We use cookies on our site to analyze traffic, enhance your experience, and provide you with tailored content.

For more information visit our privacy policy.

Critical Infrastructure Sample Clauses

Critical Infrastructure. If Grantee is required to access or control the State’s critical infrastructure as defined in Sections 2275.0101 and 2275.0102, Texas Government Code, Grantee certifies, pursuant to Section 2275.0102, Texas Government Code, neither it nor its parent company, nor any affiliate of Grantee or its parent company, is: (1) majority owned or controlled by citizens or governmental entities of China, Iran, North Korea, Russia, or any other country designated by the Governor under Section 2275.0103, Texas Government Code, or (2) headquartered in any of those countries.
Critical Infrastructure. If Contractor will be granted direct or indirect access to a communication infrastructure system, cybersecurity system, electric grid, hazardous waste treatment system, or water treatment facility, Contractor certifies that neither it or its parent company, is (1) majority owned by citizens or governmental entities of China, North Korea, Russia or any other country designated by the Governor under Government Code 2274.0103, or (2) headquartered in any of those countries.
Critical Infrastructure. Paragraph 1.1.5 defines the term “Critical Infrastructure” consistent with its definition under the NERC Rules of Procedure.45 Xxxxxxx Xxxx argues that the term “virtual,” as used in this definition, requires clarification. We reject Xxxxxxx Xxxx’x request. The Commission accepted this definition as embodied in section 1501 of the NERC Rules of Procedure. We are not persuaded that the term “virtual” requires, or warrants, additional clarification here.
Critical Infrastructure. Wildfires can damage or destroy critical infrastructure, such as utility lines, transportation systems, communication facilities, storm water pipes, and water distribution systems. The repair, restoration, or replacement of infrastructure can sometimes take weeks or months following a wildfire and cost thousands or millions of dollars. Post-fire rehabilitation of critical infrastructure and restoring basic services after a disaster is a top priority for public agencies and utility companies. These entities can incur significant repair, restoration, and rehabilitation costs after a wildfire including the cost of maintenance and damage assessment teams, field data collection, watershed rehabilitation and restoration efforts, preparation for future potential floods, replacement or repair of utility supply lines, and replacement or repair of roads, guardrails, bridges, signage, culverts, and landscaping. The 2016 Local Hazard Mitigation Plan (LHMP) team identified 180 critical facilities for incorporation into its hazard vulnerability and risk analysis. The list of critical facilities summary of facility types and numbers can be found in Table 4 (LHMP 2016). Figure 6 depicts critical infrastructure within the Project Area. Table 4 City of Santa Xxxx Summary of Critical Infrastructure Fire 12 Government Center 4 Health and Hospitals 12 Schools 58 Utilities 78
Critical InfrastructureIn accordance with Chapter 2274, Texas Government Code, the City may not enter into a contract or agreement with a company, excluding a sole proprietorship, with 10 or more full-time employees for goods or services valued at $100,000 or more (1) if the company would be granted direct or remote access to or control of critical infrastructure in Texas, excluding access specifically allowed by the City for product warranty and support purposes and (2) if the City knows the company is (A) owned by or the a majority of stock or other ownership interest of the company is held or controlled by (i) individuals who are citizens of China, Iran, North Korea, Russia, or a designated country or (ii) a company or other entity, including a governmental entity, that is owned or controlled by citizens of or is directly controlled by the government of such countries, or (B) headquartered in such countries. The signatory executing the Contract on behalf of Construction Manager represents that neither Construction Manager nor any of its parent companies, wholly-owned subsidiaries, majority-owned subsidiaries, and other affiliates is a company of which the City may not contract pursuant to Section 2274.0102, Texas Government Code. The foregoing verification is made solely to comply with Section 2274.0102, Texas Government Code.

Related to Critical Infrastructure

  • Critical Infrastructure Subcontracts For purposes of this Paragraph, the designated countries are China, Iran, North Korea, Russia, and any countries lawfully designated by the Governor as a threat to critical infrastructure. Pursuant to Section 113.002 of the Business and Commerce Code, Contractor shall not enter into a subcontract that will provide direct or remote access to or control of critical infrastructure, as defined by Section 113.001 of the Texas Business and Commerce Code, in this state, other than access specifically allowed for product warranty and support purposes to any subcontractor unless (i) neither the subcontractor nor its parent company, nor any affiliate of the subcontractor or its parent company, is majority owned or controlled by citizens or governmental entities of a designated country; and (ii) neither the subcontractor nor its parent company, nor any affiliate of the subcontractor or its parent company, is headquartered in a designated country. Contractor will notify the System Agency before entering into any subcontract that will provide direct or remote access to or control of critical infrastructure, as defined by Section 113.001 of the Texas Business & Commerce Code, in this state.

