition", "offset": [64, 82]}, {"key": "information-systems", "type": "definition", "offset": [164, 183]}], "snippet": "12.1 CyberGRX has an established software development lifecycle for the purpose of defining, acquiring, developing, enhancing, modifying, testing, and implementing information systems.", "size": 2, "samples": [{"hash": "bkcKEZBLWFs", "uri": "/contracts/bkcKEZBLWFs#system-development", "label": "Platform Access and Service Agreement", "score": 33.4522857666, "published": true}, {"hash": "bkmySj0Vou5", "uri": "/contracts/bkmySj0Vou5#system-development", "label": "Third Party Profile Agreement", "score": 33.0115699768, "published": true}], "hash": "47bbae6657b718eea3038f583c7a66c6", "id": 10}, {"snippet_links": [{"key": "in-accordance-with", "type": "clause", "offset": [0, 18]}, {"key": "the-development-project", "type": "clause", "offset": [19, 42]}, {"key": "work-statement", "type": "definition", "offset": [62, 76]}, {"key": "attached-hereto-as-exhibit", "type": "definition", "offset": [77, 103]}, {"key": "the-parties-shall", "type": "clause", "offset": [109, 126]}, {"key": "project-obligations", "type": "definition", "offset": [176, 195]}, {"key": "own-cost", "type": "clause", "offset": [206, 214]}, {"key": "to-develop", "type": "definition", "offset": [216, 226]}, {"key": "software-code", "type": "definition", "offset": [271, 284]}, {"key": "cnc-code", "type": "definition", "offset": [300, 308]}, {"key": "software-systems", "type": "clause", "offset": [324, 340]}, {"key": "overall-system", "type": "clause", "offset": [384, 398]}, {"key": "to-offer", "type": "definition", "offset": [399, 407]}, {"key": "internet-services", "type": "definition", "offset": [412, 429]}, {"key": "during-the-term-of-this-agreement", "type": "clause", "offset": [460, 493]}, {"key": "provision-of-the", "type": "clause", "offset": [584, 600]}, {"key": "will-provide", "type": "clause", "offset": [625, 637]}, {"key": "information-on", "type": "clause", "offset": [683, 697]}, {"key": "omitted-and-filed-separately-with-the-securities-and-exchange-commission", "type": "clause", "offset": [717, 789]}, {"key": "confidential-treatment", "type": "clause", "offset": [791, 813]}, {"key": "with-respect-to", "type": "clause", "offset": [833, 848]}, {"key": "access-to", "type": "definition", "offset": [898, 907]}, {"key": "technical-support-staff", "type": "definition", "offset": [914, 937]}, {"key": "relating-to", "type": "definition", "offset": [959, 970]}, {"key": "deliver-to", "type": "definition", "offset": [1012, 1022]}, {"key": "no-charge", "type": "definition", "offset": [1033, 1042]}, {"key": "feature-releases", "type": "definition", "offset": [1062, 1078]}, {"key": "related-documentation", "type": "clause", "offset": [1084, 1105]}, {"key": "commercial-release", "type": "definition", "offset": [1290, 1308]}], "snippet": "In accordance with the Development Project ------------------ Work Statement attached hereto as Exhibit \"B\", the parties shall perform their ----------- respective Development Project obligations (at their own cost) to develop, implement, execute, integrate and test the software code (including the CNC Code), hardware and software systems, procedures and installation to develop an overall system to offer the Internet Services (collectively, the \"System\"). During the Term of this Agreement, CNC (i) warrants that the CNC Code shall meet all its specifications to support Intuit's provision of the Internet Services, (ii) will provide to Intuit at no ---------------- [*] Certain information on this page has been omitted and filed separately with the Securities and Exchange Commission. Confidential treatment has been requested with respect to the omitted portions. charge unlimited telephone access to CNC's technical support staff to obtain assistance relating to the CNC Code, and (iii) will develop and deliver to Intuit at no charge any maintenance or feature releases, and related documentation, to correct a programming error or other defect or to increase or enhance the features or functionality of the CNC Code which CNC makes available as a standard feature of its standard commercial release during the Term.", "size": 2, "samples": [{"hash": "hWatWA3cTEh", "uri": "/contracts/hWatWA3cTEh#system-development", "label": "Internet Access Services Agreement (Concentric Network Corp)", "score": 18.0, "published": true}, {"hash": "euGRNO1xTGh", "uri": "/contracts/euGRNO1xTGh#system-development", "label": "Internet Access Services Agreement (Concentric Network Corp)", "score": 18.0, "published": true}], "hash": "0483ff11ec9c832b176bc40649c8fae7", "id": 6}, {"snippet_links": [{"key": "if-the-contractor", "type": "clause", "offset": [0, 17]}, {"key": "university-data", "type": "definition", "offset": [57, 72]}, {"key": "the-development", "type": "clause", "offset": [94, 109]}, {"key": "test-environments", "type": "clause", "offset": [113, 