Workstation/Laptop encryption All workstations and laptops that process and/or store County PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the County Information Security Office.
Devices BNY Mellon will restrict the transfer of Customer Data from its network to mass storage devices. BNY Mellon will use a mobile device management system or equivalent tool when mobile computing is used to provide the services. Applications on such authenticated devices will be housed within an encrypted container and BNY Mellon will maintain the ability to remote wipe the contents of the container.
Firmware 7.1 The Supplier must deliver the equipment, Goods or hardware equipped with all the firmware required to use all the Goods or hardware’s functions. Any software embedded in the equipment, Goods or hardware, including the firmware, is provided to the Local Government with a license to use this software, with all license costs and royalties being included in the Fee Schedule (Schedule C). All firmware will be the most recent version available at the time of shipping.
Software The Software is licensed to you subject to any terms and conditions presented when you downloaded it from a source authorized by NCR Voyix, as well as those contained in this Agreement. If there is a conflict, this Agreement will control. You are licensed to use the Software only with the Service and with Hardware purchased or subscribed from NCR Voyix or its Resellers. Your license to any Software will end when your subscription to the Service ends. The Software is copyrighted and licensed, not sold, and is NCR Voyix’s confidential and unpublished information. You will retain any copyright notices and proprietary legends on all copies of the Software and the media on which it is delivered. Any attempt to transfer the Software is void and will automatically cause your license to end.
Proposal Format To facilitate efficiency and consistency in proposal evaluation the following is mandatory. Proposals which do not follow this direction may be rejected as non-responsive and thus ineligible for award.