The Vendor is required to provide digital visibility in existing (search engines like Google and Bing, forums, social media) and emerging artificial intelligence spaces (perplexity AI-powered answer engine, Google AI overview, AI platforms such as Gemini, Claude, Copilot, etc).
- While they have done a great job adapting and taking advantage of well-established content to improve performance across AI platforms – there is opportunity to step up our efforts to really gain top citation and visibility position across key topics surrounding recruitment while scaling our broader institutional strategy to expand topics and audiences (brand building, donor visibility, etc) beyond recruitment while keeping a consistent and clean approach in places (avoiding duplication or content cannibalization).
- Services include:
• Service Provider shall have formal and up-to-date and in-use documentation, processes, procedures and operations for maintaining cryptographic keys and the lifecycle of cryptographic keys such as cryptographic key generation, cryptographic key storage, cryptographic key rotation and cryptographic key destruction.
• Service Provider shall have formal and up-to-date and in-use documentation, processes, procedures in the event a cryptographic key is intentionally or unintentionally compromised by Service Provider Personnel or a malicious attacker or any other entity.
• Service Provider shall ensure University of Waterloo Personal Information/Data and University of Waterloo Data in any form is encrypted by default using Strong Cryptographic Encryption.
• Service Provider agrees to use Strong Cryptographic Encryption for databases, networks, servers, Systems, System components or any other equipment or devices that collect, process, store or transmit University of Waterloo Personal Information/Data in any form.
• Service Provider shall ensure that Services/Work Product has Strong Cryptographic Encryption for all data that is at rest and Service Provider agrees at minimum to use full disk encryption for all data at rest.
• Service Provider shall ensure that Services/Work Product has Transport Layer Security (TLS) 1.2 or better for all data that is in transit.
• Service Provider shall ensure that Services/Work Product uses the secure Hypertext Transfer Protocol Secure (HTTPS) for any communication using the hypertext transfer protocol.
• Service Provider shall ensure cryptographic keys are used for a single unique purpose to limit the exposure in the event a cryptographic key is compromised.
• Service Provider shall ensure cryptographic keys are protected, securely stored and securely maintained using a Secure Cryptographic System and Service Provider agrees to store cryptographic keys using a Secure Cryptographic System and cipher text and Service Provider agrees not to store under any circumstances cryptographic keys in plain text format.
• Service Provider shall ensure passwords are at minimum encrypted and stored using a Strong Cryptographic Encryption one-way cryptographic hash and cryptographic secret salt. Service Provider shall store the cryptographic secret salt separately from the cryptographic hashed passwords to limit the exposure in the event the hashed passwords are compromised.
• Service Provider shall ensure cryptographic keys are generated using a Secure Cryptographic System by authorized Cryptographic Security Personnel and Service Provider agrees to generate cryptographic keys in a secure physical area.
Set up free email alerts and get notified when new government bids, tenders and procurement opportunities match your industry and location. Choose daily or weekly delivery.