We use cookies on our site to analyze traffic, enhance your experience, and provide you with tailored content.

For more information visit our privacy policy.

Critical Infrastructure Security and Resilience Sample Clauses

Critical Infrastructure Security and ResilienceThe Sponsor acknowledges that it has considered and addressed physical and cybersecurity and resilience in their project planning, design, and oversight, as determined by the DOT and the Department of Homeland Security (DHS). For airports that do not have specific DOT or DHS cybersecurity requirements, the FAA encourages the voluntary adoption of the cybersecurity requirements from the Transportation Security Administration and Federal Security Director identified for security risk Category X airports.
Critical Infrastructure Security and Resilience. Awardees shall comply with the Presidential Policy Directive 21 – Critical Infrastructure Security and Resilience and the National Security Presidential Improving Cybersecurity for Critical Infrastructure Control Systems. Information on cybersecurity performance goals can be found at xxxxx://xxx.xxxx.xxx/cpg. Additionally, Awardees must be in compliance with 2 CFR § 200.216 and the prohibition on certain telecommunications and video surveillance services or equipment.
Critical Infrastructure Security and ResilienceThe Sponsor acknowledges that it has considered and addressed physical and cybersecurity and resilience in their project planning, design, and oversight, as determined by the DOT and the Department of Homeland Security.
Critical Infrastructure Security and Resilience. It is the policy of the United States to strengthen the security and resilience of its critical infrastructure against both physical and cyber threats. Each applicant selected for SS4A grant funding must demonstrate, prior to the signing of the grant agreement, effort to consider and address physical and cyber security risks relevant to the transportation mode and type and scale of the activities. Award recipients that have not appropriately considered and addressed physical and cyber security and resilience in their planning, design, and oversight, as determined by the Department and the Department of Homeland Security, will be required to do so before receiving Implementation Grant funds for construction, consistent with Presidential Policy Directive 21, Critical Infrastructure Security and Resilience and the National Security Presidential Memorandum on Improving Cybersecurity for Critical Infrastructure Control Systems. Additionally, funding recipients must be in compliance with 2 CFR § 200.216 and the prohibition on certain telecommunications and video surveillance services or equipment. Award recipients shall also consider whether projects in floodplains are upgraded consistent with the Federal Flood Risk Management Standard, to the extent consistent with current law, in Executive Order 14030, Climate-Related Financial Risk (86 FR 27967), and Executive Order 13690, Establishing a Federal Flood Risk Management Standard and a Process for Further Soliciting and Considering Stakeholder Input (80 FR 6425).

Related to Critical Infrastructure Security and Resilience

  • SOFTWARE SECURITY If applicable, BA warrants that software security features will be compatible with the CE’s HIPAA compliance requirements. This HIPAA Business Associate Agreement-Addendum shall supersede any prior HIPAA Business Associate Agreements between CE and BA.

  • Future Services The Consultant acknowledges each of the following with regard to performing future services for the City: • The Consultant’s performance of the services required by this Agreement may create an actual or appearance of a conflict of interest with regard to the Consultant performing or participating in the performance of some related future services, particularly if the services required by this Agreement comprise one element or aspect of a multi-phase process or project; • Such an actual or appearance of a conflict of interest would be a ground for the City to disqualify the Consultant from performing or participating in the performance of such future services; and • The Consultant is solely responsible for considering what potential conflicts of interest, if any, performing the services required by this Agreement might have on its ability to obtain contracts to perform future services.

  • Use; Quality Control a. Neither party may alter the other party’s trademarks from the form provided and must comply with removal requests as to specific uses of its trademarks or logos. b. Each party agrees to use, and to cause its Permitted Sublicensees to use, the other party’s trademarks only in good faith and in a dignified manner consistent with such party’s use of the trademarks. Upon written notice to the breaching party, the breaching party has 30 days of the date of the written notice to cure the breach or the license will be terminated.

  • Image Quality You are responsible for the image quality of any Image that you transmit. If an Image that we receive from you or for deposit to your Account is not of sufficient quality to satisfy our image quality standards as we may establish them from time to time, we may reject the Image without prior notice to you. Each Image must include the front and back of the Item and the following information must be clearly readable: amount, payee name, drawer signature, date, check number, account number, routing and transit number, MICR (Magnetic Ink Character Recognition) line, and any endorsement or other information written on the check.

  • Core Services The Company agrees to provide to the Municipality the Core Services set forth in Schedule “A”. The Company and the Municipality may amend Schedule “A” from time to time upon mutual agreement.