130]}, {"key": "data-elements", "type": "definition", "offset": [168, 181]}, {"key": "original-value", "type": "clause", "offset": [261, 275]}, {"key": "initial-implementation", "type": "definition", "offset": [349, 371]}, {"key": "as-applied", "type": "definition", "offset": [380, 390]}, {"key": "updates-and-modifications", "type": "clause", "offset": [391, 416]}, {"key": "provide-documentation", "type": "clause", "offset": [532, 553]}, {"key": "risk-assessment", "type": "definition", "offset": [559, 574]}, {"key": "new-system", "type": "clause", "offset": [578, 588]}, {"key": "changes-to", "type": "clause", "offset": [604, 614]}], "snippet": "If the Contractor provides system development, Protected University Data shall not be used in the development or test environments. Records that contain these types of data elements may be used if that data is first de-identified, masked or altered so that the original value is not recoverable. For programs that process Protected University Data, initial implementation as well as applied updates and modifications must be produced from specifically authorized and trusted program source libraries and personnel. Contractor shall provide documentation of a risk assessment of new system development or changes to a system.", "size": 12, "samples": [{"hash": "iAduo2ovc2x", "uri": "/contracts/iAduo2ovc2x#system-development", "label": "Master Agreement", "score": 34.4524481495, "published": true}, {"hash": "2vAvcPqklkE", "uri": "/contracts/2vAvcPqklkE#system-development", "label": "Master Agreement", "score": 33.4827194214, "published": true}, {"hash": "1HxDqWPqBIl", "uri": "/contracts/1HxDqWPqBIl#system-development", "label": "Master Agreement", "score": 32.5968437195, "published": true}], "hash": "eb8b2c2ca4040e1d7069a41dc6f28df2", "id": 1}, {"snippet_links": [{"key": "the-system", "type": "definition", "offset": [0, 10]}, {"key": "exhibit-c", "type": "definition", "offset": [57, 66]}, {"key": "system-requirements", "type": "definition", "offset": [100, 119]}], "snippet": "The System prototypes must meet each milestone stated on Exhibit C (\u201cSystem Milestone\u201d) and [***] (\u201cSystem Requirements\u201d).", "size": 5, "samples": [{"hash": "eijkctzxjJp", "uri": "/contracts/eijkctzxjJp#system-development", "label": "System and Lead Development and Transfer Agreement (Mri Interventions, Inc.)", "score": 23.2012329102, "published": true}, {"hash": "61qdUKseU6l", "uri": "/contracts/61qdUKseU6l#system-development", "label": "System and Lead Development and Transfer Agreement (Mri Interventions, Inc.)", "score": 22.9876804352, "published": true}, {"hash": "k4HTYIFm93T", "uri": "/contracts/k4HTYIFm93T#system-development", "label": "System and Lead Development and Transfer Agreement (Surgivision Inc)", "score": 21.421628952, "published": true}], "hash": "f88a0bfb7ef707c90ada36004063eb43", "id": 2}, {"snippet_links": [{"key": "to-the-extent", "type": "clause", "offset": [4, 17]}, {"key": "the-services", "type": "definition", "offset": [40, 52]}, {"key": "the-company", "type": "definition", "offset": [54, 65]}, {"key": "to-apply", "type": "clause", "offset": [101, 109]}, {"key": "policies-and-procedures", "type": "clause", "offset": [151, 174]}, {"key": "application-system", "type": "definition", "offset": [191, 209]}, {"key": "according-to", "type": "definition", "offset": [270, 282]}, {"key": "best-practices", "type": "definition", "offset": [303, 317]}, {"key": "technology-provider", "type": "definition", "offset": [415, 434]}, {"key": "data-security", "type": "clause", "offset": [516, 529]}, {"key": "development-of-a", "type": "clause", "offset": [866, 882]}, {"key": "test-plan", "type": "definition", "offset": [892, 901]}, {"key": "security-requirements", "type": "definition", "offset": [982, 1003]}, {"key": "vulnerability-assessment", "type": "definition", "offset": [1030, 1054]}, {"key": "penetration-test", "type": "definition", "offset": [1059, 1075]}, {"key": "security-issues", "type": "clause", "offset": [1118, 1133]}, {"key": "prior-to-the", "type": "clause", "offset": [1134, 1146]}, {"key": "reasonable-action", "type": "definition", "offset": [1258, 1275]}, {"key": "to-mitigate", "type": "definition", "offset": [1290, 1301]}, {"key": "the-system", "type": "definition", "offset": [1342, 1352]}, {"key": "subcontractor-shall", "type": "clause", "offset": [1438, 1457]}, {"key": "provide-the", "type": "clause", "offset": [1467, 1478]}, {"key": "change-management", "type": "definition", "offset": [1627, 1644]}, {"key": "management-process", "type": "clause", "offset": [1655, 1673]}, {"key": "production-system", "type": "definition", "offset": [1783, 1800]}, {"key": "provide-a", "type": "definition", "offset": [1888, 1897]}, {"key": "certification-letter", "type": "clause", "offset": [1903, 1923]}, {"key": "the-data", "type": "clause", "offset": [2022, 