Compliance with Security Requirements Sample Clauses
Compliance with Security Requirements. (a) The Customer shall comply with all Applicable Laws pertaining to security requirements, the Facility Security Plan and any of the Operator’s standing instructions which may be operative at such time. The Operator shall have the right to refuse provision of the Terminal Services to the Customer in the event of the Customer’s non-compliance with any of such laws, regulations, instructions or requirements of the Operator. If a Vessel is at the Terminal at the time of such non- compliance, the Customer undertakes to meet any additional costs resulting from such non-compliance and/or ensure that the berth is vacated immediately upon receipt of written request from the Operator.
(b) The Operator undertakes to implement and maintain such security measures necessary to ensure that the Terminal complies with Good Industry Practice and the Applicable Laws in relation to security, including such security measures as required by the ISPS code (together, the Security Measures).
Compliance with Security Requirements. Following the Effective Time, in the event any member of a Party’s Group remains party to any contract with any Governmental Entity (the “Contract Party”), which contract is to be novated to a member of the other Party’s Group (the “Novation Party”) following the Effective Time in accordance with this Agreement, the Contract Party shall take all reasonable measures necessary for such member of the Contract Party Group to maintain any security clearances required to be maintained pursuant to such agreement until such contract is novated to the applicable member of the Novation Party Group in accordance herewith.
Compliance with Security Requirements. Upon submitting a request for evaluation of a Product to GP pursuant to Section 2.4, Vendor thereby represents and warrants that (i) the conditions contained in Section 2.4 were fully satisfied; (ii) the production of all corresponding Products is and will be in conformance with the Security Requirements; (iii) the Product samples used to generate the Reports for such Product are materially identical to the corresponding Products that will be produced by Vendor or its suppliers and agents; and (iv) the Report results are a fair and accurate representation of Product performance and that Vendor does not dispute the validity of the Report results.
Compliance with Security Requirements. Section 901.
Compliance with Security Requirements. To the extent that, in connection with a United States government contract, an agency of the United States government or a contractor requires the Company to restrict access to any properties or information reasonably related to such contract on the basis of Applicable Law with respect to United States national security matters and to the extent that other Applicable Law requires the Company to restrict access to any properties or information and, in accordance with such restrictions, access to certain properties or information may not be given to any Director elected by the Class A Holders without appropriate security clearance, such Director will not be given access to such properties or information and may not participate in deliberations of the Board of Directors or the board of directors of any of the Company's Subsidiaries in which such information with respect to such properties is disclosed. Any such exclusion shall be reflected accurately in the minutes of such deliberations. Without limiting the generality of the foregoing, no Class A Director shall (i) have access to classified information or controlled unclassified information entrusted to the Company except as permissible under the United States Department of Defense Industrial Security Program (the "DISP") and applicable United States laws and regulations, (ii) either seek or accept classified information or controlled unclassified information entrusted to the Company, except as permissible under the DISP or applicable United States laws and regulations, or (iii) fail to advise any committee established by the Company to monitor compliance with national security matters promptly if such Class A Director reasonably believes any violations or attempted violations of, or actions inconsistent with, Applicable Laws or contractual provisions relating to national security matters have occurred.
Compliance with Security Requirements. Business Associate shall comply, and shall ensure agents and subcontractors comply with the Security Requirements of 45 CFR Part 142 with respect to electronic transmission of PHI.
Compliance with Security Requirements. The Health Services Manager must:
(a) comply with all Australian Government and Department Data security requirements,
(b) prohibit and prevent any person who does not have the appropriate level of security clearance from gaining access to Department Data; and
(c) notify the Department immediately and comply with all directions of the Department if the Health Services Manager becomes aware of any contravention of Australian Government or Department Data security requirements.
Compliance with Security Requirements. If MO-PCN and Pharmacist exchange PHI electronically, Pharmacist will comply, and will require any subcontractor or agent involved with such electronic data exchange to comply, with the following security requirements in addition to those set forth in this Agreement and HIPAA. At a minimum, Pharmacist and any agent or subcontractor of Pharmacist must:
(1) subject electronic data files to a virus check prior to transmission to MO-PCN;
(2) use or maintain technological systems and procedures to guard against unauthorized access to electronically maintained PHI, including encrypting PHI at rest and PHI in motion with a technology standard that is developed or endorsed by a standards developing organization accredited by the American National Standards Institute.
(3) maintain a designated individual to serve as Pharmacist’s system security officer responsible for supervising Pharmacist’s system security and data integrity, and for communicating with MO-PCN on system security matters;
(4) maintain policies and procedures as necessary to prevent unauthorized parties from accessing, using, disclosing, processing, copying, modifying, corrupting, rendering unavailable, introducing computer code into, or otherwise performing unauthorized and undesired activities related to PHI maintained electronically;
(5) notify MO-PCN immediately in the event of any proven or suspected incident in which Pharmacist has reason to believe any unauthorized person may have had access to the electronic data systems of Pharmacist or of MO-PCN (if Pharmacist has access to MO-PCN’s data systems to perform its duties under the Arrangement); and
(6) assess its information security policies and procedures at least once annually and in response to any material breach of security of Pharmacist’s systems.
Compliance with Security Requirements. Operator agrees to observe all security laws, rules, regulations and requirements of the DHS, FAA, TSA, and City applicable to Operator’s operations, as now or hereafter amended or promulgated, including, without limitation, Title 49, Parts 1500 et al., of the Code of Federal Regulations, to the extent applicable to Operator and Operator’s activities hereunder.
Compliance with Security Requirements hCentive shall comply and shall cause all of its Personnel performing Services under this Agreement to comply with all security requirements set forth in this Agreement, the Commonwealth Terms and Conditions, and Commonwealth of Massachusetts Executive Order 504. hCentive shall complete and sign the Executive Order 504 Contractor Certification Form set forth on Exhibit K.