Access Control of Contractor Personnel Sample Clauses

Access Control of Contractor Personnel 
AutoNDA by SimpleDocs

Related to Access Control of Contractor Personnel

  • Contractor Personnel Contractor's staff is expected to present a professional appearance. All personnel of the Contractor will be neat, well groomed, properly uniformed in industry standard uniforms and are expected to conduct themselves at all times in a responsible and courteous manner while performing any work under this Agreement and/or whenever they are on District property. The following code of conduct will be adhered to by the Contractor, his agent(s) and/or his employees. If Contractor fails to ensure that its employees or other agents comply with these requirements, then Contractor may be terminated for cause under this Agreement:

  • Access Control Supplier will maintain an appropriate access control policy that is designed to restrict access to Accenture Data and Supplier assets to authorized Personnel. Supplier will require that all accounts have complex passwords that contain letters, numbers, and special characters, be changed at least every 90 days, and have a minimum length of 8 characters.

  • Supervision of Contractor Personnel The Contractor must supply all necessary and sufficient supervision over the work that is being performed and will be held solely responsible for the conduct and performance of his employees or agents involved in work under the Agreement.

  • Contractor Key Personnel ‌ The Contractor shall assign a Corporate OASIS Program Manager (COPM) and Corporate OASIS Contract Manager (COCM) as Contractor Key Personnel to represent the Contractor as primary points-of-contact to resolve issues, perform administrative duties, and other functions that may arise relating to OASIS and task orders solicited and awarded under XXXXX. Additional Key Personnel requirements may be designated by the OCO at the task order level. There is no minimum qualification requirements established for Contractor Key Personnel. Additionally, Contractor Key Personnel do not have to be full-time positions; however, the Contractor Key Personnel are expected to be fully proficient in the performance of their duties. The Contractor shall ensure that the OASIS CO has current point-of-contact information for both the COPM and COCM. In the event of a change to Contractor Key Personnel, the Contractor shall notify the OASIS CO and provide all Point of Contact information for the new Key Personnel within 5 calendar days of the change. All costs associated with Contractor Key Personnel duties shall be handled in accordance with the Contractor’s standard accounting practices; however, no costs for Contractor Key Personnel may be billed to the OASIS Program Office. Failure of Contractor Key Personnel to effectively and efficiently perform their duties will be construed as conduct detrimental to contract performance and may result in activation of Dormant Status and/or Off-Ramping (See Sections H.16. and H.17.).

  • Supervisory Control and Data Acquisition (SCADA) Capability The wind plant shall provide SCADA capability to transmit data and receive instructions from the ISO and/or the Connecting Transmission Owner for the Transmission District to which the wind generating plant will be interconnected, as applicable, to protect system reliability. The Connecting Transmission Owner for the Transmission District to which the wind generating plant will be interconnected and the wind plant Developer shall determine what SCADA information is essential for the proposed wind plant, taking into account the size of the plant and its characteristics, location, and importance in maintaining generation resource adequacy and transmission system reliability in its area.

  • System Access Control Data processing systems used to provide the Cloud Service must be prevented from being used without authorization. Measures: • Multiple authorization levels are used when granting access to sensitive systems, including those storing and processing Personal Data. Authorizations are managed via defined processes according to the SAP Security Policy • All personnel access SAP’s systems with a unique identifier (user ID). • SAP has procedures in place so that requested authorization changes are implemented only in accordance with the SAP Security Policy (for example, no rights are granted without authorization). In case personnel leaves the company, their access rights are revoked. • SAP has established a password policy that prohibits the sharing of passwords, governs responses to password disclosure, and requires passwords to be changed on a regular basis and default passwords to be altered. Personalized user IDs are assigned for authentication. All passwords must fulfill defined minimum requirements and are stored in encrypted form. In the case of domain passwords, the system forces a password change every six months in compliance with the requirements for complex passwords. Each computer has a password-protected screensaver. • The company network is protected from the public network by firewalls. • SAP uses up–to-date antivirus software at access points to the company network (for e-mail accounts), as well as on all file servers and all workstations. • Security patch management is implemented to provide regular and periodic deployment of relevant security updates. Full remote access to SAP’s corporate network and critical infrastructure is protected by strong authentication.

  • Information about Contractor Employees 23.1. The Authority may by notice require the Contractor to disclose such information as the Authority may require relating to those of the Contractor’s employees carrying out activities under or connected with the Framework Agreement.

  • Supplier Personnel The Customer and Supplier agree and acknowledge that in the event of the Supplier ceasing to provide the Services or part of them for any reason, Call Off Schedule 10 (Staff Transfer) shall apply. The Supplier shall not and shall procure that any relevant Sub-Contractor shall not take any step (expressly or implicitly and directly or indirectly by itself or through any other person) without the prior written consent of the Customer to dissuade or discourage any employees engaged in the provision of the Services from transferring their employment to the Customer and/or the Replacement Supplier and/or Replacement Sub-Contractor. During the Termination Assistance Period, the Supplier shall and shall procure that any relevant Sub-Contractor shall: give the Customer and/or the Replacement Supplier and/or Replacement Sub-Contractor reasonable access to the Supplier's personnel and/or their consultation representatives to present the case for transferring their employment to the Customer and/or the Replacement Supplier and/or to discuss or consult on any measures envisaged by the Customer, Replacement Supplier and/or Replacement Sub-Contractor in respect of persons expected to be Transferring Supplier Employees; co-operate with the Customer and the Replacement Supplier to ensure an effective consultation process and smooth transfer in respect of Transferring Supplier Employees in line with good employee relations and the effective continuity of the Services. The Supplier shall immediately notify the Customer or, at the direction of the Customer, the Replacement Supplier of any period of notice given by the Supplier or received from any person referred to in the Staffing Information, regardless of when such notice takes effect. The Supplier shall not for a period of twelve (12) months from the date of transfer re-employ or re-engage or entice any employees, suppliers or Sub-Contractors whose employment or engagement is transferred to the Customer and/or the Replacement Supplier except that this paragraph 10.5 shall not apply where an offer is made pursuant to an express right to make such offer under Call Off Schedule 10.1 (Staff Transfer) in respect of a Transferring Supplier Employee not identified in the Supplier's Final Supplier Personnel List.

  • Contractor Personnel – Reference Checks The Contractor warrants that all persons employed to provide service under this Contract have satisfactory past work records indicating their ability to adequately perform the work under this Contract. Contractor’s employees assigned to this project must meet character standards as demonstrated by background investigation and reference checks, coordinated by the agency/department issuing this Contract.

  • Access Controls a. Authorized Access - DST shall have controls that are designed to maintain the logical separation such that access to systems hosting Fund Data and/or being used to provide services to Fund will uniquely identify each individual requiring access, grant access only to authorized personnel based on the principle of least privileges, and prevent unauthorized access to Fund Data.

Time is Money Join Law Insider Premium to draft better contracts faster.