2030]}, {"key": "company-warrants", "type": "clause", "offset": [2171, 2187]}, {"key": "no-virus", "type": "clause", "offset": [2225, 2233]}, {"key": "by-company", "type": "clause", "offset": [2337, 2347]}, {"key": "the-performance", "type": "clause", "offset": [2414, 2429]}, {"key": "confidential-information", "type": "clause", "offset": [2460, 2484]}, {"key": "other-information", "type": "definition", "offset": [2494, 2511]}, {"key": "no-backdoors", "type": "clause", "offset": [2587, 2599]}, {"key": "access-to-the-application", "type": "clause", "offset": [2705, 2730]}, {"key": "information-technology-resources", "type": "clause", "offset": [2781, 2813]}, {"key": "indemnify-and-hold", "type": "clause", "offset": [2833, 2851]}, {"key": "causes-of-action", "type": "clause", "offset": [2902, 2918]}, {"key": "costs-and-expenses", "type": "definition", "offset": [2920, 2938]}, {"key": "arising-out-of", "type": "definition", "offset": [2939, 2953]}, {"key": "related-to", "type": "definition", "offset": [2957, 2967]}, {"key": "the-warranty", "type": "clause", "offset": [2982, 2994]}], "snippet": "(1) To the extent that Company provides the Services, the Company and its Subcontractors shall agree to apply the following requirements:\ni. Establish policies and procedures that ensure the application system has been designed, built and implemented in a secure manner according to industry recognized best practices or frameworks (e.g., Build Security in Maturity Model (BSIMM) benchmarks, Open Group ACS Trusted Technology Provider framework, NIST, OWASP, etc.).\nii. Establish policies and procedures that ensure data security has been designed, built, and implemented into the application system according to industry recognized best practices or frameworks (e.g.,CDSA, MULITSAFE, CSA Trusted Cloud Architectural Standard, FedRAMP, CAESARS, etc.).\niii. Establish policies and procedures that ensure the application system has been properly tested, including the development of a security test plan that defines an approach for testing or otherwise establishing that each of the security requirements has been met.\niv. Perform vulnerability assessment and penetration test on the application system to identify any security issues prior to the application system being placed into production. The Company or its Subcontractors verify that appropriate and reasonable action will be taken to mitigate any security issues identified prior to the system being placed into production.\nv. Upon Central \u2587\u2587\u2587\u2587\u2587\u2587\u2019\u2587 request, the Company and each Subcontractor shall promptly provide the results of any vulnerability assessment and penetration test.\nvi. Establish policies and procedures that ensure the application system has a proper change management and patch management process that includes applying, testing, and validating the appropriate changes / patches before being placed in the production system.\nvii. Upon Central \u2587\u2587\u2587\u2587\u2587\u2587\u2019\u2587 request, the Company and each Subcontractor shall promptly provide a self-certification letter to Central \u2587\u2587\u2587\u2587\u2587\u2587 verifying that the application system meets the security requirements stated in the Data Security Rider, that all security activities have been performed, and all identified security issues have been documented and resolved.\n(2) Company warrants that the application system contains no virus, Trojan, worm, undocumented shutdown mechanism or other code or feature which is intended, or is known by Company as likely, to disable, damage, destroy, deny access to or degrade the performance of the application system, or Confidential Information, Data or other information technology resource. Company warrants that the application system contains no backdoors or other feature that is intended to allow Company or someone else to gain unauthorized or surreptitious access to the application system or Confidential Information, Data or other information technology resources. Company agrees to indemnify and hold Central \u2587\u2587\u2587\u2587\u2587\u2587 harmless from any claims, damages, causes of action, costs and expenses arising out of or related to any breach of the warranty set forth in this paragraph.", "size": 5, "samples": [{"hash": "d33PZajCs8d", "uri": "/contracts/d33PZajCs8d#system-development", "label": "Confidentiality and Non Disclosure Agreement", "score": 32.7405700684, "published": true}, {"hash": "e4LBFDkHxRK", "uri": "/contracts/e4LBFDkHxRK#system-development", "label": "Confidentiality and Non Disclosure Agreement", "score": 32.631072998, "published": true}, {"hash": "1EaXeCxJKGR", "uri": "/contracts/1EaXeCxJKGR#system-development", "label": "Confidentiality and Non Disclosure Agreement", "score": 30.7368164062, "published": true}], "hash": "b2015aa0003914120c608e889b3aa278", "id": 