Compliance with Security Requirements Sample Clauses

Compliance with Security Requirements. (a) The Customer shall comply with all Applicable Laws pertaining to security requirements, the Facility Security Plan and any of the Operator’s standing instructions which may be operative at such time. The Operator shall have the right to refuse provision of the Terminal Services to the Customer in the event of the Customer’s non- compliance with any of such laws, regulations, instructions or requirements of the Operator. If a Vessel is at the Terminal at the time of such non-compliance, the Customer undertakes to meet any additional costs resulting from such non- compliance and/or ensure that the berth is vacated immediately upon receipt of written request from the Operator. (b) The Operator undertakes to implement and maintain such security measures necessary to ensure that the Terminal complies with Good Industry Practice and the Applicable Laws in relation to security, including such security measures as required by the ISPS code (together, the Security Measures).
AutoNDA by SimpleDocs
Compliance with Security Requirements. Upon submitting a request for evaluation of a Product to GP pursuant to Section 2.4, Vendor thereby represents and warrants that (i) the conditions contained in Section 2.4 were fully satisfied; (ii) the production of all corresponding Products is and will be in conformance with the Security Requirements; (iii) the Product samples used to generate the Reports for such Product are materially identical to the corresponding Products that will be produced by Vendor or its suppliers and agents; and (iv) the Report results are a fair and accurate representation of Product performance and that Vendor does not dispute the validity of the Report results.
Compliance with Security Requirements. Section 901.
Compliance with Security Requirements. Following the Effective Time, in the event any member of a Party’s Group remains party to any contract with any Governmental Entity (the “Contract Party”), which contract is to be novated to a member of the other Party’s Group (the “Novation Party”) following the Effective Time in accordance with this Agreement, the Contract Party shall take all reasonable measures necessary for such member of the Contract Party Group to maintain any security clearances required to be maintained pursuant to such agreement until such contract is novated to the applicable member of the Novation Party Group in accordance herewith.
Compliance with Security Requirements. To the extent that, in connection with a United States government contract, an agency of the United States government or a contractor requires the Company to restrict access to any properties or information reasonably related to such contract on the basis of Applicable Law with respect to United States national security matters and to the extent that other Applicable Law requires the Company to restrict access to any properties or information and, in accordance with such restrictions, access to certain properties or information may not be given to any Director elected by the Class A Holders without appropriate security clearance, such Director will not be given access to such properties or information and may not participate in deliberations of the Board of Directors or the board of directors of any of the Company's Subsidiaries in which such information with respect to such properties is disclosed. Any such exclusion shall be reflected accurately in the minutes of such deliberations. Without limiting the generality of the foregoing, no Class A Director shall (i) have access to classified information or controlled unclassified information entrusted to the Company except as permissible under the United States Department of Defense Industrial Security Program (the "DISP") and applicable United States laws and regulations, (ii) either seek or accept classified information or controlled unclassified information entrusted to the Company, except as permissible under the DISP or applicable United States laws and regulations, or (iii) fail to advise any committee established by the Company to monitor compliance with national security matters promptly if such Class A Director reasonably believes any violations or attempted violations of, or actions inconsistent with, Applicable Laws or contractual provisions relating to national security matters have occurred.
Compliance with Security Requirements. Business Associate shall comply and shall ensure agents and subcontractors comply with the Security Requirements of 45 CFR Part 142 with respect to electronic transmission of PHI.
Compliance with Security Requirements. The Health Services Manager must: (a) comply with all Australian Government and Department Data security requirements, (b) prohibit and prevent any person who does not have the appropriate level of security clearance from gaining access to Department Data; and (c) notify the Department immediately and comply with all directions of the Department if the Health Services Manager becomes aware of any contravention of Australian Government or Department Data security requirements.
AutoNDA by SimpleDocs
Compliance with Security Requirements. If Covered Entity and Business Associate exchange PHI electronically, Business Associate will comply, and will require any subcontractor or agent involved with such electronic data exchange to comply, with the following security requirements in addition to those set forth in this Agreement and HIPAA. At a minimum, Business Associate and any agent or subcontractor of Business Associate must: (1) subject electronic data files to a virus check prior to transmission to Covered Entity; (2) use or maintain technological systems and procedures to guard against unauthorized access to electronically maintained PHI, including encrypting PHI at rest and PHI in motion with a technology standard that is developed or endorsed by a standards developing organization accredited by the American National Standards Institute. (3) maintain a designated individual to serve as Business Associate’s system security officer responsible for supervising Business Associate’s system security and data integrity, and for communicating with Covered Entity on system security matters; (4) maintain policies and procedures as necessary to prevent unauthorized parties from accessing, using, disclosing, processing, copying, modifying, corrupting, rendering unavailable, introducing computer code into, or otherwise performing unauthorized and undesired activities related to PHI maintained electronically; (5) notify Covered Entity immediately in the event of any proven or suspected incident in which Business Associate has reason to believe any unauthorized person may have had access to the electronic data systems of Business Associate or of Covered Entity (if Business Associate has access to Covered Entity’s data systems to perform its duties under the Arrangement); and (6) assess its information security policies and procedures at least once annually and in response to any material breach of security of Business Associate’s systems.
Compliance with Security Requirements. Business Associate shall comply, and shall ensure agents and subcontractors comply with the Security Requirements of 45 CFR Part 142 with respect to electronic transmission of PHI. By: By: Print: Print: Title: Title: Section I Rates A. Ambulance trips will be paid at the rate set forth by the Illinois Ambulance Transportation Fee Schedule current at the time of transport. B. Ambulance trips for Medicare patients will be paid at the Medicare rate current at the time of transport. Section II Transportation Provider Information A. Federal Tax ID or SS #: 00-0000000 B. If Not For Profit, “Tax Exempt”#: 3 C. State/Commonwealth Medicaid Provider Number (if applicable): All information contained in this Schedule A is current as of the Effective Date of this Agreement.
Compliance with Security Requirements. The Contractor shall comply with all Government security requirements in the building(s) where work is being performed. When a controlled personnel identification access system is used by a Government Agency at a site where work is performed, the Government Agency will be responsible for providing any required access credentials. Credentials shall be displayed at all times or as otherwise required by the Government Agency.
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!