  • Infrastructure Infrastructure serves as the foundation and building blocks of an integrated IT solution. It is the hardware which supports Application Services (C.3.2) and IT Management Services (C.3.3); the software and services which enable that hardware to function; and the hardware, software, and services which allow for secure communication and interoperability between all business and application service components. Infrastructure services facilitate the development and maintenance of critical IT infrastructures required to support Federal government business operations. This section includes the technical framework components that make up integrated IT solutions. One or any combination of these components may be used to deliver IT solutions intended to perform a wide array of functions which allow agencies to deliver services to their customers (or users), whether internal or external, in an efficient and effective manner. Infrastructure includes hardware, software, licensing, technical support, and warranty services from third party sources, as well as technological refreshment and enhancements for that hardware and software. This section is aligned with the FEA/DoDEA Technical Reference Model (TRM) which describes these components using a vocabulary that is common throughout the entire Federal government. A detailed review of the TRM is provided in Section J, Attachment 5. Infrastructure includes complete life cycle support for all hardware, software, and services represented above, including planning, analysis, research and development, design, development, integration and testing, implementation, operations and maintenance, information assurance, and final disposition of these components. The services also include administration and help desk functions necessary to support the IT infrastructure (e.g., desktop support, network administration). Infrastructure components of an integrated IT solution can be categorized as follows:

  • Infrastructure Vulnerability Scanning Supplier will scan its internal environments (e.g., servers, network devices, etc.) related to Deliverables monthly and external environments related to Deliverables weekly. Supplier will have a defined process to address any findings but will ensure that any high-risk vulnerabilities are addressed within 30 days.

  • Information Systems Acquisition Development and Maintenance a. Client Data – Client Data will only be used by State Street for the purposes specified in this Agreement.

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes. 11.2 We may (i) compile statistical and other information related to the performance, operation and use of the Services, and (ii) use data from the Services in aggregated form for security and operations management, to create statistical analyses, and for research and development purposes (clauses i and ii are collectively referred to as “Service Analyses”). We may make Service Analyses publicly available; however, Service Analyses will not incorporate Your Content, Personal Data or Confidential Information in a form that could serve to identify You or any individual. We retain all intellectual property rights in Service Analyses. 11.3 We may provide You with the ability to obtain certain Oracle Software (as defined below) for use with the Services. If we provide Oracle Software to You and do not specify separate terms for such software, then such Oracle Software is provided as part of the Services and You have the non-exclusive, worldwide, limited right to use such Oracle Software, subject to the terms of this Agreement and Your order (except for separately licensed elements of the Oracle Software, which separately licensed elements are governed by the applicable separate terms), solely to facilitate Your use of the Services. You may allow Your Users to use the Oracle Software for this purpose, and You are responsible for their compliance with the license terms. Your right to use any Oracle Software will terminate upon the earlier of our notice (by web posting or otherwise) or the end of the Services associated with the Oracle Software. Notwithstanding the foregoing, if Oracle Software is licensed to You under separate terms, then Your use of such software is governed by the separate terms. Your right to use any part of the Oracle Software that is licensed under the separate terms is not restricted in any way by this Agreement.

  • Review Systems The Asset Representations Reviewer will maintain and utilize an electronic case management system to manage the Tests and provide systematic control over each step in the Review process and ensure consistency and repeatability among the Tests.

  • Foreign-Owned Companies in Connection with Critical Infrastructure If Texas Government Code, Section 2274.0102(a)(1) (relating to prohibition on contracts with certain foreign-owned companies in connection with critical infrastructure) is applicable to this Contract, pursuant to Government Code Section 2274.0102, Contractor certifies that neither it nor its parent company, nor any affiliate of Contractor or its parent company, is: (1) majority owned or controlled by citizens or governmental entities of China, Iran, North Korea, Russia, or any other country designated by the Governor under Government Code Section 2274.0103, or (2) headquartered in any of those countries.

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If ECI chooses to subtend a Verizon access Tandem, ECI’s NPA/NXX must be assigned by ECI to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG. 9.2.2 ECI shall establish Access Toll Connecting Trunks pursuant to applicable access Tariffs by which it will provide Switched Exchange Access Services to Interexchange Carriers to enable such Interexchange Carriers to originate and terminate traffic to and from ECI’s Customers. 9.2.3 The Access Toll Connecting Trunks shall be two-way trunks. Such trunks shall connect the End Office ECI utilizes to provide Telephone Exchange Service and Switched Exchange Access to its Customers in a given LATA to the access Tandem(s) Verizon utilizes to provide Exchange Access in such LATA. 9.2.4 Access Toll Connecting Trunks shall be used solely for the transmission and routing of Exchange Access to allow ECI’s Customers to connect to or be connected to the interexchange trunks of any Interexchange Carrier which is connected to a Verizon access Tandem.

  • Filing Systems and Equipment A complete and comprehensive catalog of filing systems including vertical and lateral files, bookcases, mobile cabinets and freestanding file cabinets.

  • Technology Access Contractor expressly acknowledges that state funds may not be expended in connection with the purchase of an automated information system unless that system meets certain statutory requirements relating to accessibility by persons with visual impairments. Accordingly, Contractor represents and warrants to System Agency that the technology provided to System Agency for purchase (if applicable under this Contract or any related Solicitation) is capable, either by virtue of features included within the technology or because it is readily adaptable by use with other technology, of: • providing equivalent access for effective use by both visual and non-visual means; • presenting information, including prompts used for interactive communications, in formats intended for non-visual use; and • being integrated into networks for obtaining, retrieving, and disseminating information used by individuals who are not blind or visually impaired. For purposes of this Section, the phrase “equivalent access” means a substantially similar ability to communicate with or make use of the technology, either directly by features incorporated within the technology or by other reasonable means such as assistive devices or services which would constitute reasonable accommodations under the Americans With Disabilities Act or similar state or federal laws. Examples of methods by which equivalent access may be provided include, but are not limited to, keyboard alternatives to mouse commands and other means of navigating graphical displays, and customizable display appearance. In accordance with Section 2157.005 of the Texas Government Code, the Technology Access Clause contract provision remains in effect for any contract entered into before September 1, 2006.