Computing and Communication Sample Clauses
The Computing and Communication clause establishes the requirements and standards for the use of computer systems, software, and communication technologies within the scope of the agreement. It typically outlines the responsibilities of each party regarding the provision, maintenance, and security of hardware, software, and network access, and may address issues such as data transmission protocols, acceptable use policies, and confidentiality of electronic communications. By clearly defining these expectations, the clause helps prevent misunderstandings, ensures smooth technological collaboration, and mitigates risks related to data breaches or system failures.
Computing and Communication. Party shall select, in consultation with the Agency of Human Services’ Information Technology unit, one of the approved methods for secure access to the State’s systems and data, if required. Approved methods are based on the type of work performed by the Party as part of this agreement.
Computing and Communication. The Contractor shall select, in consultation with the Agency of Human Services’ Information Technology unit, one of the approved methods for secure access to the State’s systems and data, if required. Approved methods are based on the type of work performed by the Contractor as part of this agreement. Options include, but are not limited to:
1. Contractor’s provision of certified computing equipment, peripherals and mobile devices, on a separate Contractor’s network with separate internet access. The Agency of Human Services’ accounts may or may not be provided.
2. State supplied and managed equipment and accounts to access state applications and data, including State issued active directory accounts and application specific accounts, which follow the National Institutes of Standards and Technology (NIST) security and the Health Insurance Portability & Accountability Act (HIPAA) standards. The State will not supply e-mail accounts to the Contractor.
Computing and Communication. The Grantee shall select, in consultation with the Agency of Human Services’ Information Technology unit, one of the approved methods for secure access to the State’s systems and data, if required. Approved methods are based on the type of work performed by the Grantee as part of this agreement. Options include, but are not limited to:
1. Grantee’s provision of certified computing equipment, peripherals and mobile devices, on a separate Grantee’s network with separate internet access. The Agency of Human Services’ accounts may or may not be provided.
2. State supplied and managed equipment and accounts to access state applications and data, including State issued active directory accounts and application specific accounts, which follow the National Institutes of Standards and Technology (NIST) security and the Health Insurance Portability & Accountability Act (HIPAA) standards. The State will not supply e-mail accounts to the Grantee.
Computing and Communication. Party shall select, in consultation with the Agency of Human Services’ Information Technology unit, one of the approved methods for secure access to the State’s systems and data, if required. Approved methods are based on the type of work performed by the Party as part of this agreement. Options include, but are not limited to: Party’s provision of certified computing equipment, peripherals and mobile devices, on a separate Party’s network with separate internet access. The Agency of Human Services’ accounts may or may not be provided. State supplied and managed equipment and accounts to access state applications and data, including State issued active directory accounts and application specific accounts, which follow the National Institutes of Standards and Technology (NIST) security and the Health Insurance Portability & Accountability Act (HIPAA) standards.
Computing and Communication. Contractor shall select, in consultation with the Agency of Human Services’ Information Technology unit, one of the approved methods for secure access to the State’s systems and data, if required. Approved methods are based on the type of work performed by the Contractor as part of this agreement. Options include, but are not limited to:
Computing and Communication. The Subrecipient shall select, in consultation with the Agency of Human Services’ Information Technology unit, one of the approved methods for secure access to the State’s systems and data, if required. Approved methods are based on the type of work performed by the Subrecipient as part of this agreement. Options include, but are not limited to:
1. Subrecipient’s provision of certified computing equipment, peripherals and mobile devices, on a separate Subrecipient’s network with separate internet access. The Agency of Human Services’ accounts may or may not be provided.
2. State supplied and managed equipment and accounts to access state applications and data, including State issued active directory accounts and application specific accounts, which follow the National Institutes of Standards and Technology (NIST) security and the Health Insurance Portability & Accountability Act (HIPAA) standards. The State will not supply e-mail accounts to the Subrecipient.
Computing and Communication. The Educational State shall select, in consultation with the Agency of Human Services’ Information Technology unit, one of the approved methods for secure access to the State’s systems and data, if required. Approved methods are based on the type of work performed by the Educational State as part of this agreement. Options include, but are not limited to:
1. Educational State’s provision of certified computing equipment, peripherals and mobile devices, on a separate Educational State’s network with separate internet access. The Agency of Human Services’ accounts may or may not be provided.
2. State supplied and managed equipment and accounts to access state applications and data, including State issued active directory accounts and application specific accounts, which follow the National Institutes of Standards and Technology (NIST) security and the Health Insurance Portability & Accountability Act (HIPAA) standards. The State will not supply e-mail accounts to the Educational State.