Adequate security The Contractor shall provide adequate security on all covered contractor information systems. To provide adequate security, the Contractor shall implement, at a minimum, the following information security protections:
Adequate Staffing Provider must assign and maintain during the term of this Agreement and any Renewal Terms, an adequate staff of competent personnel that is fully equipped, trained, licensed as appropriate, available as needed, and qualified to perform the Services. If the Board determines, in its sole discretion, that any employee, subcontractor, or other person providing Services for Provider is not performing in accordance with the performance standards or other requirements of this Agreement, including but not limited to negatively affecting the safety or welfare of a CPS student, then the Board shall have the right to direct Provider to remove that person from performing Services under this Agreement.
Adequate Consideration The parties hereto irrevocably stipulate and agree that they have each received adequate and independent consideration for the performance of the obligations they have undertaken pursuant to this Amendment.
Documenting and Reporting Breaches 6.1 Business Associate shall report to Covered Entity any Breach of Unsecured PHI, including Breaches reported to it by a Subcontractor, as soon as it (or any of its employees or agents) becomes aware of any such Breach, and in no case later than two (2) business days after it (or any of its employees or agents) becomes aware of the Breach, except when a law enforcement official determines that a notification would impede a criminal investigation or cause damage to national security.
Handling Sensitive Personal Information and Breach Notification A. As part of its contract with HHSC Contractor may receive or create sensitive personal information, as section 521.002 of the Business and Commerce Code defines that phrase. Contractor must use appropriate safeguards to protect this sensitive personal information. These safeguards must include maintaining the sensitive personal information in a form that is unusable, unreadable, or indecipherable to unauthorized persons. Contractor may consult the “Guidance to Render Unsecured Protected Health Information Unusable, Unreadable, or Indecipherable to Unauthorized Individuals” issued by the U.S. Department of Health and Human Services to determine ways to meet this standard.
Reporting and Documenting Breaches 6.1 Business Associate shall Report to Covered Entity any Breach of Unsecured PHI as soon as it, or any Person to whom PHI is disclosed under this Agreement, becomes aware of any such Breach, and in no event later than five (5) business days after such awareness, except when a law enforcement official determines that a notification would impede a criminal investigation or cause damage to national security. Such Report shall be timely made notwithstanding the fact that little information may be known at the time of the Report and need only include such information then available.
Restrictive Controls Either Party may use protective network traffic management controls such as 7-digit and 10-digit code gaps set at appropriate levels on traffic toward each other's network, when required, to protect the public switched network from congestion due to facility failures, switch congestion, or failure or focused overload. CLEC and CenturyLink will immediately notify each other of any protective control action planned or executed.
THE ACADEMY 2.1 The Company will establish and maintain, and carry on or provide for the carrying on of the Academy in accordance with the Master Agreement and this Agreement.
Competition By accepting this Contract, Contractor agrees that no collusion or other restraint of free competitive bidding, either directly or indirectly, has occurred in connection with this award by the Division of Purchases.