Contractor Security Sample Clauses

Contractor Security. The Contractor shall implement security procedures in concert with Defense Security Service (DSS) National Industrial Security Program Operating Manual (NISPOM) per DoD 5220.22-M.
AutoNDA by SimpleDocs
Contractor Security. Clearance information forms will be provided by County Project Manager upon request and will be screened by the Sheriff-Coroner’s Department.
Contractor Security. Before onboarding contractors, Vendor conducts an assessment of the security and privacy practices of contractors to ensure contractors provide a level of security and privacy appropriate to their access to data and the scope of the services they are engaged to provide. Once Vendor has assessed the risks presented by the contractor, the contractor is required to enter into appropriate security, confidentiality and privacy contract terms.
Contractor Security. If required, no later than thirty (30) days prior to the date that performance of the Preliminary Activities is to commence at the Site, Contractor shall furnish a letter of credit in the amount of * or some other form of security acceptable to Owner, in such form and with such sureties as are satisfactory to Owner and the Senior Lenders. Owner shall reimburse Contractor for the cost of obtaining Contractor's Security at Contractor's actual cost.
Contractor Security. 28 14.1. Generally.......................................................28 14.2. Form of Contractor Surety Bond..................................28 14.3. Issuer Requirements.............................................28
Contractor Security. Clearance Requirements for CLINs 0003 and 0004. All Contractor and subcontractor employees, consultants, and other persons with access to the vessel and/or the area of the facility where the vessel will be dismantled, shall be U.S. citizens. Any individuals to access the third deck and below, or removed sections of the third deck and below before complete dismantling shall possess individual security clearances at CONFIDENTIAL level at minimum, prior to obtaining such access and maintain it throughout the Contract period of performance.
Contractor Security. Clearance information forms must be submitted on the original Sheriff’s printed form. Facsimile or photocopy forms will not be accepted.
AutoNDA by SimpleDocs
Contractor Security 

Related to Contractor Security

  • Cyber Security Insurance for loss to the Owner due to data security and privacy breach, including costs of investigating a potential or actual breach of confidential or private information. (Indicate applicable limits of coverage or other conditions in the fill point below.) « »

  • Physical Security Contractor shall ensure that Medi-Cal PII is used and stored in an area that is physically safe from access by unauthorized persons during working hours and non- working hours. Contractor agrees to safeguard Medi-Cal PII from loss, theft or inadvertent disclosure and, therefore, agrees to:

  • Cybersecurity; Data Protection To the Company’s knowledge, the Company and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (collectively, the “Personal Data”)) used in connection with their businesses, and there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same, except in each case as would not reasonably be expected to have a Material Adverse Effect. The Company and its subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification.

  • Security Notwithstanding anything herein to the contrary, except for Section 27, to the extent requested by Indemnitee and approved by the Board, the Company may at any time and from time to time provide security to Indemnitee for the Company’s obligations hereunder through an irrevocable bank line of credit, funded trust or other collateral. Any such security, once provided to Indemnitee, may not be revoked or released without the prior written consent of Indemnitee.

  • Cybersecurity (i)(x) There has been no security breach or other compromise of or relating to any of the Company’s or any Subsidiary’s information technology and computer systems, networks, hardware, software, data (including the data of its respective customers, employees, suppliers, vendors and any third party data maintained by or on behalf of it), equipment or technology (collectively, “IT Systems and Data”) and (y) the Company and the Subsidiaries have not been notified of, and has no knowledge of any event or condition that would reasonably be expected to result in, any security breach or other compromise to its IT Systems and Data; (ii) the Company and the Subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Data and to the protection of such IT Systems and Data from unauthorized use, access, misappropriation or modification, except as would not, individually or in the aggregate, have a Material Adverse Effect; (iii) the Company and the Subsidiaries have implemented and maintained commercially reasonable safeguards to maintain and protect its material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and Data; and (iv) the Company and the Subsidiaries have implemented backup and disaster recovery technology consistent with industry standards and practices.

  • Privacy and Security (a) The Service Provider shall not transmit or store any AHS data outside the borders of Canada, nor transmit any AHS data in Canada to any party not specifically contemplated in this Agreement, without AHS’s prior written consent to each such data transmittal, which consent may be arbitrarily and unreasonably withheld.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!