8-4 Information Technology

8-4.1 Definitions

Computer A device capable of accepting data, performing prescribed operations on the data, and supplying the results of those operations. It includes any device that operates on (1) discrete data by performing arithmetic and logic processes on the data or (2) analog data by performing physical processes on the data.

Computer software Computer programs, computer databases, and their documentation.

Hardware Computers and peripheral machines.

IT Encompasses all types and categories of computer, networking, and telecommunications systems (where voice and/or data may be transmitted by cable, telephone, or wireless), and all associated hardware, firmware, software, and services. This includes emerging technologies that collect and transmit information such as wireless handheld data collection devices, information kiosks, electronic commerce services, distance learning systems, World Wide Web sites, multimedia, and office equipment such as fax machines and copiers. IT also includes IT and any equipment or interconnected system or subsystem of equipment that is used in the creation, conversion, or duplication of data or information. IT does not include any equipment that contains embedded technology that is used as an integral part of the product but the principal function of which is not the acquisition, storage, manipulation, management, movement, control, display, switching, interchange, transmission, or reception of data or information. For example, HVAC (heating, ventilation, and air conditioning) equipment, such as thermostats or temperature control devices and medical equipment where IT is integral to its operation is not IT.

System life cost All costs associated with acquiring, operating, and maintaining an information system, including conversion, environmental (such as HVAC), training, and support service costs from the date the system is acquired until it is no longer needed for Postal Service use.

Information Security The protection afforded to information and information resources to protect the integrity, confidentiality, and availability of Postal Service information and the interests of the Postal Service, suppliers, and the public. Security measures, including personnel security, physical and environmental security, application security, hardware and software security, and network and communications security, may be applied to IT resources.

Undue burden A significant difficulty or expense.