3}, {"snippet_links": [{"key": "marketing-strategies", "type": "clause", "offset": [16, 36]}, {"key": "other-products", "type": "definition", "offset": [105, 119]}, {"key": "the-services", "type": "definition", "offset": [125, 137]}], "snippet": "Carrying out of marketing strategies to package and market the MEH system and its marine information and other products, and the services it could provide.", "size": 3, "samples": [{"hash": "l8tLUz0BNGv", "uri": "/contracts/l8tLUz0BNGv#system-development", "label": "Trust Fund Grant Agreement", "score": 26.5263519287, "published": true}, {"hash": "5tcPBEn1BLf", "uri": "/contracts/5tcPBEn1BLf#system-development", "label": "Trust Fund Grant Agreement", "score": 26.5263519287, "published": true}, {"hash": "kE4DwjRj6wW", "uri": "/contracts/kE4DwjRj6wW#system-development", "label": "Global Environment Facility Trust Fund Grant Agreement", "score": 21.0, "published": true}], "hash": "3d2be94cc3e26cc9a8e4965202c476e2", "id": 5}, {"snippet_links": [{"key": "the-general", "type": "clause", "offset": [19, 30]}, {"key": "discovery-phase", "type": "clause", "offset": [31, 46]}, {"key": "general-system", "type": "definition", "offset": [94, 108]}, {"key": "systems-development", "type": "definition", "offset": [141, 160]}, {"key": "first-data-system", "type": "definition", "offset": [168, 185]}, {"key": "with-respect-to", "type": "clause", "offset": [339, 354]}, {"key": "system-changes", "type": "definition", "offset": [466, 480]}, {"key": "system-enhancements", "type": "clause", "offset": [579, 598]}, {"key": "the-systems", "type": "clause", "offset": [745, 756]}, {"key": "review-and-approval", "type": "clause", "offset": [824, 843]}, {"key": "individual-unit", "type": "clause", "offset": [907, 922]}, {"key": "system-testing", "type": "definition", "offset": [927, 941]}, {"key": "the-programs", "type": "clause", "offset": [945, 957]}, {"key": "testing-environment", "type": "definition", "offset": [1038, 1057]}, {"key": "executed-by", "type": "clause", "offset": [1068, 1079]}, {"key": "development-and-testing", "type": "clause", "offset": [1091, 1114]}, {"key": "applicable-programs", "type": "clause", "offset": [1168, 1187]}, {"key": "acceptance-test-environment", "type": "definition", "offset": [1204, 1231]}, {"key": "new-functionality", "type": "clause", "offset": [1242, 1259]}, {"key": "according-to", "type": "definition", "offset": [1371, 1383]}, {"key": "the-standard", "type": "clause", "offset": [1384, 1396]}, {"key": "release-schedule", "type": "definition", "offset": [1397, 1413]}, {"key": "specifications-document", "type": "definition", "offset": [1503, 1526]}, {"key": "table-of-contents", "type": "clause", "offset": [1664, 1681]}, {"key": "the-conversion", "type": "clause", "offset": [1689, 1703]}, {"key": "the-production", "type": "clause", "offset": [1905, 1919]}, {"key": "output-reports", "type": "definition", "offset": [1997, 2011]}, {"key": "the-information", "type": "clause", "offset": [2076, 2091]}, {"key": "in-accordance-with", "type": "clause", "offset": [2251, 2269]}, {"key": "discovery-plan", "type": "definition", "offset": [2274, 2288]}, {"key": "product-control", "type": "clause", "offset": [2339, 2354]}, {"key": "standard-template", "type": "clause", "offset": [2404, 2421]}, {"key": "card-carrier", "type": "definition", "offset": [2666, 2678]}, {"key": "network-configuration", "type": "clause", "offset": [3004, 3025]}, {"key": "point-of-sale", "type": "definition", "offset": [3077, 3090]}, {"key": "communication-equipment", "type": "definition", "offset": [3150, 3173]}, {"key": "data-files", "type": "clause", "offset": [3207, 3217]}, {"key": "establish-procedures", "type": "clause", "offset": [3247, 3267]}, {"key": "training-plan", "type": "definition", "offset": [3324, 3337]}, {"key": "needs-assessment", "type": "clause", "offset": [3476, 3492]}, {"key": "train-the-trainer", "type": "clause", "offset": [3494, 3511]}, {"key": "schedule-a", "type": "clause", "offset": [3565, 3575]}, {"key": "section-16", "type": "definition", "offset": [3577, 3587]}, {"key": "the-training", "type": "clause", "offset": [3602, 3614]}, {"key": "and-support", "type": "clause", "offset": [3711, 3722]}, {"key": "dedicated-resources", "type": "definition", "offset": [3726, 3745]}, {"key": "communication-between-the-parties", "type": "clause", "offset": [3824, 3857]}, {"key": "employee-training", "type": "clause", "offset": [3915, 3932]}, {"key": "business-partnership", "type": "definition", "offset": [3961, 3981]}, {"key": "escalation-of-issues", "type": "clause", "offset": [4019, 4039]}, {"key": "planning-and-coordination", "type": "clause", "offset": [4073, 4098]}, {"key": "software-development", "type": "definition", "offset": [4106, 4126]}, {"key": "new-software", "type": "clause", "offset": [4268, 4280]}, {"key": "pass-through", "type": "definition", "offset": [4284, 4296]}, {"key": "the-software", "type": "clause", "offset": [4341, 