General Security Guidelines Sample Clauses

General Security Guidelines. Contractor will be solely responsible for the information technology infrastructure, including all computers, software, databases, electronic systems (including database management systems, email systems, auditing, and monitoring systems) and networks used by or for Contractor (“Contractor Systems”) to access County resources (including County systems), County data or otherwise in connection with the Services and shall prevent unauthorized access to County resources (including County systems) or County data through the Contractor Systems.
AutoNDA by SimpleDocs
General Security Guidelines. Contractor will be solely responsible for the information technology infrastructure, including all computers, software, databases, electronic systems (including database management systems, email systems, auditing, and monitoring systems) AMR0121-A1 January 12, 2024 DocuSign Envelope ID: 38FE53CB-23DB-4F33-BEA3-052481BD6AFC and networks used by or for Contractor (“Contractor Systems”) to access County resources (including County systems), County data or otherwise in connection with the Services and shall prevent unauthorized access to County resources (including County systems) or County data through the Contractor Systems.
General Security Guidelines. Contractor will be solely responsible for the information technology infrastructure, including all computers, software, databases, electronic systems (including database management systems, email systems, auditing, and monitoring systems) and networks used by or for Contractor (“Contractor Systems”) to access County resources (including County systems), County data or otherwise in connection with the Services and DocuSign Envelope ID: C1699981-367A-4E93-B66A-CA0849068709 DocuSign Envelope ID: 81A5495A-230D-4264-8358-EB12B24A8B8D DocuSign Envelope ID: 8FC5ECED-4536-49EB-A4AB-9CA23D0B1D81 shall prevent unauthorized access to County resources (including County systems) or County data through the Contractor Systems.
General Security Guidelines 

Related to General Security Guidelines

  • Policies, Guidelines, Directives and Standards Either the Funder or the Ministry will give the HSP Notice of any amendments to the manuals, guidelines or policies identified in Schedule C. An amendment will be effective in accordance with the terms of the amendment. By signing a copy of this Agreement the HSP acknowledges that it has a copy of the documents identified in Schedule C.

  • Policies and Regulations In addition to the Federal Acquisition Regulation (FAR) clauses referred to and listed herein of this Request for Proposal (RFP), the contractor shall comply with the Federal Regulations, Acts, Executive Orders, Special Publications, Guidelines, NOAA Directives and Policies and standards listed below. This listing is not all-inclusive and is not intended to relieve the contractor of its responsibilities for identification of applicable statutes, regulations and procedures and compliance therewith, when performing work under this SOW. • Xxxxxxxx-Xxxxxxx Xxxxxxx, Management, and Conservation Act (MSA) • Marine Mammal Protection Act (MMPA) • Endangered Species Act (ESA) • Data Quality Control Act (P.L. 106-514) • Information Technology Security Policy • Fisheries Management Plans (FMP) • Biological Opinions (BO) • Take Reduction Team (TRT) • NOAA Safety Standards • Fair Labor Standards Act (FLSA) • Service Contract Act (SCA) • Department of Labor Wage Determinations • Applicable Federal and State labor laws • At-Sea Monitor Health and Safety regulations • Federal, state, and local safety regulations • Merchant Marine Act (Xxxxx Act) and General Maritime Law • U.S. Xxxxxxxxx and Harbor Worker’s Compensation Act

  • Policies and Procedures i) The policies and procedures of the designated employer apply to the employee while working at both sites.

Time is Money Join Law Insider Premium to draft better contracts faster.