Intrusion Detection All systems involved in accessing, holding, transporting, and protecting DHCS PHI or PI that are accessible via the Internet must be protected by a comprehensive intrusion detection and prevention solution.
Signaling Each Party will provide the other Party with access to its databases and associated signaling necessary for the routing and completion of the other Party’s traffic in accordance with the provisions contained in the Unbundled Network Element Attachment or applicable access tariff.
Smoke Detectors At Owner's expense, smoke detectors will be installed on the Property in working condition in accordance with the law prior to the tenant's occupancy. During the occupancy, it shall be the tenant's responsibility to maintain all smoke detectors. Owner will replace smoke detector equipment as needed.
Prevention IP shall take all appropriate measures to prevent sexual exploitation and abuse, and child safeguarding violations, by its employees, personnel or subcontractors. IP shall, inter alia, ensure that its employees, personnel or subcontractors shall have undertaken and successfully completed appropriate training with regard to the prevention of sexual exploitation and abuse, and training on safeguarding children. Such training shall include but not be limited to: reference to definitions of sexual exploitation and sexual abuse, and child safeguarding violations; a clear and unambiguous statement that any form of sexual exploitation and abuse, and any conduct that undermines the safeguarding of children, is prohibited; the requirement that any allegations of sexual exploitation and abuse, or child safeguarding violations be promptly reported as provided for in Article 14.4; and the requirement that alleged victims of sexual exploitation and abuse or child safeguarding violations, be promptly informed of and referred to available professional assistance, upon her or his consent.
Connectivity User is solely responsible for providing and maintaining all necessary electronic communications with Exchange, including, wiring, computer hardware, software, communication line access, and networking devices.
Virus Management DST shall maintain a malware protection program designed to deter malware infections, detect the presence of malware within DST environment.
Data Loss Prevention DST shall implement a data leakage program that is designed to identify, detect, monitor and document Fund Data leaving DST’s control without authorization in place.
Random Drug Testing All employees covered by this Agreement shall be subject to random drug testing in accordance with Appendix D.
Substance Abuse Testing The Parties agree that it is in the best interest of all concerned to promote a safe working environment. The Union has no objection to pre-employment substance abuse testing when required by the Employer and further, the Union has no objection to voluntary substance abuse testing to qualify for employment on projects when required by a project owner. The cost and scheduling of such testing shall be paid for and arranged by the Employer. The Union agrees to reimburse the Employer for any failed pre-access Alcohol and Drug test costs.
Network Interconnection Architecture Each Party will plan, design, construct and maintain the facilities within their respective systems as are necessary and proper for the provision of traffic covered by this Agreement. These facilities include but are not limited to, a sufficient number of trunks to the point of interconnection with the tandem company, and sufficient interoffice and interexchange facilities and trunks between its own central offices to adequately handle traffic between all central offices within the service areas at a P.01 grade of service or better. The provisioning and engineering of such services and facilities will comply with generally accepted industry methods and practices, and will observe the rules and regulations of the lawfully established tariffs applicable to the services provided.