4353]}, {"key": "user-acceptance-testing", "type": "clause", "offset": [4381, 4404]}, {"key": "data-systems", "type": "definition", "offset": [4412, 4424]}, {"key": "responsible-for", "type": "clause", "offset": [4452, 4467]}, {"key": "the-user", "type": "definition", "offset": [4512, 4520]}, {"key": "testing-phase", "type": "clause", "offset": [4532, 4545]}, {"key": "the-opportunity", "type": "clause", "offset": [4566, 4581]}, {"key": "participate-in", "type": "definition", "offset": [4692, 4706]}, {"key": "phase-of", "type": "clause", "offset": [4742, 4750]}, {"key": "unit-testing", "type": "definition", "offset": [4877, 4889]}, {"key": "the-testing", "type": "definition", "offset": [4952, 4963]}, {"key": "basic-level", "type": "definition", "offset": [4984, 4995]}, {"key": "the-unit", "type": "clause", "offset": [4997, 5005]}, {"key": "design-requirements", "type": "definition", "offset": [5130, 5149]}, {"key": "test-case", "type": "definition", "offset": [5183, 5192]}, {"key": "expected-results", "type": "clause", "offset": [5206, 5222]}, {"key": "a-sub", "type": "clause", "offset": [5409, 5414]}, {"key": "to-validate", "type": "definition", "offset": [5456, 5467]}, {"key": "code-changes", "type": "clause", "offset": [5473, 5485]}, {"key": "system-function", "type": "clause", "offset": [5558, 5573]}, {"key": "regression-testing", "type": "definition", "offset": [5641, 5659]}, {"key": "software-release", "type": "definition", "offset": [6012, 6028]}, {"key": "as-intended", "type": "definition", "offset": [6182, 6193]}, {"key": "completion-of-the", "type": "clause", "offset": [6354, 6371]}, {"key": "test-cycle", "type": "definition", "offset": [6488, 6498]}, {"key": "the-m", "type": "clause", "offset": [6500, 6505]}, {"key": "control-department", "type": "definition", "offset": [6580, 6598]}, {"key": "performed-by", "type": "clause", "offset": [6633, 6645]}, {"key": "plans-for", "type": "clause", "offset": [6759, 6768]}, {"key": "resource-requirements", "type": "clause", "offset": [6831, 6852]}, {"key": "test-a", "type": "definition", "offset": [6903, 6909]}, {"key": "converted-data", "type": "definition", "offset": [6940, 6954]}, {"key": "input-and-output", "type": "clause", "offset": [6956, 6972]}, {"key": "relating-to", "type": "definition", "offset": [7007, 7018]}, {"key": "in-addition", "type": "clause", "offset": [7044, 7055]}, {"key": "requests-for-testing", "type": "clause", "offset": [7066, 7086]}, {"key": "as-received", "type": "definition", "offset": [7105, 7116]}, {"key": "required-by", "type": "definition", "offset": [7226, 7237]}, {"key": "access-to-the", "type": "clause", "offset": [7267, 7280]}, {"key": "ability-to", "type": "clause", "offset": [7302, 7312]}, {"key": "test-scripts", "type": "definition", "offset": [7396, 7408]}, {"key": "to-ensure", "type": "clause", "offset": [7409, 7418]}, {"key": "custom-program", "type": "definition", "offset": [7424, 7438]}, {"key": "conversion-testing", "type": "definition", "offset": [7470, 7488]}, {"key": "the-specifications", "type": "definition", "offset": [7590, 7608]}, {"key": "balance-reports", "type": "clause", "offset": [7838, 7853]}, {"key": "verification-reports", "type": "definition", "offset": [7873, 7893]}, {"key": "requested-by", "type": "clause", "offset": [7894, 7906]}, {"key": "in-place", "type": "clause", "offset": [8646, 8654]}, {"key": "all-parameters", "type": "definition", "offset": [8745, 8759]}, {"key": "the-process", "type": "clause", "offset": [8988, 8999]}, {"key": "audit-reports", "type": "clause", "offset": [9206, 9219]}, {"key": "for-approval", "type": "definition", "offset": [9220, 9232]}, {"key": "number-of-accounts", "type": "definition", "offset": [9318, 9336]}, {"key": "the-\u2587", "type": "clause", "offset": [9365, 9370]}, {"key": "exception-reports", "type": "clause", "offset": [9403, 9420]}, {"key": "account-processing", "type": "clause", "offset": [9653, 9671]}, {"key": "at-the-end-of-the", "type": "clause", "offset": [9724, 9741]}, {"key": "implementation-phase", "type": "definition", "offset": [9742, 9762]}, {"key": "day-of", "type": "clause", "offset": [9849, 9855]}, {"key": "first-day", "type": "definition", "offset": [9893, 9902]}, {"key": "new-processes", "type": "clause", "offset": [10091, 10104]}, {"key": "sequence-of-events", "type": "clause", "offset": [10106, 10124]}, {"key": "command-center", "type": "definition", "offset": [10126, 10140]}], "snippet": "As an outcome from the General Discovery phase and GECF-A Discovery, First Data will identify general system differences, which will require systems development on the First Data System. First Data will identify final specific differences for RCSI\u2019s approval within each Wave that may require systems development on the First Data System. With respect to differences that require systems development, First Data will: \u2022 