Campus Security Review Sample Clauses

Campus Security Review. The A/E team will work with stakeholders to identify areas requiring physical security for research grants and contracts, and coordinate recommendations for these areas.
AutoNDA by SimpleDocs

Related to Campus Security Review

  • System Security Review All systems processing and/or storing County PHI or PI must have at least an annual system risk assessment/security review which provides assurance that administrative, physical, and technical controls are functioning effectively and providing adequate levels of protection. Reviews should include vulnerability scanning tools.

  • Data Security Requirements Without limiting Contractor’s obligation of confidentiality as further described in this Contract, Contractor must establish, maintain, and enforce a data privacy program and an information and cyber security program, including safety, physical, and technical security and resiliency policies and procedures, that comply with the requirements set forth in this Contract and, to the extent such programs are consistent with and not less protective than the requirements set forth in this Contract and are at least equal to applicable best industry practices and standards (NIST 800-53).

  • Monitoring and Risk Assessment of Securities Depositories Prior to the placement of any assets of the Fund with a non-U.S. Securities Depository, the Custodian: (a) shall provide to the Fund or its authorized representative an assessment of the custody risks associated with maintaining assets within such Securities Depository; and (b) shall have established a system to monitor the custody risks associated with maintaining assets with such Securities Depository on a continuing basis and to promptly notify the Fund or its Investment Adviser of any material changes in such risk. In performing its duties under this subsection, the Custodian shall use reasonable care and may rely on such reasonable sources of information as may be available including but not limited to: (i) published ratings; (ii) information supplied by a Subcustodian that is a participant in such Securities Depository; (iii) industry surveys or publications; (iv) information supplied by the depository itself, by its auditors (internal or external) or by the relevant Foreign Financial Regulatory Authority. It is acknowledged that information procured through some or all of these sources may not be independently verifiable by the Custodian and that direct access to Securities Depositories is limited under most circumstances. Accordingly, the Custodian shall not be responsible for errors or omissions in its duties hereunder provided that it has performed its monitoring and assessment duties with reasonable care. The risk assessment shall be provided to the Fund or its Investment Advisor by such means as the Custodian shall reasonably establish. Advices of material change in such assessment may be provided by the Custodian in the manner established as customary between the Fund and the Custodian for transmission of material market information.

  • New Hampshire Specific Data Security Requirements The Provider agrees to the following privacy and security standards from “the Minimum Standards for Privacy and Security of Student and Employee Data” from the New Hampshire Department of Education. Specifically, the Provider agrees to: (1) Limit system access to the types of transactions and functions that authorized users, such as students, parents, and LEA are permitted to execute; (2) Limit unsuccessful logon attempts; (3) Employ cryptographic mechanisms to protect the confidentiality of remote access sessions; (4) Authorize wireless access prior to allowing such connections; (5) Create and retain system audit logs and records to the extent needed to enable the monitoring, analysis, investigation, and reporting of unlawful or unauthorized system activity; (6) Ensure that the actions of individual system users can be uniquely traced to those users so they can be held accountable for their actions; (7) Establish and maintain baseline configurations and inventories of organizational systems (including hardware, software, firmware, and documentation) throughout the respective system development life cycles; (8) Restrict, disable, or prevent the use of nonessential programs, functions, ports, protocols, and services; (9) Enforce a minimum password complexity and change of characters when new passwords are created; (10) Perform maintenance on organizational systems; (11) Provide controls on the tools, techniques, mechanisms, and personnel used to conduct system maintenance; (12) Ensure equipment removed for off-site maintenance is sanitized of any Student Data in accordance with NIST SP 800-88 Revision 1; (13) Protect (i.e., physically control and securely store) system media containing Student Data, both paper and digital; (14) Sanitize or destroy system media containing Student Data in accordance with NIST SP 800-88 Revision 1 before disposal or release for reuse; (15) Control access to media containing Student Data and maintain accountability for media during transport outside of controlled areas; (16) Periodically assess the security controls in organizational systems to determine if the controls are effective in their application and develop and implement plans of action designed to correct deficiencies and reduce or eliminate vulnerabilities in organizational systems; (17) Monitor, control, and protect communications (i.e., information transmitted or received by organizational systems) at the external boundaries and key internal boundaries of organizational systems; (18) Deny network communications traffic by default and allow network communications traffic by exception (i.e., deny all, permit by exception); (19) Protect the confidentiality of Student Data at rest; (20) Identify, report, and correct system flaws in a timely manner; (21) Provide protection from malicious code (i.e. Antivirus and Antimalware) at designated locations within organizational systems; (22) Monitor system security alerts and advisories and take action in response; and (23) Update malicious code protection mechanisms when new releases are available.