  • Service Quality The Transfer Agent shall maintain a quality control process designed to provide a consistent level of quality and timeliness for its call center, correspondence services and transaction processing.

  • Operator’s Security Contact Information Xxxxxxx X. Xxxxxxx Named Security Contact xxxxxxxx@xxxxxxxxx.xxx Email of Security Contact (000) 000-0000 Phone Number of Security Contact

  • Mobile Banking Services Mobile Banking is a personal financial information management service that allows you to access account information and conduct transactions using compatible and supported mobile phones and/or other compatible and supported wireless devices (including phones, "Wireless Devices"). We reserve the right to modify the scope of the Mobile Banking services at any time. We reserve the right to refuse to make any transaction you request through Mobile Banking. You agree and understand that Mobile Banking may not be accessible or may have limited utility over some mobile telephone networks, such as while roaming.

  • Health, Safety and Security 14.1 The Employer recognizes a responsibility to provide an environment intended to protect the health, safety and security of Members as they carry out their responsibilities. To that end, the Employer agrees: (a) to maintain a Joint Health and Safety Committee (the JHSC) with broad representation drawn from all sectors of the University, including at least one (1) person appointed by the Association; (b) to cooperate with the Association in making every reasonable provision for the safety, health and security of Members; (c) to take reasonable measures to maintain the security of the buildings and grounds while at the same time maintaining reasonable access for Members who have a need for such access at times other than during regular working hours; (d) to ensure that the Association has the right to appoint at least one (1) person to any representative committee whose terms of reference specifically include the health, safety or security of Members as they carry out their responsibilities; (e) to comply with the Occupational Health and Safety Act, R.S.O. 1990, and relevant regulations thereto, as amended from time to time (the “Act”); (f) that Members may refuse unsafe work pursuant to and in accordance with the relevant provisions of the Act for so doing; (g) that Members report any known or potential dangers to their Xxxx; (h) In addition, the Employer agrees: i) to provide Members with health and safety training, personal protective equipment, and access to health and safety programs, policies and procedures; ii) to provide resources for the JHSC; iii) to compensate a CASBU Member who is eligible to be, and serves as, the person appointed by the Association to the JHSC when that service is outside the period of the Member’s contract; iv) to provide training for the person appointed by the Association to the JHSC directly related to their duties and responsibilities in connection with the JHSC; v) to recognize a JHSC Member’s right to be present during workplace safety testing and audits and receive written copies of any reports and recommendations from the testing/audits and a copy of a draft report if one is provided to the Employer; vi) to recognize a JHSC Member’s right to have advance notice when advance notice is given by the Ministry of Labour of any Ministry of Labour inspection and to accompany a Ministry of Labour Inspector during an inspection and receive a copy of any report produced by the inspector. 14.2 The parties agree that all personal communications must adhere to the Personal Harassment and Discrimination Policy and the Nipissing University Acceptable Use Policy. Effective June 10, 2006, universities are subject to the Freedom of Information and Protection of Privacy Act (FIPPA). All records in the custody and control of the University will be subject to FIPPA with exceptions as defined by the Act. Persons may request and have a right to access University information or records. A record is defined under the Act as any record of information however recorded, whether in printed or electronic form, film, or otherwise and includes drafts, post-it notes, margin notes, hard drive files, emails, voice mails, electronic agendas, address books, and recording devices. 14.3 Unless required under FIPPA, and for the purposes of this Article, files are documents under a Member’s control and stored on University property, either in paper or electronic form. Such files do not include the Member’s official file in the Xxxx’x office nor the Personnel File of the Member in the Human Resources office. 14.4 On termination of a Member’s employment for any reason other than cause, the Employer will permit, by appointment only, accompanied access for a period of fifteen (15) working days (or longer with the agreement of the Xxxx) by the former Member or the Member’s executors to the Member’s files, whether in paper or electronic format. The purpose of the allowed access is for transferring required documents to other faculty, the Chair, or the Xxxx. Where files are not required to support continued student academic needs or ongoing operational requirements, the former Member or designate may remove or destroy their personal files. Items that are clearly of a personal nature or are owned by the former Member such as furniture, pictures, books, etc., may be removed at this time.

  • Quality Assurance/Quality Control Contractor shall establish and maintain a quality assurance/quality control program which shall include procedures for continuous control of all construction and comprehensive inspection and testing of all items of Work, including any Work performed by Subcontractors, so as to ensure complete conformance to the Contract with respect to materials, workmanship, construction, finish, functional performance, and identification. The program established by Contractor shall comply with any quality assurance/quality control requirements incorporated in the Contract.