Write programming requests for all First Data System changes identified during GECF-A Discovery and outlined in the Resolution Agreements. \u2022 Design First Data System enhancements and write detailed documents describing the specific First Data System changes. \u2022 Quality inspects designs by the requester as well as members of the Systems and Programming organization. \u2022 Provide detail designs to RCSI for review and approval. \u2022 Code and construct the First Data System changes, including individual unit and system testing of the programs that are changed. \u2022 Merge the new code with production code into an integration testing environment, which is executed by First Data development and testing staff to identify specific coding errors. \u2022 Move all applicable programs into the Client Acceptance Test environment where the new functionality can be tested in a production-like system by RCSI and First Data. \u2022 Install completed programs into production according to the standard release schedule. First Data will: \u2022 Receive and analyze the RCSI system masterfiles. \u2022 Prepare a mapping specifications document, which details how fields are mapped from the RCSI masterfiles to First Data masterfiles. \u2022 Review mapping specifications with the RCSI. Table of Contents \u2022 Code the Conversion programs from the mapping specifications. The Conversion programs create new First Data System masterfiles. \u2022 Test the Conversion programs using a series of \u201cMock\u201d Conversions. First Data will receive the production masterfiles from RCSI and run them through the Conversion programs to create output reports showing each masterfile field and value. First Data will verify the information against the mapping specifications. \u2022 Execute the Conversion programs on conversion weekend and merge the new masterfiles into production. First Data or RCSI, in accordance with the Discovery Plan, will: \u2022 Establish RCSI defined parameters on the Product Control File and fully document deviations from the RCSI standard template for each portfolio. \u2022 Create Account Level Processing/Transaction Level Processing strategies. \u2022 Build Portfolio Allocation and Cardholder Allocation tables to drive pricing strategies. \u2022 Create statement forms and envelopes. \u2022 Order plastics, card carrier forms, inserts and envelopes. \u2022 Set reporting parameters and fully document deviations from the RCSI standard template for each portfolio. \u2022 Build cardholder letters. \u2022 Establish Behavior Score/Adaptive Control parameter tables. First Data or RCSI, in accordance with the Discovery Plan, will: \u2022 Analyze current terminal and network configuration. \u2022 Design telecommunication network for terminals, point of sale devices and interfaces. \u2022 Order and install data lines and communication equipment. \u2022 Complete programming to route data files to/from First Data System. \u2022 Establish procedures for mailed tape media. Table of Contents The Conversion training plan consists of four (4) phases that First Data or RCSI, in accordance with the Discovery Plan, will perform as part of each Conversion Wave: needs assessment, train the trainer, staff level training, and follow up as described in Schedule A, Section 16. In order for the training portion of the Conversion to be successful, the following must occur: \u2022 The Parties\u2019 commitment and support. \u2022 Dedicated resources from First Data and RCSI \u2022 Appropriate time for planning and execution \u2022 Open communication between the Parties to facilitate a positive experience \u2022 Time allocated for employee training and follow-up \u2022 Instill the business Partnership between First Data and RCSI \u2022 Timely escalation of issues Testing consists of First Data\u2019s planning and coordination of all software development, Conversion programs, interfaces and product control file parameters. First Data will perform software development testing, including having new software to pass through three (3) phases of internal testing before the software is turned over to RCSI for user acceptance testing. First Data Systems and Programming (\u201cS&P\u201d) is responsible for testing in first three (3) phases. It is in the user acceptance testing phase that RCSI will have the opportunity to use the First Data System and become involved in the various testing scenarios. RCSI may at its discretion participate in the scripting and execution of any phase of testing. First Data will perform the three (3) testing phases, and facilitate client/user acceptance testing described below. Unit Testing-This phase of testing is conducted by First Data\u2019s S&P staff. The testing is done at the most basic level. The unit test ensures that all modified or new logic paths in the affected applications modules work correctly and reflect