Information Technology Security Requirements Sample Clauses

Information Technology Security Requirements. Exhibit C, “Information Technology Security Addendum” is attached and incorporated by this reference. Consultant’s failure to comply with the requirements in Exhibit C is a material breach of this Agreement.
Information Technology Security Requirements. This contract ☒shall not ☐shall be subject to Exhibit F, “Information Technology Security,” which is attached and incorporated by this reference. Contractor’s failure to comply with the requirements in Exhibit F is a material breach of this Agreement.
Information Technology Security Requirements. Exhibit E, “Information Technology Security Addendum” is attached and incorporated by this reference. CONSULTANT’s failure to comply with the requirements of Exhibit E is a material breach of this AGREEMENT.
Information Technology Security Requirements. Employees must comply with Teton County security procedures and ensure adequate security measures are in place to protect the equipment and information housed or stored on assigned computers at their alternate work location. Failure to comply with security procedures and regulations may be grounds for disciplinary action.
Information Technology Security Requirements. See Attachment C for Information Technology Security Requirements Summary.

Related to Information Technology Security Requirements

  • Information Technology The following applies to all contracts for information technology commodities and contractual services. “Information technology” is defined in section 287.012(15), F.S., to have the same meaning as provided in section 282.0041, F.S.

  • Information Technology Accessibility Standards Any information technology related products or services purchased, used or maintained through this Grant must be compatible with the principles and goals contained in the Electronic and Information Technology Accessibility Standards adopted by the Architectural and Transportation Barriers Compliance Board under Section 508 of the federal Rehabilitation Act of 1973 (29 U.S.C. §794d), as amended. The federal Electronic and Information Technology Accessibility Standards can be found at: ▇▇▇▇://▇▇▇.▇▇▇▇▇▇-▇▇▇▇▇.▇▇▇/508.htm.

  • Information Technology Enterprise Architecture Requirements If this Contract involves information technology-related products or services, the Contractor agrees that all such products or services are compatible with any of the technology standards found at ▇▇▇▇▇://▇▇▇.▇▇.▇▇▇/iot/2394.htm that are applicable, including the assistive technology standard. The State may terminate this Contract for default if the terms of this paragraph are breached.

  • Data Security Requirements Without limiting Contractor’s obligation of confidentiality as further described in this Contract, Contractor must establish, maintain, and enforce a data privacy program and an information and cyber security program, including safety, physical, and technical security and resiliency policies and procedures, that comply with the requirements set forth in this Contract and, to the extent such programs are consistent with and not less protective than the requirements set forth in this Contract and are at least equal to applicable best industry practices and standards (NIST 800-53).