Incorporation of Software Code I agree that I will not incorporate into any Company software or otherwise deliver to Company any software code licensed under the GNU General Public License or Lesser General Public License or any other license that, by its terms, requires or conditions the use or distribution of such code on the disclosure, licensing, or distribution of any source code owned or licensed by Company except in strict compliance with Company’s policies regarding the use of such software.
Code “Code” means the Internal Revenue Code of 1986, as amended.
SWEATFREE CODE OF CONDUCT a. All Contractors contracting for the procurement or laundering of apparel, garments or corresponding accessories, or the procurement of equipment, materials, or supplies, other than procurement related to a public works contract, declare under penalty of perjury that no apparel, garments or corresponding accessories, equipment, materials, or supplies furnished to the state pursuant to the contract have been laundered or produced in whole or in part by sweatshop labor, forced labor, convict labor, indentured labor under penal sanction, abusive forms of child labor or exploitation of children in sweatshop labor, or with the benefit of sweatshop labor, forced labor, convict labor, indentured labor under penal sanction, abusive forms of child labor or exploitation of children in sweatshop labor. The contractor further declares under penalty of perjury that they adhere to the Sweatfree Code of Conduct as set forth on the California Department of Industrial Relations website located at xxx.xxx.xx.xxx, and Public Contract Code Section 6108. b. The contractor agrees to cooperate fully in providing reasonable access to the contractor’s records, documents, agents or employees, or premises if reasonably required by authorized officials of the contracting agency, the Department of Industrial Relations, or the Department of Justice to determine the contractor’s compliance with the requirements under paragraph (a).
Open Source Code “Open Source Code” shall mean any software code that is distributed as “free software” or “open source software” or is otherwise distributed publicly in source code form under terms that permit modification and redistribution of such software. Open Source Code includes software code that is licensed under the GNU General Public License, GNU Lesser General Public License, Mozilla License, Common Public License, Apache License, BSD License, Artistic License, or Sun Community Source License.
Dress Code CONTRACTOR shall maintain a dress code for their employee’s with a minimum of shirts, pants, and work shoes/boots, in decent condition, at all times while the work is being performed. In the event the COUNTY determines ID badges are necessary, the COUNTY will provide CONTRACTOR with ID badges and CONTRACTOR agrees to enforce that its employees, whether employed by CONTRACTOR or a subcontractor, wear such ID badge while working on site for the Project/Service.
Blue Pencil Doctrine If the duration of, the scope of or any business activity covered by any provision of this Section 7 is in excess of what is determined to be valid and enforceable under applicable law, such provision shall be construed to cover only that duration, scope or activity that is determined to be valid and enforceable. Executive hereby acknowledges that this Section 7 shall be given the construction that renders its provisions valid and enforceable to the maximum extent, not exceeding its express terms, possible under applicable law.
Antivirus software All workstations, laptops and other systems that process and/or store PHI COUNTY discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY must have installed and actively use comprehensive anti-virus software solution with automatic updates scheduled at least daily.
Drug Free Workplace Act The Contractor will assure a drug-free workplace in accordance with 45 CFR Part 76.
Source Code 5.1 Nothing in this XXXX shall give to the User or any other person any right to access or use the Source Code or constitute any licence of the Source Code.
Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.