the final design requirements. The test includes known inputs, test case scripts, and expected results. System Test-This phase of testing is also conducted by the First Data S&P staff. The testing is now expanded to include all modules that have been modified for a given project (usually a sub-system). The modules are tested together to validate that code changes meet design requirements and that the various components of the altered system function together properly. The system test consists of both acceptance and regression testing. Modules that send, receive, and share data with the modified modules are used to test changes and to regression test the legacy functionality. First Data will share the results with RCSI. Table of Contents Integration Test-The integration test conducted by the First Data S&P staff incorporates all software and database modifications from a specific software release into one (1) testing environment. Multiple daily cycles will be executed as well as weekly and monthly cycles. The testing ensures that projects execute as intended and do not introduce any unanticipated problems. Changes are tested across and between applications as well. Client/User Acceptance Testing- (M Cycle) Upon the completion of the three (3) internal First Data test phases described above, the software release is installed in the user acceptance test cycle. The M cycle is a daily production cycle which is run by First Data\u2019s production control department. Performance and stress tests are performed by extrapolating results from this Client/User Acceptance Test. RCSI Testing \u2013 RCSI will prepare timelines and test plans for all internal and external requirements, including any data or resource requirements from First Data. M cycle is available for RCSI to test a production cycle against RCSI converted data, input and output along with any system development relating to the Initial Conversions. In addition, specific requests for testing will be addressed as received from RCSI which may require Team 9P involvement. RCSI will need to identify a champion to coordinate testing required by RCSI. RCSI will have on-line access to the M cycle and have the ability to send inputs to and receive outputs from the M cycle. RCSI will prepare and execute test scripts to ensure that custom program requests function as intended. Conversion Testing-First Data will prepare specifications for each file which will be Converted. First Data will review the specifications with RCSI and schedule several First Data internal mocks and several RCSI mocks. During mock testing, First Data will review with RCSI old and new dumps of the files to ensure information has mapped properly. First Data will run balance reports and any additional verification reports requested by RCSI during the mocks. For the mock testing it will be important that RCSI representatives be onsite in Omaha. That way, they will have access to First Data experts and have the ability to review reruns and reports timely. Product Control File- (PCS/ALP/TLP/TLR) First Data will build tables in production and M cycles. First data will train and assist RCSI in building its PCF tables. First Data and RCSI will verify each field before and after it is built. In addition, First Data will hold PCF/TLP/TLR reviews to ensure parameters are set correctly. After verification, First Data will build parameters in M cycle as well as production. RCSI will be able to test all inputs and output, screens, etc., using the parameters which will be in place at conversion. Using M cycle and the 9P environment, First Data and RCSI will verify that all parameters are mirrored correctly from M to production. Conversion weekend is the culmination of all the previous phases. First Data will adequately prepare RCSI using the mock Conversions RCSI for file verification on conversion weekend. The process starts with RCSI delivering masterfiles to First Data. This can be accommodated via transmission or delivering of physical tapes. First Data will run these files through the Conversion programs and product audit reports for approval. Both RCSI and First Data will verify the results. First Data will balance the total number of accounts and current outstandings to the \u2587\u2587\u2587\u2587\u2587. First Data will review all exception reports. Once the Conversion results are signed off by RCSI, the First Data will merge the RCSI masterfile records into the masterfile records of the First Data System. Table of Contents First Data will establish procedures for lost/stolen account processing during the Conversion weekend, for RCSI\u2019s approval. At the end of the implementation phase, RCSI should feel confident that masterfile integrity remained the same from the last day of processing on the RCSI system to the first day of processing on the First Data System. RCSI will need to have staff on-site in