Procurement of Goods Part A: General Goods shall be procured in accordance with the provisions of Section I of the "Guidelines for Procurement under IBRD Loans and XXX Credits" published by the Bank in January 1995 and revised in January 1996 (the Guidelines) and the following provisions of this Section, as applicable. Part B: International Competitive Bidding
Prescription Safety Glasses Prescription safety glasses will be furnished by the employer. The employer retains the authority to establish reasonable rules and procedures regarding frequency of issue, replacement of damaged glasses, limits on reimbursement costs and coordination with the employer's vision plan.
Malicious Use of Orphan Glue Records Registry Operator shall take action to remove orphan glue records (as defined at xxxx://xxx.xxxxx.xxx/en/committees/security/sac048.pdf) when provided with evidence in written form that such records are present in connection with malicious conduct.
Cybersecurity; Data Protection To the Company’s knowledge, the Company and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (collectively, the “Personal Data”)) used in connection with their businesses, and there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same, except in each case as would not reasonably be expected to have a Material Adverse Effect. The Company and its subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification.
Acts of God, etc FIIOC and FSC shall not be liable for delays or errors occurring by reason of circumstances beyond its control, including but not limited to acts of civil or military authority, national emergencies, work stoppages, fire, flood, catastrophe, acts of God, insurrection, war, riot, or failure of communication equipment of common carriers or power supply. In the event of equipment breakdowns beyond its control, FIIOC and FSC, as applicable, shall, at no additional expense to any Trust, take reasonable steps to minimize service interruptions and mitigate their effects but shall have no liability with respect thereto. FIIOC and FSC shall enter into and shall maintain in effect with appropriate parties one or more agreements making reasonable provision for emergency use of electronic data processing equipment.
Procurement of Goods and Services (a) If the HSP is subject to the procurement provisions of the BPSAA, the HSP will abide by all directives and guidelines issued by the Management Board of Cabinet that are applicable to the HSP pursuant to the BPSAA. (b) If the HSP is not subject to the procurement provisions of the BPSAA, the HSP will have a procurement policy in place that requires the acquisition of supplies, equipment or services valued at over $25,000 through a competitive process that ensures the best value for funds expended. If the HSP acquires supplies, equipment or services with the Funding it will do so through a process that is consistent with this policy.
Anti-slavery and human trafficking The Supplier shall: ensure that slavery and human trafficking is not taking place in any part of its business or in any part of its supply chain; implement due diligence procedures for its own suppliers, subcontractors and other participants in its supply chains, to ensure that there is no slavery or human trafficking in its supply chains; respond promptly to all slavery and human trafficking due diligence questionnaires issued to it by the British Council from time to time and ensure that its responses to all such questionnaires are complete and accurate; and notify the British Council as soon as it becomes aware of any actual or suspected slavery or human trafficking in any part of its business or in a supply chain which has a connection with this Agreement. If the Supplier fails to comply with any of its obligations under clause 13.1, without prejudice to any other rights or remedies which the British Council may have, the British Council shall be entitled to: terminate this Agreement without liability to the Supplier immediately on giving notice to the Supplier; and/or reduce, withhold or claim a repayment (in full or in part) of the charges payable under this Agreement; and/or share with third parties information about such non-compliance.
Technical Safeguards 1. USAC and DSS will process the data matched and any data created by the match under the immediate supervision and control of authorized personnel to protect the confidentiality of the data, so unauthorized persons cannot retrieve any data by computer, remote terminal, or other means. 2. USAC and DSS will strictly limit authorization to these electronic data areas necessary for the authorized user to perform their official duties. All data in transit will be encrypted using algorithms that meet the requirements of the Federal Information Processing Standard (FIPS) Publication 140-2 or 140-3 (when applicable). 3. Authorized system users will be identified by User ID and password, and individually tracked to safeguard against the unauthorized access and use of the system. System logs of all user actions will be saved, tracked and monitored periodically. 4. USAC will transmit data to DSS via encrypted secure file delivery system. For each request, a response will be sent back to USAC to indicate success or failure of transmission.
Contract (Rights of Third Parties) Xxx 0000 22.1 No person who is not a party to this Grant Agreement shall have the right to enforce any of its terms.
Security Protocols Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.