Customized Microelectronics Devices Source Protection Plan Sample Clauses

Customized Microelectronics Devices Source Protection Plan. The Contractor shall implement Supply Chain Management for this contract. The Contractor shall submit a Customized Microelectronic Devices Source Protection Plan that documents how the Contractor’s supply chain management is conducted in accordance with the following: 1.14.6.1 EC equipment components shall be sourced only from responsible companies. The Contractor shall implement supply chain protections to ensure EC equipment components are legitimate. The Contractor shall implement supply chain protections to ensure EC equipment components are not compromised. The Contractor shall implement supply chain protections to ensure EC equipment components are not infected with malicious code. The Contractor shall document their implemented supply chain protections. The Contractor shall provide their documentation of implemented supply chain protections to the Government. • INFORMATION: Responsible companies are defined in Defense Federal Acquisition Regulation Supplement dated 30 November 2015. CDRL: C008 1.14.6.2 The Contractor shall implement an anti-counterfeit policy. The Contractor shall implement procedures that include the means to detect counterfeit components. The Contractor shall implement procedures that include the means to prevent counterfeit components from entering the Engine Controller equipment. The Contractor shall provide their anti-counterfeit policy to the Government. The Contractor shall provide documentation on how the Contractor will detect counterfeit components. The Contractor shall provide documentation on how the Contractor will prevent counterfeit components from entering the EC system. The Contractor shall implement a process for addressing any counterfeits parts found. The Contractor shall provide documentation on how they will address found counterfeit parts to the Government. The Contractor shall notify the Contracting Officer within 48 hours of finding a counterfeit part. CDRLs: C001, C008 1.14.6.3 The Contractor shall require their subcontractors to implement supply chain protections to ensure EC system components are legitimate. The Contractor shall require their subcontractors to implement supply chain protections to ensure EC system components are not compromised. The Contractor shall require their subcontractors to implement supply chain protections to ensure EC system components are not infected with malicious code. 1.14.6.4 The EC equipment shall only contain supported components. Unsupported components shall be replaced...
AutoNDA by SimpleDocs

Related to Customized Microelectronics Devices Source Protection Plan

  • Computer Equipment Recycling Program If this Contract is for the purchase or lease of computer equipment, then Contractor certifies that it is in compliance with Subchapter Y, Chapter 361 of the Texas Health and Safety Code related to the Computer Equipment Recycling Program and the Texas Commission on Environmental Quality rules in 30 TAC Chapter 328.

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If ECI chooses to subtend a Verizon access Tandem, ECI’s NPA/NXX must be assigned by ECI to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG. 9.2.2 ECI shall establish Access Toll Connecting Trunks pursuant to applicable access Tariffs by which it will provide Switched Exchange Access Services to Interexchange Carriers to enable such Interexchange Carriers to originate and terminate traffic to and from ECI’s Customers. 9.2.3 The Access Toll Connecting Trunks shall be two-way trunks. Such trunks shall connect the End Office ECI utilizes to provide Telephone Exchange Service and Switched Exchange Access to its Customers in a given LATA to the access Tandem(s) Verizon utilizes to provide Exchange Access in such LATA. 9.2.4 Access Toll Connecting Trunks shall be used solely for the transmission and routing of Exchange Access to allow ECI’s Customers to connect to or be connected to the interexchange trunks of any Interexchange Carrier which is connected to a Verizon access Tandem.

  • PayPal's Seller Protection Program What’s eligible

  • PayPal’s Buyer Protection Program When you buy something from a seller who accepts PayPal, you may be eligible for a refund under PayPal’s Buyer Protection program. When applicable, PayPal’s Buyer Protection program entitles you to reimbursement for the full purchase price of the item plus the original shipping costs you paid, if any. PayPal determines, in its sole discretion, whether your claim is eligible for PayPal’s Buyer Protection program. PayPal’s original determination is considered final, but you may be able to file an appeal of the decision with PayPal if you have new or compelling information not available at the time of the original determination or you believe there was an error in the decision-making process. The program terms and conditions are set out in PayPal’s Buyer Protection program page and form part of this user agreement.

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes. 11.2 We may (i) compile statistical and other information related to the performance, operation and use of the Services, and (ii) use data from the Services in aggregated form for security and operations management, to create statistical analyses, and for research and development purposes (clauses i and ii are collectively referred to as “Service Analyses”). We may make Service Analyses publicly available; however, Service Analyses will not incorporate Your Content, Personal Data or Confidential Information in a form that could serve to identify You or any individual. We retain all intellectual property rights in Service Analyses. 11.3 We may provide You with the ability to obtain certain Oracle Software (as defined below) for use with the Services. If we provide Oracle Software to You and do not specify separate terms for such software, then such Oracle Software is provided as part of the Services and You have the non-exclusive, worldwide, limited right to use such Oracle Software, subject to the terms of this Agreement and Your order (except for separately licensed elements of the Oracle Software, which separately licensed elements are governed by the applicable separate terms), solely to facilitate Your use of the Services. You may allow Your Users to use the Oracle Software for this purpose, and You are responsible for their compliance with the license terms. Your right to use any Oracle Software will terminate upon the earlier of our notice (by web posting or otherwise) or the end of the Services associated with the Oracle Software. Notwithstanding the foregoing, if Oracle Software is licensed to You under separate terms, then Your use of such software is governed by the separate terms. Your right to use any part of the Oracle Software that is licensed under the separate terms is not restricted in any way by this Agreement.

  • First Source Hiring Program Contractor must comply with all of the provisions of the First Source Hiring Program, Chapter 83 of the San Francisco Administrative Code, that apply to this Agreement, and Contractor is subject to the enforcement and penalty provisions in Chapter 83.

  • Network Interconnection Methods 3.1 The Interconnection provided herein may not be used solely for the purpose of originating a Party’s own interexchange traffic.

  • The Web Services E-Verify Employer Agent agrees to, consistent with applicable laws, regulations, and policies, commit sufficient personnel and resources to meet the requirements of this MOU.

  • Required Procurement Procedures for Obtaining Goods and Services The Grantee shall provide maximum open competition when procuring goods and services related to the grant- assisted project in accordance with Section 287.057, Florida Statutes.

  • Network Services Local Access Services In lieu of any other rates and discounts, Customer will pay fixed monthly recurring local loop charges ranging from $1,200 to $2,000 for TDM-based DS-3 Network Services Local Access Services at 2 CLLI codes mutually agreed upon by Customer and Company.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!