Omaha the weekend of each Conversion Wave. It will also need to put together their own plan identifying the new processes, sequence of events, command center personnel, etc.", "size": 2, "samples": [{"hash": "f6VdVDUAuj5", "uri": "/contracts/f6VdVDUAuj5#system-development", "label": "Technology Sourcing Agreement (Synchrony Financial)", "score": 25.4846000671, "published": true}, {"hash": "89jne3c31Do", "uri": "/contracts/89jne3c31Do#system-development", "label": "Technology Sourcing Agreement (Synchrony Financial)", "score": 25.3394927979, "published": true}], "hash": "050ca46165b97085c4548f622ef57650", "id": 7}, {"snippet_links": [{"key": "the-customer", "type": "definition", "offset": [0, 12]}, {"key": "software-development-work", "type": "definition", "offset": [32, 57]}, {"key": "party-vendor", "type": "clause", "offset": [69, 81]}, {"key": "vendor-will", "type": "clause", "offset": [124, 135]}, {"key": "responsible-for", "type": "clause", "offset": [139, 154]}, {"key": "the-system", "type": "definition", "offset": [166, 176]}, {"key": "the-design", "type": "clause", "offset": [282, 292]}], "snippet": "The Customer has outsourced the software development work to a third-party Vendor (for System Development). The third-party Vendor will be responsible for developing the system, the module, the functionality, etc. accordingly. This development will commence upon the signing off of the Design UI/UX and FRS Documents.", "size": 2, "samples": [{"hash": "c5e1i4c610P", "uri": "/contracts/c5e1i4c610P#system-development", "label": "Consultancy Services Agreement (Black Titan Corp)", "score": 34.4168395996, "published": true}, {"hash": "jt1ndmZJ4ir", "uri": "/contracts/jt1ndmZJ4ir#system-development", "label": "Consultancy Services Agreement (Black Titan Corp)", "score": 34.3100624084, "published": true}], "hash": "cf6eae80d9b559cb31528587f79112cf", "id": 8}, {"snippet_links": [{"key": "supplier-will", "type": "clause", "offset": [0, 13]}, {"key": "use-commercially-reasonable-efforts", "type": "clause", "offset": [14, 49]}, {"key": "to-ensure", "type": "clause", "offset": [50, 59]}, {"key": "the-system", "type": "definition", "offset": [65, 75]}, {"key": "standard-software", "type": "definition", "offset": [90, 107]}, {"key": "systems-and-software", "type": "clause", "offset": [161, 181]}, {"key": "most-recent", "type": "definition", "offset": [197, 208]}, {"key": "internet-explorer", "type": "definition", "offset": [231, 248]}, {"key": "apple-safari", "type": "clause", "offset": [250, 262]}, {"key": "mozilla-firefox", "type": "clause", "offset": [267, 282]}, {"key": "web-browsers", "type": "clause", "offset": [283, 295]}, {"key": "the-applicable", "type": "clause", "offset": [299, 313]}, {"key": "client-software", "type": "definition", "offset": [314, 329]}, {"key": "major-releases", "type": "definition", "offset": [344, 358]}], "snippet": "Supplier will use commercially reasonable efforts to ensure that the System uses industry-standard software, and will be compatible with commonly used operating systems and software, including the most recent versions of Microsoft Internet Explorer, Apple Safari and Mozilla Firefox Web browsers or the applicable client software and two prior major releases.", "size": 2, "samples": [{"hash": "gYNIrSWksl3", "uri": "/contracts/gYNIrSWksl3#system-development", "label": "Master Agreement (Cardlytics, Inc.)", "score": 29.6160163879, "published": true}, {"hash": "jC9CGXw15KR", "uri": "/contracts/jC9CGXw15KR#system-development", "label": "Master Agreement (Cardlytics, Inc.)", "score": 29.4846000671, "published": true}], "hash": "8e4b177c2e8d2376118169cef884b552", "id": 9}], "next_curs": "ClsSVWoVc35sYXdpbnNpZGVyY29udHJhY3RzcjcLEhZDbGF1c2VTbmlwcGV0R3JvdXBfdjU2IhtzeXN0ZW0tZGV2ZWxvcG1lbnQjMDAwMDAwMGEMogECZW4YACAA", "clause": {"title": "System Development", "parents": [["smoking-policy", "Smoking Policy"], ["development-license-and-right-of-first-refusal", "Development License and Right of First Refusal"], ["deconversion-fees", "Deconversion Fees"], ["entire-agreement", "Entire Agreement"], ["miscellaneous", "Miscellaneous"]], "size": 77, "children": [["secure-coding-practices", "Secure Coding Practices"], ["development-methodology-and-installation-process", "Development Methodology and Installation Process"], ["testing-process", "Testing Process"], ["collaboration", "Collaboration"], ["validation", "Validation"]], "id": "system-development", "related": [["curriculum-development", "Curriculum Development", "Curriculum Development"], ["program-development", "Program Development", "Program Development"], ["design-development", "Design Development", "Design Development"], ["staff-development", "Staff Development", "Staff Development"], ["project-development", "Project Development", "Project Development"]], "related_snippets": [], "updated": "2025-07-24T06:49:03+00:00"}, "json": true, "cursor": ""}}