CONTRACT WORKER ACCESS CONTROLS, BADGE AND KEY ACCESS REQUIREMENT Sample Clauses

CONTRACT WORKER ACCESS CONTROLS, BADGE AND KEY ACCESS REQUIREMENT. The Provider agrees to comply with A.R.S. § 46-141 (as may be amended) and any other applicable laws, whose provisions are hereby incorporated in their entirety and made part of this Contract. These provisions include, but are not limited to, agreements entered into for the provision of Services to juveniles or vulnerable adults shall provide that, as a condition of employment, personnel who are employed by the Provider, whether paid or not, and who are required or allowed to provide Services directly to juveniles or vulnerable adults, shall have a valid class one or class two fingerprint clearance card issued pursuant to Title 41, Chapter 12, Article 3.1, or shall apply for a class one or class two fingerprint clearance card within seven working days of employment. The City may allow all or part of the costs of fingerprint/background checks to be included as an allowable cost. The Background Screening provided by the Provider shall comply with all applicable laws, rules and regulations. The Provider further agrees that the Background Screening required in this Section is necessary to preserve and protect public health, safety and welfare. The Background Screening requirements set forth in this Section are the minimum requirements for this Agreement. The City in no way warrants that these minimum requirements are sufficient to protect the Provider from any liabilities that may arise out of the Provider’s Services under this Agreement or the Provider’s failure to comply with this Section. Therefore, in addition to the specific measures set forth below, the Provider and its Contract Workers shall take such other reasonable, prudent and necessary measures to further preserve and protect public health, safety and welfare when providing Services under this Agreement. The City may, in its sole discretion, accept or reject any or all of the Contract Workers proposed by the Provider to perform work under this Agreement as well those Contract Workers actually providing Services during the term of this Agreement.
AutoNDA by SimpleDocs

Related to CONTRACT WORKER ACCESS CONTROLS, BADGE AND KEY ACCESS REQUIREMENT

  • Access Controls The system providing access to PHI COUNTY discloses to 20 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY 21 must use role based access controls for all user authentications, enforcing the principle of least privilege.

  • System Access Control Data processing systems used to provide the Cloud Service must be prevented from being used without authorization.

  • Network Access Control The VISION Web Site and the Distribution Support Services Web Site (the “DST Web Sites”) are protected through multiple levels of network controls. The first defense is a border router which exists at the boundary between the DST Web Sites and the Internet Service Provider. The border router provides basic protections including anti-spoofing controls. Next is a highly available pair of stateful firewalls that allow only HTTPS traffic destined to the DST Web Sites. The third network control is a highly available pair of load balancers that terminate the HTTPS connections and then forward the traffic on to one of several available web servers. In addition, a second highly available pair of stateful firewalls enforce network controls between the web servers and any back-end application servers. No Internet traffic is allowed directly to the back-end application servers. The DST Web Sites equipment is located and administered at DST’s Winchester data center. Changes to the systems residing on this computer are submitted through the DST change control process. All services and functions within the DST Web Sites are deactivated with the exception of services and functions which support the transfer of files. All ports on the DST Web Sites are disabled, except those ports required to transfer files. All “listeners,” other than listeners required for inbound connections from the load balancers, are deactivated. Directory structures are “hidden” from the user. Services which provide directory information are also deactivated.

  • Data Access Control Persons entitled to use data processing systems gain access only to the Personal Data that they have a right to access, and Personal Data must not be read, copied, modified or removed without authorization in the course of processing, use and storage.

  • DRUG-FREE WORKPLACE REQUIREMENTS Contractor will comply with the requirements of the Drug-Free Workplace Act of 1990 and will provide a drug-free workplace by taking the following actions: a. Publish a statement notifying employees that unlawful manufacture, distribution, dispensation, possession or use of a controlled substance is prohibited and specifying actions to be taken against employees for violations. b. Establish a Drug-Free Awareness Program to inform employees about: 1) the dangers of drug abuse in the workplace; 2) the person's or organization's policy of maintaining a drug-free workplace; 3) any available counseling, rehabilitation and employee assistance programs; and, 4) penalties that may be imposed upon employees for drug abuse violations. c. Every employee who works on the proposed Agreement will: 1) receive a copy of the company's drug-free workplace policy statement; and, 2) agree to abide by the terms of the company's statement as a condition of employment on the Agreement. Failure to comply with these requirements may result in suspension of payments under the Agreement or termination of the Agreement or both and Contractor may be ineligible for award of any future State agreements if the department determines that any of the following has occurred: the Contractor has made false certification, or violated the certification by failing to carry out the requirements as noted above. (Gov. Code §8350 et seq.)

  • Access Requirements You will be responsible for providing the System to enable you to use an Electronic Service.

  • Access Control Supplier will maintain an appropriate access control policy that is designed to restrict access to Accenture Data and Supplier assets to authorized Personnel. Supplier will require that all accounts have complex passwords that contain letters, numbers, and special characters, be changed at least every 90 days, and have a minimum length of 8 characters.

  • System Access CUSTOMER agrees to provide to PROVIDER, at CUSTOMER’S expense, necessary access to the mainframe computer and related information technology systems (the “System”) on which CUSTOMER data is processed during the times (the “Service Hours”) specified in the PSAs, subject to reasonable downtime for utility outages, maintenance, performance difficulties and the like. In the event of a change in the Service Hours, CUSTOMER will provide PROVIDER with at least fifteen (15) calendar days written notice of such change.

  • CERTIFICATION REGARDING DRUG-FREE WORKPLACE REQUIREMENTS 1. The Contractor certifies that it will provide a drug-free workplace by: a. Publishing a statement notifying employees that the unlawful manufacture, distribution, dispensing, possession or use of a controlled substance is prohibited in the Contractor’s workplace and specifying the actions that will be taken against employees for violation of such prohibition;

  • Food Service Waste Reduction Requirements Contractor shall comply with the Food Service Waste Reduction Ordinance, as set forth in San Francisco Environment Code Chapter 16, including but not limited to the remedies for noncompliance provided therein.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!