Securing Physical Facilities DST shall maintain systems located in DST facilities that host Fund Data or provide services under the Agreement in an environment that is designed to be physically secure and to allow access only to authorized individuals. A secure environment includes the availability of onsite security personnel on a 24 x 7 basis or equivalent means of monitoring locations supporting the delivery of services under the Agreement.
Contractor Security Clearance Customers may designate certain duties and/or positions as positions of “special trust” because they involve special trust responsibilities, are located in sensitive locations, or have key capabilities with access to sensitive or confidential information. The designation of a special trust position or duties is at the sole discretion of the Customer. Contractor or Contractor’s employees and Staff who, in the performance of this Contract, will be assigned to work in positions determined by the Customer to be positions of special trust, may be required to submit to background screening and be approved by the Customer to work on this Contract.
New Hampshire Specific Data Security Requirements The Provider agrees to the following privacy and security standards from “the Minimum Standards for Privacy and Security of Student and Employee Data” from the New Hampshire Department of Education. Specifically, the Provider agrees to: (1) Limit system access to the types of transactions and functions that authorized users, such as students, parents, and LEA are permitted to execute; (2) Limit unsuccessful logon attempts; (3) Employ cryptographic mechanisms to protect the confidentiality of remote access sessions; (4) Authorize wireless access prior to allowing such connections; (5) Create and retain system audit logs and records to the extent needed to enable the monitoring, analysis, investigation, and reporting of unlawful or unauthorized system activity; (6) Ensure that the actions of individual system users can be uniquely traced to those users so they can be held accountable for their actions; (7) Establish and maintain baseline configurations and inventories of organizational systems (including hardware, software, firmware, and documentation) throughout the respective system development life cycles; (8) Restrict, disable, or prevent the use of nonessential programs, functions, ports, protocols, and services; (9) Enforce a minimum password complexity and change of characters when new passwords are created; (10) Perform maintenance on organizational systems; (11) Provide controls on the tools, techniques, mechanisms, and personnel used to conduct system maintenance; (12) Ensure equipment removed for off-site maintenance is sanitized of any Student Data in accordance with NIST SP 800-88 Revision 1; (13) Protect (i.e., physically control and securely store) system media containing Student Data, both paper and digital; (14) Sanitize or destroy system media containing Student Data in accordance with NIST SP 800-88 Revision 1 before disposal or release for reuse; (15) Control access to media containing Student Data and maintain accountability for media during transport outside of controlled areas; (16) Periodically assess the security controls in organizational systems to determine if the controls are effective in their application and develop and implement plans of action designed to correct deficiencies and reduce or eliminate vulnerabilities in organizational systems; (17) Monitor, control, and protect communications (i.e., information transmitted or received by organizational systems) at the external boundaries and key internal boundaries of organizational systems; (18) Deny network communications traffic by default and allow network communications traffic by exception (i.e., deny all, permit by exception); (19) Protect the confidentiality of Student Data at rest; (20) Identify, report, and correct system flaws in a timely manner; (21) Provide protection from malicious code (i.e. Antivirus and Antimalware) at designated locations within organizational systems; (22) Monitor system security alerts and advisories and take action in response; and (23) Update malicious code protection mechanisms when new releases are available.
Data Protection and Security A. In this Agreement the following terms shall have the meanings respectively ascribed to them:
FOREIGN SECURITIES SYSTEMS Foreign securities shall be maintained in a Foreign Securities System in a designated country through arrangements implemented by the Custodian or a Foreign Sub-Custodian, as applicable, in such country.
Data Security Requirements Without limiting Contractor’s obligation of confidentiality as further described in this Contract, Contractor must establish, maintain, and enforce a data privacy program and an information and cyber security program, including safety, physical, and technical security and resiliency policies and procedures, that comply with the requirements set forth in this Contract and, to the extent such programs are consistent with and not less protective than the requirements set forth in this Contract and are at least equal to applicable best industry practices and standards (NIST 800-53).
Company to Provide Copy of the Prospectus in Form That May be Downloaded from the Internet If requested by the Representatives, the Company shall cause to be prepared and delivered, at its expense, within one business day from the effective date of this Agreement, to the Representatives an “electronic Prospectus” to be used by the Underwriters in connection with the offering and sale of the Offered Shares. As used herein, the term “electronic Prospectus” means a form of Time of Sale Prospectus, and any amendment or supplement thereto, that meets each of the following conditions: (i) it shall be encoded in an electronic format, satisfactory to the Representatives, that may be transmitted electronically by the Representatives and the other Underwriters to offerees and purchasers of the Offered Shares; (ii) it shall disclose the same information as the paper Time of Sale Prospectus, except to the extent that graphic and image material cannot be disseminated electronically, in which case such graphic and image material shall be replaced in the electronic Prospectus with a fair and accurate narrative description or tabular representation of such material, as appropriate; and (iii) it shall be in or convertible into a paper format or an electronic format, satisfactory to the Representatives, that will allow investors to store and have continuously ready access to the Time of Sale Prospectus at any future time, without charge to investors (other than any fee charged for subscription to the Internet as a whole and for on-line time). The Company hereby confirms that it has included or will include in the Prospectus filed pursuant to XXXXX or otherwise with the Commission and in the Registration Statement at the time it was declared effective an undertaking that, upon receipt of a request by an investor or his or her representative, the Company shall transmit or cause to be transmitted promptly, without charge, a paper copy of the Time of Sale Prospectus.
Placement of DNS probes Probes for measuring DNS parameters shall be placed as near as possible to the DNS resolvers on the networks with the most users across the different geographic regions; care shall be taken not to deploy probes behind high propagation-‐delay links, such as satellite links.
UNION RECOGNITION AND SECURITY 6.01 SAHO and the Employers recognize the Union as the sole bargaining representative for all Employees within the scope of this Agreement. 6.02 SAHO and the Employers agree to negotiate with the Union and its designated representatives and agree the Union may have the assistance of outside advisors in negotiation or discussion with XXXX and the Employers. 6.03 Every Employee, who is now or hereafter becomes a member of the Union, shall maintain membership in the Union as a condition of employment, and every new Employee whose employment commences hereafter shall, within thirty (30) days after the commencement of employment, apply for and maintain membership in the Union as a condition of employment, provided that any Employee covered by this agreement who is not required to maintain membership in the Union shall, as a condition of employment, tender to the Union the periodic dues uniformly required to be paid by members of the Union. 6.04 The Employer agrees to deduct uniform membership dues, fees and assessments from the earnings due members of the Union. Deductions shall be made no later than the last pay of each month. (a) Provincial dues, fees and assessments shall be remitted to the SUN office within fifteen (15) calendar days following the date deductions were made. The Employer shall, when remitting such dues, provide in a single report the members’ names, Facility/Agency work location, status, classification, salary step and regular earnings. A list of newly hired, and terminated Employees shall also accompany the remittance. In addition to the information required above, the support list accompanying the remittance of Union dues shall show a residence address for all newly hired Employee(s). On a quarterly basis, the Employer shall provide the names and addresses of the Employees within the scope of the bargaining unit. (b) Local dues, fees and assessments shall be remitted to the Local within fifteen (15) calendar days following the date deductions were made. The Employer shall, when remitting such dues, provide in a single report, the members’ names, Facility/Agency work location, status, classification, salary step and regular earnings. A list of newly hired, and terminated Employees shall also accompany the remittance. In addition to the information required above, the support list accompanying the remittance of Union dues shall show a residence address for all newly hired Employee(s). 6.05 The Union agrees to provide SAHO and 3sHealth Payroll with four
Technical Security Controls 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.