SECURITY REQUIREMENTS AND STAFF VETTING Sample Clauses

SECURITY REQUIREMENTS AND STAFF VETTING. 16.1 The CONTRACTOR shall comply, and shall procure the compliance of the CONTRACTOR Personnel, with the Security Policy and the Security Management Plan and the CONTRACTOR shall ensure that the Security Management Plan produced by the CONTRACTOR fully complies with the Security Policy.
AutoNDA by SimpleDocs
SECURITY REQUIREMENTS AND STAFF VETTING. The CONTRACTOR shall comply, and shall procure the compliance of the CONTRACTOR Personnel, with the Security Policy and the Security Management Plan and the CONTRACTOR shall ensure that the Security Management Plan produced by the CONTRACTOR fully complies with the Security Policy. The CUSTOMER shall notify the CONTRACTOR of any changes or proposed changes to the Security Policy. If the CONTRACTOR believes that a change or proposed change to the Security Policy will have a material and unavoidable cost implication to the Ordered IT Products it may submit a Contract Change Note. In doing so, the CONTRACTOR must support its request by providing evidence of the cause of any increased costs and the steps that it has taken to mitigate those costs. Any change to the Charges shall then be agreed in accordance with the Contract Change Procedure. Until and/or unless a change to the Charges is agreed by the CUSTOMER pursuant to Clause 16.3 the CONTRACTOR shall continue to provide the Ordered IT Products in accordance with its existing obligations. The CONTRACTOR shall, as an enduring obligation throughout the Term, use the latest versions of anti-virus definitions and software available from an industry accepted anti-virus software vendor to check for, contain the spread of, and minimise the impact of Malicious Software in the ICT Environment (or as otherwise agreed by the parties). Notwithstanding Clause 16.5, if Malicious Software is found, the parties shall co-operate to reduce the effect of the Malicious Software and, particularly if Malicious Software causes loss of operational efficiency or loss or corruption of CUSTOMER Data, assist each other to mitigate any losses and to restore the Ordered IT Products to their desired operating efficiency. Any cost arising out of the actions of the parties taken in compliance with the provisions of Clause 16.6 shall be borne by the parties as follows: by the CONTRACTOR where the Malicious Software originates from the CONTRACTOR Software, the Third Party Software supplied by the CONTRACTOR (except where the CUSTOMER has waived the obligation set out in Clause 16.5) or the CUSTOMER Data (whilst the CUSTOMER Data was under the control of the CONTRACTOR) unless the CONTRACTOR can demonstrate that such Malicious Software was present and not quarantined or otherwise identified by the CUSTOMER when provided to the CONTRACTOR; and by the CUSTOMER if the Malicious Software originates from the CUSTOMER Software (in respect of which ...
SECURITY REQUIREMENTS AND STAFF VETTING. 16.1 The SERVICE PROVIDER shall comply, and shall procure the compliance of the SERVICE PROVIDER Personnel, with the Security Policy and the Security Management Plan and the SERVICE PROVIDER shall ensure that the Security Management Plan produced by the SERVICE PROVIDER fully complies with the Security Policy.

Related to SECURITY REQUIREMENTS AND STAFF VETTING

  • Security Requirements 11.1 The Supplier shall comply, and shall procure the compliance of the Suppliers Personnel, with the Security Policy and the Security Plan and the Supplier shall ensure that the Security Plan produced by the Supplier fully complies with the Security Policy.

  • Facility Requirements 1. Maintain wheelchair accessibility to program activities according to governing law, including the Americans With Disabilities Act (ADA), as applicable.

  • City Requirements Design, construction, materials, sizing, other specifications, permitting, inspections, testing, documentation and furnishing of as-built drawings, and acceptance of completed infrastructure shall be in accordance with City Requirements. Design and construction shall be by professionals licensed in the state of North Carolina to do the relevant work. City approval of the design of the Improvements shall be required prior to construction, as set forth in City Requirements. If Developer is connecting to the County sewer system, the City may require Developer to furnish the contract providing for such connection.

  • E-Verify Requirements To the extent applicable under ARIZ. REV. STAT. § 41- 4401, the Contractor and its subcontractors warrant compliance with all federal immigration laws and regulations that relate to their employees and their compliance with the E-verify requirements under ARIZ. REV. STAT. § 23-214(A). Contractor’s or its subcontractor’s failure to comply with such warranty shall be deemed a material breach of this Agreement and may result in the termination of this Agreement by the City.

  • Accessibility Requirements Under Tex. Gov’t Code Chapter 2054, Subchapter M, and implementing rules of the Texas Department of Information Resources, the System Agency must procure Products and services that comply with the Accessibility Standards when those Products are available in the commercial marketplace or when those Products are developed in response to a procurement solicitation. Accordingly, Grantee must provide electronic and information resources and associated Product documentation and technical support that comply with the Accessibility Standards.

  • Federal Medicaid System Security Requirements Compliance Party shall provide a security plan, risk assessment, and security controls review document within three months of the start date of this Agreement (and update it annually thereafter) in order to support audit compliance with 45 CFR 95.621 subpart F, ADP System Security Requirements and Review Process.

  • Data Security Requirements A. Data Transport. When transporting Confidential Information electronically, including via email, the data will be protected by:

  • Information Security Requirements In cases where the State is not permitted to manage/modify the automation equipment (server/computer/other) that controls testing or monitoring devices, the Contractor agrees to update and provide patches for the automation equipment and any installed operating systems or applications on a quarterly basis (at minimum). The Contractor will submit a report to the State of updates installed within 30 days of the installation as well as a Plan of Actions and Milestones (POA&M) to remediate any vulnerabilities ranging from Critical to Low. The contractor will provide an upgrade path or compensatory security controls for any operating systems and applications listed as beyond “end-of-life” or EOL, within 90 days of the EOL and complete the EOL system’s upgrade within 90 days of the approved plan.

  • TITLE VI REQUIREMENTS H-GAC in accordance with the provisions of Title VI of the Civil Rights Act of 1964 (78 Xxxx. 000, 00 X.X.X. §§ 0000x to 2000d-4) and the Regulations, hereby notifies all bidders that it will affirmatively ensure that any disadvantaged business enterprises will be afforded full and fair opportunity to submit in response to this Agreement and will not be discriminated against on the grounds of race, color, or national origin in consideration for an award.

  • Admission and Graduation Requirements A. The receiving institution’s admission and program admission requirements apply to both direct entry students and to students who transfer under this agreement.

Time is Money Join Law Insider Premium to draft better contracts faster.