General Security Guidelines Sample Clauses

General Security Guidelines. Contractor will be solely responsible for the information technology infrastructure, including all computers, software, databases, electronic systems (including database management systems, email systems, auditing, and monitoring systems) and networks used by or for Contractor (“Contractor Systems”) to access County resources (including County systems), County data or otherwise in connection with the Services and shall prevent unauthorized access to County resources (including County systems) or County data through the Contractor Systems.
AutoNDA by SimpleDocs
General Security Guidelines. Contractor will be solely responsible for the information technology infrastructure, including all computers, software, databases, electronic systems (including database management systems, email systems, auditing, and monitoring systems) and networks used by or for Contractor (“Contractor Systems”) to access County resources (including County systems), County data or otherwise in connection with the Services and DocuSign Envelope ID: 9AF40527-22C4-4230-B711-536D5ED76CF0 shall prevent unauthorized access to County resources (including County systems) or County data through the Contractor Systems.
General Security Guidelines. Contractor will be solely responsible for the information technology infrastructure, including all computers, software, databases, electronic systems (including database management systems, email systems, auditing, and monitoring systems) and networks used by or for Contractor (“Contractor Systems”) to access County resources (including County systems), County data or otherwise in connection with the Services and DocuSign Envelope ID: C1699981-367A-4E93-B66A-CA0849068709 DocuSign Envelope ID: 81A5495A-230D-4264-8358-EB12B24A8B8D DocuSign Envelope ID: 8FC5ECED-4536-49EB-A4AB-9CA23D0B1D81 shall prevent unauthorized access to County resources (including County systems) or County data through the Contractor Systems.
General Security Guidelines 

Related to General Security Guidelines

  • Policies, Guidelines, Directives and Standards Either the Funder or the Ministry will give the HSP Notice of any amendments to the manuals, guidelines or policies identified in Schedule C. An amendment will be effective in accordance with the terms of the amendment. By signing a copy of this Agreement the HSP acknowledges that it has a copy of the documents identified in Schedule C.

  • General Guidelines 1. Conduct yourself in a responsible manner at all times in the laboratory.

  • Policies and Regulations 16 In addition to the Federal Acquisition Regulation (FAR) clauses referred to and listed herein of 17 this Request for Proposal (RFP), the contractor shall comply with the Federal Regulations, Acts, 18 Executive Orders, Special Publications, Guidelines, NOAA Directives and Policies and standards 19 listed below. This listing is not all‐inclusive and is not intended to relieve the contractor of its 20 responsibilities for identification of applicable statutes, regulations and procedures and 21 compliance therewith, when performing work under this SOW. 22 • Xxxxxxxx‐Xxxxxxx Fishery, Management, and Conservation Act (MSA) 23 • Marine Mammal Protection Act (MMPA) 24 • Endangered Species Act (ESA) 25 • Data Quality Control Act (P.L. 106‐514) 26 • Information Technology Security Policy 27 • Fisheries Management Plans (FMP) 28 • Biological Opinions (BO) 29 • Take Reduction Team (TRT) 30 • NOAA Safety Standards 31 • Fair Labor Standards Act (FLSA) 32 • Service Contract Act (SCA) 33 • Department of Labor Wage Determinations 34 • Applicable Federal and State labor laws 35 • At‐Sea Monitor Health and Safety regulations 36 • Federal, state, and local safety regulations 37 • Merchant Marine Act (Xxxxx Act) and General Maritime Law 38 • U.S. Xxxxxxxxx and Harbor Worker’s Compensation Act 39 40 C.4. PERFORMANCE WORK STATEMENT 1 The contractor shall meet all requirements of the SOW.

  • Compliance with Rules and Regulations PFPC undertakes to comply with all applicable requirements of the Securities Laws and any laws, rules and regulations of governmental authorities having jurisdiction with respect to the duties to be performed by PFPC hereunder. Except as specifically set forth herein, PFPC assumes no responsibility for such compliance by the Fund or any other entity.

  • Policies and Procedures i) The policies and procedures of the designated employer apply to the employee while working at both sites.

  • Compliance with Laws, Rules and Regulations a. Assurances. The Contractor agrees that all activity pursuant to this Contract will be in accordance with all applicable current federal, state and local laws, rules, and regulations, including but not limited to the Public Records Act (chapter 42.56 RCW), the Freedom of Information Act (5 U.S.C. 522) and the Records Retention Act (chapter 40.14 RCW).

  • COMPLIANCE WITH NEW YORK STATE INFORMATION SECURITY BREACH AND NOTIFICATION ACT Contractor shall comply with the provisions of the New York State Information Security Breach and Notification Act (General Business Law Section 899-aa; State Technology Law Section 208).

  • Compliance with Consensus Policies and Temporary Policies Registry Operator shall comply with and implement all Consensus Policies and Temporary Policies found at <xxxx://xxx.xxxxx.xxx/general/consensus-­‐policies.htm>, as of the Effective Date and as may in the future be developed and adopted in accordance with the ICANN Bylaws, provided such future Consensus Polices and Temporary Policies are adopted in accordance with the procedure and relate to those topics and subject to those limitations set forth in Specification 1 attached hereto (“Specification 1”).

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!