Workstation Infrastructure Sample Clauses

The Workstation Infrastructure clause defines the requirements and standards for the computer hardware, software, and network resources provided for employees or contractors to perform their work. It typically outlines specifications for workstations, such as minimum hardware capabilities, approved operating systems, and necessary security measures like antivirus software or access controls. By establishing clear expectations for the technology environment, this clause ensures that all users have reliable and secure tools, reducing operational disruptions and supporting compliance with organizational policies.
Workstation Infrastructure. All agency personnel are provided with a standard desktop workstation that is an Intel based processor using Microsoft's NT workstation operating system. Workstations are connected to a switched Ethernet local area network (LAN). Each NRC location uses the same architecture for its LAN installations. This standardization makes operations and maintenance consistent throughout the agency, and eases implementation of new agency-wide applications and services.

Related to Workstation Infrastructure

  • Workstation Encryption Supplier will require hard disk encryption of at least 256-bit Advanced Encryption Standard (AES) on all workstations and/or laptops used by Personnel where such Personnel are accessing or processing Accenture Data.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store County PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the County Information Security Office.

  • Infrastructure Modification of the location and/or sizing of the infrastructure for the Project that does not materially change the functionality of the infrastructure.

  • Network Interconnection Architecture Each Party will plan, design, construct and maintain the facilities within their respective systems as are necessary and proper for the provision of traffic covered by this Agreement. These facilities include but are not limited to, a sufficient number of trunks to the point of interconnection with the tandem company, and sufficient interoffice and interexchange facilities and trunks between its own central offices to adequately handle traffic between all central offices within the service areas at a P.01 grade of service or better. The provisioning and engineering of such services and facilities will comply with generally accepted industry methods and practices, and will observe the rules and regulations of the lawfully established tariffs applicable to the services provided.

  • Infrastructure Vulnerability Scanning Supplier will scan its internal environments (e.g., servers, network devices, etc.) related to Deliverables monthly and external environments related to Deliverables weekly. Supplier will have a defined process to address any findings but will ensure that any high-risk vulnerabilities are addressed within 30 days.