REQUIRED PROJECT POLICIES, GUIDELINES AND METHODOLOGIES Sample Clauses

REQUIRED PROJECT POLICIES, GUIDELINES AND METHODOLOGIES. The Contractor shall be required to comply with all applicable laws, regulations, policies, standards and guidelines affecting information technology projects, which may be created or changed periodically. It is the responsibility of the Contractor to insure adherence and to remain abreast of new or revised laws, regulations, policies, standards and guidelines affecting specific project execution. The most recent version of the following policies can be found on the State of Vermont Department of Information and Innovation website at xxxx://xxx.xxxxxxx.xxx/policy/policy: • Incident Response Policy • Information Security PolicyIntrusion Detection and Prevention Policy • Malicious Software ProtectionPhysical Security for Computer Protection • Third Party Connectivity • Mobile Device Policy • System/Service Password PolicyUser Password Policy and Guidelines • Digital Media and Hardware Disposal Policy, Standard and Procedure
AutoNDA by SimpleDocs
REQUIRED PROJECT POLICIES, GUIDELINES AND METHODOLOGIES. The Contractor shall be required to comply with all applicable laws, regulations, policies, standards and guidelines affecting information technology projects, which may be created or changed periodically. It is the responsibility of the Contractor to ensure adherence and to remain abreast of new or revised laws, regulations, policies, standards and guidelines affecting specific project execution. The most recent version of the following State policies can be found online at xxxxx://xxxxxxxxxxxxxxx.xxxxxxx.xxx/working-us/policies • Information Security Policy xxxxx://xxxxxxxxxxxxxxx.xxxxxxx.xxx/sites/digitalservices/files/docu ments/policy/SoV_Information_Security_Standard.pdf • Cybersecurity Directive 2019 xxxxx://xxxxxxxxxxxxxxx.xxxxxxx.xxx/sites/digitalservices/files/documents/policy/A DS_Cybersecurity_Directive_19-01.pdf • Physical Security for Computer Protection xxxxx://xxxxxxxxxxxxxxx.xxxxxxx.xxx/sites/digitalservices/files/document s/policy/ADS-Physical-Security-for-Computer-Protection.pdf • Third-Party Connectivity xxxxx://xxxxxxxxxxxxxxx.xxxxxxx.xxx/sites/digitalservices/files/docum ents/policy/ADS-Third-Party-Network-Connectivity.pdf • Mobile Device Policy • System/Service Password Policy xxxxx://xxxxxxxxxxxxxxx.xxxxxxx.xxx/sites/digitalservices/files/documents/policy/A DS-InformationSecurityPolicies_FINAL.pdf • User Password Policy and Guidelines xxxxx://xxxxxxxxxxxxxxx.xxxxxxx.xxx/sites/digitalservices/files/documen ts/policy/ADS-InformationSecurityPolicies_FINAL.pdf • Digital Media and Hardware Disposal Policy, Standard and Procedure xxxxx://xxxxxxxxxxxxxxx.xxxxxxx.xxx/sites/digitalservices/files/document s/policy/ADS-Digital-Media-and-Hardware-Disposal-Policy.pdf • Phishing and Incident Response Policy xxxxx://xxxxxxxxxxxxxxx.xxxxxxx.xxx/sites/digitalservices/files/documents/policy/A DS-Phishing%20Incident-Response-Process-9-19-17.pdf • Vermont Accessibility Standard xxxxx://xxxxxxxxxxxxxxx.xxxxxxx.xxx/sites/digitalservices/files/documents /web-policy/ADS-VermontAccessibilityStandard2017.pdf
REQUIRED PROJECT POLICIES, GUIDELINES AND METHODOLOGIES. The Contractor shall be required to comply with all applicable laws, regulations, policies, standards and guidelines affecting information technology projects, which may be created or changed periodically. It is the responsibility of the Contractor to insure adherence and to remain abreast of new or revised laws, regulations, policies, standards and guidelines affecting specific project execution. The most recent version of the following policies can be found on the State of Vermont Agency of Digital Services website at xxxx://xxx.xxxxxxx.xxx/policy/policy: • Incident Response Policy • Information Security PolicyIntrusion Detection and Prevention