Attributes and Metrics Sample Clauses

Attributes and Metrics. ĐĐŽƌĚŝŶŐ ƚŽ E/^d ŝŶ ΀ϵ΁͕ ͞ƚŚĞ dƌƵƐƚ ƌĞůĂƚŝŽŶ ůĞĂĚĞƌƐͬĞrdžusĞt aĐndƵTrƚusŝtwǀorĞthƐine͟ss͘ar e adssociated with different attributes describing one aspect of the Trust respectively Trustworthiness performance, and each of which being associated with metrics. Metrics are commonly used in a wide range of disciplines. In IT technology, a security metric is a description of a process that measures a particular characteristic of an information system. They provide Key Performance Indicators (KPIs) of the information security management system. ETSI Security and Trust Guidance for NFV [8] works on the Trust relationship within and between VNFs. It exposes that trust hangs on contextual parameters which will serve as Attributes for Trust evaluation. The most decisive is the Time (elapsed since last relation). Others are Geographical location, Jurisdiction/regulatory location (public/private), Logical (network) location, hardware capabilities, Hardware provenance and history, Software capabilities, Execution instance history, Chain of trust, Time elapsed since last trust audit/check, Date, Time of day, Ownership of hardware, Security of network, Appropriate use of encryption techniques, Extent to which the software is initially hardened, Measures in place to maintain the integrity of the software, and Physical security of the various locations over which the NFV components are deployed. The Cloud Audit Metrics Catalog of the Cloud Security Alliance [13] proposes a catalog of security metrics for an information system. There are 34 of them. To present some of them, let's give some examples: percentage of running production code that can be directly traced back to automated security and quality tests that verify the compliance of each build, or the percentage of critical vulnerabilities that are not fixed or marked within the time specified by the policy. Each metric is associated with a description, an expression (often mathematical), rules and a target objective for the Information system to be performing. Trust in an IT system could be defined as the ability of the system to fulfil equal or higher scores than the objectives recommended for the security attributes in the catalog. Here, the security attributes play the role of Trustworthiness attributes. [12] proposes six high level Trustworthiness attributes: Resilience, Security, Privacy, Safety, Reliability, and Availability.
AutoNDA by SimpleDocs

Related to Attributes and Metrics

  • Program Evaluation The School District and the College will develop a plan for the evaluation of the Dual Credit program to be completed each year. The evaluation will include, but is not limited to, disaggregated attendance and retention rates, GPA of high-school-credit-only courses and college courses, satisfactory progress in college courses, state assessment results, SAT/ACT, as applicable, TSIA readiness by grade level, and adequate progress toward the college-readiness of the students in the program. The School District commits to collecting longitudinal data as specified by the College, and making data and performance outcomes available to the College upon request. HB 1638 and SACSCOC require the collection of data points to be longitudinally captured by the School District, in collaboration with the College, will include, at minimum: student enrollment, GPA, retention, persistence, completion, transfer and scholarships. School District will provide parent contact and demographic information to the College upon request for targeted marketing of degree completion or workforce development information to parents of Students. School District agrees to obtain valid FERPA releases drafted to support the supply of such data if deemed required by counsel to either School District or the College. The College conducts and reports regular and ongoing evaluations of the Dual Credit program effectiveness and uses the results for continuous improvement.

  • Manufacturing Standards All forest products except poles, produced and sold under this contract will be manufactured to maximize the amount of logs meeting preferred log lengths and to achieve the average log length listed. Agreement No. Sort # Scaling Rule 97318 3 WS Average Log Length Preferred Log Lengths "WS" indicates that west side scaling rules apply. Minimum trim is 8 inches per scaling segment for west side scaling rules. "ES" indicates that east side scaling rules apply. Minimum trim is 4 inches per scaling segment for east side scaling rules. Poles produced under this contract will be manufactured to ANSI specifications (American National Standard Specifications and Dimensions for Wood Poles), in force at the time of signing this contract.

