Technology Security Requirements Sample Clauses

The Technology Security Requirements clause sets out the standards and obligations for protecting information systems and data from unauthorized access, breaches, or other security threats. It typically requires parties to implement specific technical and organizational measures, such as encryption, access controls, regular security assessments, and incident response protocols. By establishing clear security expectations, this clause helps prevent data breaches and ensures compliance with relevant laws and industry standards, thereby reducing the risk of security incidents and associated liabilities.
Technology Security Requirements. The security requirements in this document reflect the applicable requirements of Standard 141.10 (▇▇▇▇▇://▇▇▇▇.▇▇.▇▇▇/policies) of the Office of the Chief Information Officer for the state of Washington, which by this reference are incorporated into this agreement. The Subcontractor acknowledges it is required to comply with WaTech Office of Chief Information Officer (OCIO) IT Security Policy 141 and OCIO IT Security Standard 141.10, Securing Information Technology Assets. OCIO IT Security Standard 141.10, Securing Information Technology Assets, applies to all Superintendent assets stored as part of a service, application, data, system, portal, module, components or plug-in product(s) that are secured as defined by the WaTech OCIO's IT Security Policy 141 and OCIO IT Security Standard 141.10, Securing Information Technology Assets. As part of OCIO IT Security Standard 141.10, a design review checklist and/or other action may be required. These activities will be managed and coordinated between AWC and the Subcontractor. Any related costs to performing these activities shall be at the expense of the Subcontractor. Any such activities and resulting checklist and/or other products must be shared with AWC.
Technology Security Requirements. Grantee must ensure that all data and devices used to carry out Program follow all applicable state and federal data privacy and protection requirements. Grantee must ensure that data is properly secured and protected from outside intrusion from parties not association with the Program.

Related to Technology Security Requirements

  • Security Requirements 7.1 The Authority will review the Contractor’s Security Plan when submitted by the Contractor in accordance with the Schedule (Security Requirements and Plan) and at least annually thereafter.

  • Data Security Requirements Without limiting Contractor’s obligation of confidentiality as further described in this Contract, Contractor must establish, maintain, and enforce a data privacy program and an information and cyber security program, including safety, physical, and technical security and resiliency policies and procedures, that comply with the requirements set forth in this Contract and, to the extent such programs are consistent with and not less protective than the requirements set forth in this Contract and are at least equal to applicable best industry practices and standards (NIST 800-53).

  • Federal Medicaid System Security Requirements Compliance Party shall provide a security plan, risk assessment, and security controls review document within three months of the start date of this Agreement (and update it annually thereafter) in order to support audit compliance with 45 CFR 95.621 subpart F, ADP System Security Requirements and Review Process.

  • Accessibility Requirements Under Tex. Gov’t Code Chapter 2054, Subchapter M, and implementing rules of the Texas Department of Information Resources, the System Agency must procure Products and services that comply with the Accessibility Standards when those Products are available in the commercial marketplace or when those Products are developed in response to a procurement solicitation. Accordingly, Grantee must provide electronic and information resources and associated Product documentation and technical support that comply with the Accessibility Standards.