Policy • Malicious Software ProtectionPhysical Security for Computer Protection • Third Party Connectivity • Mobile Device Policy • System/Service Password PolicyUser Password Policy and Guidelines • Digital Media and Hardware Disposal Policy, Standard and Procedure If required by an SOW Agreement, Contractor’s security controls shall conform to the Health Insurance Portability and Accountability Act of 1996 (“HIPAA”) including the Standards for the Privacy of Individually Identifiable Health Information at 45 CFR Parts 160 and 164 (“Privacy Rule”), the Security Standards at 45 CFR Parts 160 and 164 (“Security Rule”), as amended by subtitle D of the Health Information Technology for Economic and Clinical Health Act and the Federal Information Security Management Act (“FISMA”), 44 U.S.C. 3541 et seq. and Family Education Rights and Privacy Act, 20 U.S.C. § 1232g (FERPA), as applicable.
REQUIRED PROJECT POLICIES, GUIDELINES AND METHODOLOGIES. The Contractor shall comply with all applicable State security policies and adhere to all legal, statutory, and regulatory requirements, as determined by Vermont leadership. The Contractor shall implement security controls in accordance with all Federal and State security policy and regulations. The Contractor will be required to comply with all applicable laws, regulations, policies, standards, and guidelines affecting information technology projects, which may be created or changed periodically. It is the responsibility of the Contractor to insure adherence to and to remain abreast of new or revised laws, regulations, policies, standards, and guidelines affecting project execution. Agency-specific confidentiality and privacy policies, such as Health Insurance Portability and Accountability Act (HIPAA), may apply. These may include, but are not limited to: • The State’s Information Technology Policies & Procedures at: xxxx://xxx.xxxxxxx.xxx/Policy_Central • The State’s Record Management Best Practice at: xxxx://xxxxxxx- xxxxxxxx.xxx/xxxxxxx/xxxxxxxxx/xxx/XxxxxxxXxxxxxxxxxXxxxXxxxxxxx.xxx • The State Information Security Best Practice Guideline at: xxxx://xxxxxxx- xxxxxxxx.xxx/xxxxxxx/xxxxxxxxx/xxx/XxxxxxxxxxxXxxxxxxxXxxxXxxxxxxx_Xxx.00000000.xxx • The State Digital Imaging Guidelines at: xxxx://xxxxxxx- xxxxxxxx.xxx/xxxxxxx/xxxxxxxxx/xxx/XxxxxxxXxxxxxxxx0000.xxx • The State File Formats Best Practice at: xxxx://xxxxxxx- xxxxxxxx.xxx/xxxxxxx/xxxxxxxxx/xxx/XxxxXxxxxxxXxxxXxxxxxxx_Xxx.00000000.xxx • The State File Formats Guideline at: xxxx://xxxxxxx- xxxxxxxx.xxx/xxxxxxx/xxxxxxxxx/xxx/XxxxXxxxxxxXxxxxxxxx0000.xxx • The State Metadata Guideline at: xxxx://xxxxxxx- xxxxxxxx.xxx/xxxxxxx/xxxxxxxxx/xxx/XxxxxxxxXxxxxxxxx0000.xxx Hosted System Requirements The State will have the right to review the Contractor’s information security program prior to the commencement of services and from time to time during the term of this Agreement. During the performance of the services, on an ongoing basis from time to time and without notice, the State, at its own expense, will be entitled to perform, or to have performed, an on-site audit of the Contractor’s information security program. In lieu of an on-site audit, upon request by the State, the Contractor agrees to complete, within forty-five (45 days) of receipt, an audit questionnaire provided by the State regarding the Contractor’s information security program. The Contractor will implement any required safeguards as ide...

Related to REQUIRED PROJECT POLICIES, GUIDELINES AND METHODOLOGIES

  • Agreed Guidelines Applications With respect to the application of the Sentencing Guidelines to this case, the parties stipulate and agree as follows:

  • Policies and Procedures i) The policies and procedures of the designated employer apply to the employee while working at both sites.

Time is Money Join Law Insider Premium to draft better contracts faster.