  • Payment for Labor and Materials The Contractor agrees and binds itself to pay for all labor done, and for all the materials used in the construction of the work to be completed pursuant to this contract.

  • STATEWIDE ACHIEVEMENT TESTING When CONTRACTOR is an NPS, per implementation of Senate Bill 484, CONTRACTOR shall administer all Statewide assessments within the California Assessment of Student Performance and Progress (“CAASP”), Desired Results Developmental Profile (“DRDP”), California Alternative Assessment (“CAA”), achievement and abilities tests (using LEA-authorized assessment instruments), the Fitness Gram with the exception of the English Language Proficiency Assessments for California (“ELPAC”) to be completed by the LEA, and as appropriate to the student, and mandated by XXX xxxxxxxx to LEA and state and federal guidelines. CONTRACTOR is subject to the alternative accountability system developed pursuant to Education Code section 52052, in the same manner as public schools. Each LEA student placed with CONTRACTOR by the LEA shall be tested by qualified staff of CONTRACTOR in accordance with that accountability program. XXX shall provide test administration training to CONTRACTOR’S qualified staff. CONTRACTOR shall attend LEA test training and comply with completion of all coding requirements as required by XXX.

  • Procurement for Goods and Works 3. Except as ADB may otherwise agree, Goods and Works shall only be procured on the basis of the methods of procurement set forth below: International Competitive Bidding National Competitive Bidding Shopping The methods of procurement are subject to, among other things, the detailed arrangements and threshold values set forth in the Procurement Plan. The Borrower may only modify the methods of procurement or threshold values with the prior agreement of ADB, and modifications must be set out in updates to the Procurement Plan.

  • PAYMENT FOR GOODS AND SERVICES a. DIR Customer shall comply with Chapter 2251, Texas Government Code, or applicable local law, in making payments to the Vendor. Payment under a DIR Contract shall not foreclose the right to recover wrongful payments.

  • Supplier Diversity Seller shall comply with Xxxxx’s Supplier Diversity Program in accordance with Appendix V.

  • Medicines To be filled in if your child requires medication as part of an individual health plan, for example for an on-going condition such as asthma or eczema etc and is for the use of that child only. For staff: Individual health plan sighted and a copy taken: Tick One: Yes No Name of medicine: Method and dose of medicine: When does the medicine need to be taken: (State time or specific symptoms) Parent/Guardian Signature: Date: / /  Enrolment Details: Date of Enrolment: / / Date of Entry: / / Date of Exit: / / Please Note: 20 Hours ECE is for up to six hours per day, up to 20 hours per week and there must be no compulsory fees when a child is receiving 20 Hours ECE funding. Days Enrolled: Monday Tuesday Wednesday Thursday Friday Times Enrolled: Total hours: For 20 Hours ECE fill out boxes below with the hours attested e.g. 6 hours 20 Hours ECE at this service Total hours: 20 Hours ECE at another service Total hours: Parent/Guardian Signature: Date: / /  20 Hours ECE Attestation:

  • Products Products available under this Contract are limited to Software, including Software as a Service, products and related products as specified in Appendix C, Pricing Index. Vendor may incorporate changes to their product offering; however, any changes must be within the scope of products awarded based on the posting described in Section 1.B above. Vendor may not add a manufacturer’s product line which was not included in the Vendor’s response to the solicitation described in Section 1.B above.

  • API If the Software offers integration capabilities via an API, your use of the API may be subject to additional costs or Sage specific policies and terms and conditions (which shall prevail in relation to your use of the API). You may not access or use the API in any way that could cause damage to us or the Software, or in contravention of any applicable laws. We reserve the right in our sole discretion, to: (i) update any API from time to time; (ii) place limitations around your use of any API; and (iii) deny you access to any API in the event of misuse by you or to otherwise protect our legitimate interests.

Time is Money Join Law Insider Premium to draft better contracts faster.