Use of Information Systems. The detailed functions that must be provided by an IT system to satisfy the minimum requirements cannot all be described here in specific detail; it is for the implementers to identify possible means of attack and ensure proportionate security mitigations are applied to prevent a successful attack.
Appears in 12 contracts
Sources: Contract for Psychological, Psychiatric and Therapeutic Services, Contract for Physiotherapy Services, G Cloud 14 Call Off Contract
Use of Information Systems. 21 The detailed functions that must be provided by an IT system to satisfy the minimum requirements cannot all be described here in specific detail; it is for the implementers to identify possible means of attack and ensure proportionate security mitigations are applied to prevent a successful attack.
Appears in 2 contracts
Sources: Contract, Contract for Relocation Services
Use of Information Systems. 7.1 The detailed functions that must be provided by an IT system to satisfy the minimum requirements described below cannot all be described here in specific detailhere; it is for the implementers to identify possible means of attack and ensure proportionate security mitigations are applied to prevent a successful attack.
7.2 As a general rule, any communication path between an unauthorised user and the data can be used to carry out an attack on the system or be used to compromise or ex-filtrate data.
7.3 The following describes the minimum security requirements for processing and accessing Sensitive Information on IT systems.
Appears in 1 contract
Sources: Website Services Agreement
Use of Information Systems. The detailed functions that must be provided by an IT system to satisfy the minimum requirements cannot all be described here in specific detail; it is for the implementers to identify possible means of attack and ensure proportionate security se- curity mitigations are applied to prevent a successful attack.
Appears in 1 contract
Sources: Contract
Use of Information Systems. The detailed functions that must be provided by an IT system to satisfy the minimum requirements described below cannot all be described here in specific detailhere; it is for the implementers to identify possible means of attack and ensure proportionate security mitigations are applied to prevent a successful attack.
Appears in 1 contract
Sources: Procurement Tasking Order