Critical Infrastructure Security Sample Clauses

Critical Infrastructure Security. [REGIONAL ENTITY] shall collaborate with NERC in its efforts to coordinate electric industry activities to promote critical infrastructure protection of the Bulk-Power System in North America.
AutoNDA by SimpleDocs
Critical Infrastructure Security. MRO shall collaborate with NERC in its efforts to coordinate electric industry activities to promote critical infrastructure protection of the Bulk-Power System in North America.
Critical Infrastructure Security. WECC shall collaborate with NERC in its efforts to coordinate electric industry activities to promote critical infrastructure protection of the Bulk-Power System in North America.
Critical Infrastructure Security. SERC shall collaborate with NERC in its efforts to coordinate electric industry activities to promote critical infrastructure protection of the Bulk-Power System in North America.
Critical Infrastructure Security. NPCC shall collaborate with NERC in its efforts to coordinate electric industry activities to promote critical infrastructure protection of the Bulk-Power System in North America.
Critical Infrastructure Security. Texas RE shall collaborate with NERC in its efforts to coordinate electric industry activities to promote critical infrastructure protection of the Bulk-Power System in North America.
Critical Infrastructure Security. ReliabilityFirst shall collaborate with NERC in its efforts to coordinate electric industry activities to promote critical infrastructure protection of the Bulk-Power System in North America.
AutoNDA by SimpleDocs
Critical Infrastructure Security. SPP shall collaborate with NERC in its efforts to coordinate electric industry activities to promote critical infrastructure protection of the Bulk- Power System in North America.
Critical Infrastructure Security. FRCC shall collaborate with NERC in its efforts to coordinate electric industry activities to promote critical infrastructure protection of the Bulk-Power System in North America.

Related to Critical Infrastructure Security

  • SOFTWARE SECURITY If applicable, BA warrants that software security features will be compatible with the CE’s HIPAA compliance requirements. This HIPAA Business Associate Agreement-Addendum shall supersede any prior HIPAA Business Associate Agreements between CE and BA. EXHIBIT E

  • Future Services The Consultant acknowledges each of the following with regard to performing future services for the City: • The Consultant’s performance of Work in an Approved Service Order may create an actual or appearance of a conflict of interest with regard to the Consultant performing or participating in the performance of some related future services, particularly when the Work in an Approved Service Order comprises one element or aspect of a multi- phase process or project; • Such an actual or appearance of a conflict of interest would be a ground for the City to disqualify the Consultant from performing or participating in the performance of such future services; and • The Consultant is solely responsible for considering what potential conflicts of interest, if any, performing Work in an Approved Service Order might have on its ability to obtain contracts to perform future services.

  • Acupuncture Services Benefits will be provided for Medically Necessary acupuncture services when provided by a provider licensed to perform such services.

  • Signature Section For the CONTRACTOR Name (Please print) Title Signature Date For the MICHIGAN DEPARTMENT OF COMMUNITY HEALTH Xxxx Xxxx, Deputy Director, Operations Administration Date Part II General Provisions

  • Use; Quality Control a. Neither party may alter the other party’s trademarks from the form provided and must comply with removal requests as to specific uses of its trademarks or logos.

  • Image Quality You are responsible for the image quality of any Image that you transmit. If an Image that we receive from you or for deposit to your Account is not of sufficient quality to satisfy our image quality standards as we may establish them from time to time, we may reject the Image without prior notice to you. Each Image must include the front and back of the Item and the following information must be clearly readable: amount, payee name, drawer signature, date, check number, account number, routing and transit number, MICR (Magnetic Ink Character Recognition) line, and any endorsement or other information written on the check.

  • Core Services The Company agrees to provide those Core Services to the Municipality as set forth in Schedule “A” and further agrees to the process contained in Schedule “A”.

  • CONFIDENTIALITY AND NON-DISCLOSURE; SECURITY BREACH REPORTING 2.1 For purposes of this Contract, confidential information will not include information or material which (a) enters the public domain (other than as a result of a breach of this Contract); (b) was in the receiving party’s possession prior to its receipt from the disclosing party; (c) is independently developed by the receiving party without the use of confidential information; (d) is obtained by the receiving party from a third party under no obligation of confidentiality to the disclosing party; or (e) is not exempt from disclosure under applicable State law.

  • Service Quality The Transfer Agent shall maintain a quality control process designed to provide a consistent level of quality and timeliness for its call center, correspondence services and transaction processing.

  • Eksportkontrol Licenstager må kun bruge og eksportere xxxxx reeksportere Apple-softwaren i overensstemmelse med gældende amerikansk lov og med gældende lov i det land, hvor Apple-softwaren blev købt. I særdeleshed – men ikke begrænset til – må Apple-software ikke eksporteres xxxxx reeksporteres (a) til xxxxx, som er underlagt handelsboykot fra USA, xxxxx (b) til personer opført på det amerikanske finansministeriums liste over "Specially Designated Nationals" xxxxx på det amerikanske handelsministeriums "Denied Person's List or Entity List". Ved at bruge Apple-software garanterer licenstager ikke at være bosiddende i et af ovennævnte xxxxx xxxxx være opført på nogen af ovennævnte lister. Licenstager erklærer sig desuden indforstået med ikke at ville bruge Apple-software til forbudte formål i henhold til gældende amerikansk lov, inklusive – men ikke begrænset til – udvikling, design og fremstilling af kernevåben, missiler og kemiske xxxxx biologiske våben.

Time is Money Join Law Insider Premium to draft better contracts faster.