Common use of Use of Information Systems Clause in Contracts

Use of Information Systems. The detailed functions that must be provided by an IT system to satisfy the minimum requirements cannot all be described here in specific detail; it is for the implementers to identify possible means of attack and ensure proportionate security mitigations are applied to prevent a successful attack.

Appears in 12 contracts

Sources: Contract for Psychological, Psychiatric and Therapeutic Services, Contract for Physiotherapy Services, G Cloud 14 Call Off Contract

Use of Information Systems. 21 The detailed functions that must be provided by an IT system to satisfy the minimum requirements cannot all be described here in specific detail; it is for the implementers to identify possible means of attack and ensure proportionate security mitigations are applied to prevent a successful attack.

Appears in 2 contracts

Sources: Contract, Contract for Relocation Services

Use of Information Systems. 7.1 The detailed functions that must be provided by an IT system to satisfy the minimum requirements described below cannot all be described here in specific detailhere; it is for the implementers to identify possible means of attack and ensure proportionate security mitigations are applied to prevent a successful attack. 7.2 As a general rule, any communication path between an unauthorised user and the data can be used to carry out an attack on the system or be used to compromise or ex-filtrate data. 7.3 The following describes the minimum security requirements for processing and accessing Sensitive Information on IT systems.

Appears in 1 contract

Sources: Website Services Agreement

Use of Information Systems. The detailed functions that must be provided by an IT system to satisfy the minimum requirements cannot all be described here in specific detail; it is for the implementers to identify possible means of attack and ensure proportionate security se- curity mitigations are applied to prevent a successful attack.

Appears in 1 contract

Sources: Contract

Use of Information Systems. The detailed functions that must be provided by an IT system to satisfy the minimum requirements described below cannot all be described here in specific detailhere; it is for the implementers to identify possible means of attack and ensure proportionate security mitigations are applied to prevent a successful attack.

Appears in 1 contract

Sources: Procurement Tasking Order