

The Implementer of this technology has the responsibility to ensure the version deployed is 508-compliant.


This technology has not been assessed by the Section 508 Office. Prior to use of this technology, users should check with their supervisor, Information Security Officer (ISO), Facility Chief Information Officer (CIO), or local Office of Information and Technology (OI&T) representative to ensure that all actions are consistent with current VA policies and procedures prior to implementation. Users must ensure sensitive data is properly protected in compliance with all VA regulations. Users must ensure their use of this technology/standard is consistent with VA policies and standards, including, but not limited to, VA Handbooks 61 VA Directives 6004, 6513, and 6517 and National Institute of Standards and Technology (NIST) standards, including Federal Information Processing Standards (FIPS). For more information on the use of cloud services and cloud-based products within VA, including VA private clouds, please see the Enterprise Cloud Solutions Office (ECSO) Portal at. Cloud services provided by the VAEC and those controlled and managed by an external Cloud Service Provider (i.e. This includes technologies deployed as software on VMs within VA-controlled cloud environments (e.g. The TRM decisions in this entry only apply to technologies and versions owned, operated, managed, patched, and version-controlled by VA. Additionally, this technology can manage Amazon Relational Database Service (RDS) and any other cloud or service offering compatible with MySQL, including Amazon Aurora. This technology creates a connection to one or more databases and allows users to view and manipulate data. This technology is designed to enable users to rapidly create and execute queries, automate database object management, and develop Structured Query Language (SQL) code more efficiently. Tool for Oracle Application Developers (TOAD) for MySQL Freeware is a database development application. More information on the proper use of the TRM can be found on the Technologies must be operated and maintained in accordance with Federal and Department security and
