INFORMATION TECHNOLOGY, SECURITY AND PRIVACY REQUIREMENTS Clause Samples

The INFORMATION TECHNOLOGY, SECURITY AND PRIVACY REQUIREMENTS clause sets out the standards and obligations for handling information technology systems, data security, and the protection of personal or sensitive information. It typically requires parties to implement specific security measures, comply with relevant privacy laws, and promptly report any data breaches or security incidents. This clause ensures that confidential and personal data are safeguarded, reducing the risk of unauthorized access or data loss and helping parties comply with legal and regulatory requirements.
INFORMATION TECHNOLOGY, SECURITY AND PRIVACY REQUIREMENTS. ‌ 9.17.1 In the course of completing the Work and providing Services under this Subaward, Subrecipient shall use any Information Technology Systems (ITS) as designated by County. This Subparagraph 9.17 sets forth the requirements for the ITS which Subrecipient shall use. This Subparagraph 9.17 also sets forth the security procedures for these systems which Subrecipient shall have in place by the effective date of this Subaward and which Subrecipient shall maintain throughout the Subaward term. They present a minimum standard only. Subrecipient shall implement appropriate administrative, physical and technical measures to secure its systems and data to protect and ensure the privacy, confidentiality, integrity and availability of County Information Assets as defined in Subparagraph 9.17.5 (County Information Assets) (which consists of but is not limited to confidential County data, Personally Identifiable Information, Protected Health Information and Medical Information) against internal and external threats, vulnerabilities and risks. Subrecipient shall also continuously review and revise those measures to address ongoing threats, vulnerabilities and risks. 9.17.2 Subrecipient's failure to comply with the minimum standards set forth herein will constitute a material, non-curable breach of this Subaward, entitling County, in addition to and cumulative of all other remedies available to it at law, in equity, or under this Subaward, to immediately terminate this Subaward.
INFORMATION TECHNOLOGY, SECURITY AND PRIVACY REQUIREMENTS. ‌ 9.17.1 In the course of completing the Work and providing Services under this Subaward, Subrecipient shall use any Information Technology Systems (ITS) as designated by County. This Subparagraph 9.17 sets forth the requirements for the ITS which Subrecipient shall use. This Subparagraph 9.17 also sets forth the security procedures for these systems which Subrecipient shall have in place by the effective date of this Subaward and which Subrecipient shall maintain throughout the Subaward term. They present a minimum standard only. Subrecipient shall implement appropriate administrative, physical, and technical measures to secure its systems and data to protect and ensure the privacy, confidentiality, integrity, and availability of County Information Assets (PSCI) as defined in Subparagraph

Related to INFORMATION TECHNOLOGY, SECURITY AND PRIVACY REQUIREMENTS

  • Information Technology The following applies to all contracts for information technology commodities and contractual services. “Information technology” is defined in section 287.012(15), F.S., to have the same meaning as provided in section 282.0041, F.S.

  • Information Technology Accessibility Standards Any information technology related products or services purchased, used or maintained through this Grant must be compatible with the principles and goals contained in the Electronic and Information Technology Accessibility Standards adopted by the Architectural and Transportation Barriers Compliance Board under Section 508 of the federal Rehabilitation Act of 1973 (29 U.S.C. §794d), as amended. The federal Electronic and Information Technology Accessibility Standards can be found at: ▇▇▇▇://▇▇▇.▇▇▇▇▇▇-▇▇▇▇▇.▇▇▇/508.htm.

  • Data Security and Privacy Except as would not, individually or in the aggregate, reasonably be expected to be material to the business of the Company Group, taken as a whole, the Company and each of its Subsidiaries (i) is in compliance with all Data Security Requirements and (ii) has taken commercially reasonable steps consistent with standard industry practice by companies of similar size and maturity, and in compliance in all material respects with all Data Security Requirements to protect (A) the confidentiality, integrity, availability and security of its Business Systems that are involved in the Processing of Personally Identifiable Information, in the conduct of the business of the Company and its Subsidiaries as currently conducted; and (B) Personally Identifiable Information Processed by or on behalf of the Company or such Subsidiary or on their behalf from unauthorized use, access, disclosure, theft and modification. Except as would not, individually or in the aggregate, reasonably be expected to be material to the business of the Company Group, taken as a whole, (i) there are, and since January 1, 2022, have been, no pending complaints, investigations, inquiries, notices, enforcement proceedings, or Actions by or before any Governmental Authority and (ii) since January 1, 2022, no fines or other penalties have been imposed on or written claims, notice, complaints or other communications have been received by the Company or any Subsidiary, relating to any Specified Data Breach or alleging non-compliance with any Data Security Requirement. The Company and each of its Subsidiaries have not, since January 1, 2022, (1) experienced any Specified Data Breaches, or (2) been involved in any Legal Proceedings related to or alleging any violation of any Data Security Requirements by the Company Group or any Specified Data Breaches, each except as would not be material to the business of the Company Group, taken as a whole. The consummation of the transactions contemplated by this Agreement will not cause the Company Group to breach any Data Security Requirement, except as would not reasonably be expected to be material to the business of the Company Group, taken as a whole.

  • Security and Privacy Security and privacy policies for the Genesys Cloud Service addressing use of Customer Data, which are incorporated by reference and may be updated from time to time in accordance with Section 10.12 of the Agreement, are located at ▇▇▇▇▇://▇▇▇▇.▇▇▇▇▇▇▇▇▇▇▇.▇▇▇/articles/purecloud-security-compliance/.

  • Information Technology Enterprise Architecture Requirements If this Contract involves information technology-related products or services, the Contractor agrees that all such products or services are compatible with any of the technology standards found at ▇▇▇▇▇://▇▇▇.▇▇.▇▇▇/iot/2394.htm that are applicable, including the assistive technology standard. The State may terminate this Contract for default if the terms of this paragraph are breached.