Additional Security Requirements. The following provisions apply in respect of any Additional Security provided:
Additional Security Requirements. Consultant shall comply with the [Port Everglades/ ETS Security Requirements] attached hereto as Exhibit .
Additional Security Requirements. 6.14. Due to the nature of Our and Our Partner’s businesses, particularly with regard to providing criminal record checks and county court judgements or other vetting data, We and Our Partners require) to follow the similar high standards in relation to security around Screening SaaS.
Additional Security Requirements. No Recipient shall download, store or otherwise place confidential information on a portable device or removable media without using password protection and encryption methods that comply with Department approved standards, as defined herein, which standards Department, in its sole discretion, may periodically amend. Such encryption methods must be FIPS-140 compliant and include Advanced Encryption Algorithm (AES) that use a minimum of 128-bit key size.
Additional Security Requirements. Contractor shall comply with the [Port Everglades Security Requirements] [Airport Security Requirements] [RESC Security Requirements] attached hereto as Exhibit . [DELETE IF NOT APPLICABLE]
Additional Security Requirements. Contractor certifies and represents that it will comply with the Airport Security Requirements attached as Exhibit I.
Additional Security Requirements. Contractor certifies and represents that it will comply with the [Port Everglades Security Requirements] [Airport Security Requirements] attached hereto and incorporated herein as Attachment . [DELETE IF NOT APPLICABLE]
Additional Security Requirements. (1) FAR 52.204-9, Personal Identity Verification of Contractor Personnel, January 2011
Additional Security Requirements. Contractor certifies and represents that it will comply with the security requirements of the City and as mandated by the Federal and State governments for treatment plant facilities.
Additional Security Requirements. Implement any additional information security requirements [Non-Federal Entity] reasonably determines necessary to provide adequate security in a dynamic environment; and