  • Constructability Review Prepare detailed interdisciplinary constructability review within Fourteen (14) days of receipt of the plans from the District that: 10.1.2.1.6.1 Ensures construction documents are well coordinated and reviewed for errors; 10.1.2.1.6.2 Identifies to the extent known, construction deficiencies and areas of concern; 10.1.2.1.6.3 Back-checks design drawings for inclusion of modifications; and 10.1.2.1.6.4 Provides the District with written confirmation that: 10.1.2.1.6.4.1 Requirements noted in the design documents prepared for the Project are consistent with and conform to the District's Project requirements and design standards. 10.1.2.1.6.4.2 Various components have been coordinated and are consistent with each other so as to minimize conflicts within or between components of the design documents.

  • Diversity Report The Contractor shall report to each Customer, spend with certified and other minority business enterprises. These reports shall include the period covered, the name, minority code and Federal Employer Identification Number of each minority business utilized during the period, Commodities provided by the minority business enterprise, and the amount paid to each minority business on behalf of each purchasing agency ordering under the terms of this Contract.

  • Project Monitoring Reporting and Evaluation The Recipient shall furnish to the Association each Project Report not later than forty-five (45) days after the end of each calendar semester, covering the calendar semester.

  • Office of Inspector General Investigative Findings Expert Review In accordance with Senate Bill 799, Acts 2021, 87th Leg., R.S., if Texas Government Code, Section 531.102(m-1)(2) is applicable to this Contract, Contractor affirms that it possesses the necessary occupational licenses and experience.

  • Periodic Due Diligence Review Borrower acknowledges that Lender has the right to perform continuing due diligence reviews with respect to the Collateral, for purposes of verifying compliance with the representations, warranties and specifications made hereunder, or determining and re-determining the Borrowing Base under Section 2.04(a) hereof, or otherwise, and Borrower agrees that Lender, at its option, has the right at any time to conduct a partial or complete due diligence review on any or all of the Collateral securing the Loans, including, without limitation, ordering new credit reports and Appraisals on the applicable Collateral and otherwise regenerating the information used to originate such Eligible Collateral. Upon reasonable (but no less than one (1) Business Day) prior notice to Borrower, Lender or its authorized representatives will be permitted during normal business hours to examine, inspect, and make copies and extracts of, the Collateral Files and any and all documents, records, agreements, instruments or information relating to such Collateral in the possession or under the control of Borrower and/or Custodian. Borrower also shall make available to Lender a knowledgeable financial or accounting officer for the purpose of answering questions respecting the Collateral Files and the Collateral. Borrower agrees to cooperate with Lender and any third party underwriter designated by Lender in connection with such underwriting, including, but not limited to, providing Lender and any third party underwriter with access to any and all documents, records, agreements, instruments or information relating to such Collateral in the possession, or under the control, of Borrower. Borrower further agrees that Borrower shall reimburse Lender for any and all out-of-pocket costs and expenses incurred by Lender in connection with Lender's activities pursuant to this Section 11.15.

  • Placement of RDDS probes Probes for measuring RDDS parameters shall be placed inside the networks with the most users across the different geographic regions; care shall be taken not to deploy probes behind high propagation-­‐delay links, such as satellite links.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!