General Security Guidelines Sample Clauses

General Security Guidelines. Contractor will be solely responsible for the information technology infrastructure, including all computers, software, databases, electronic systems (including database management systems, email systems, auditing, and monitoring systems) and networks used by or for Contractor (“Contractor Systems”) to access County resources (including County systems), County data or otherwise in connection with the Services and shall prevent unauthorized access to County resources (including County systems) or County data through the Contractor Systems.
AutoNDA by SimpleDocs
General Security Guidelines. Contractor will be solely responsible for the information technology infrastructure, including all computers, software, databases, electronic systems (including database management systems, email systems, auditing, and monitoring systems) AMR0121-A1 January 12, 2024 DocuSign Envelope ID: 38FE53CB-23DB-4F33-BEA3-052481BD6AFC and networks used by or for Contractor (“Contractor Systems”) to access County resources (including County systems), County data or otherwise in connection with the Services and shall prevent unauthorized access to County resources (including County systems) or County data through the Contractor Systems.
General Security Guidelines. Contractor will be solely responsible for the information technology infrastructure, including all computers, software, databases, electronic systems (including database management systems, email systems, auditing, and monitoring systems) and networks used by or for Contractor (“Contractor Systems”) to access County resources (including County systems), County data or otherwise in connection with the Services and DocuSign Envelope ID: C1699981-367A-4E93-B66A-CA0849068709 DocuSign Envelope ID: 81A5495A-230D-4264-8358-EB12B24A8B8D DocuSign Envelope ID: 8FC5ECED-4536-49EB-A4AB-9CA23D0B1D81 shall prevent unauthorized access to County resources (including County systems) or County data through the Contractor Systems.
General Security Guidelines 

Related to General Security Guidelines

  • Policies and Regulations In addition to the Federal Acquisition Regulation (FAR) clauses referred to and listed herein of this Request for Proposal (RFP), the contractor shall comply with the Federal Regulations, Acts, Executive Orders, Special Publications, Guidelines, NOAA Directives and Policies and standards listed below. This listing is not all-inclusive and is not intended to relieve the contractor of its responsibilities for identification of applicable statutes, regulations and procedures and compliance therewith, when performing work under this SOW. • Xxxxxxxx-Xxxxxxx Xxxxxxx, Management, and Conservation Act (MSA) • Marine Mammal Protection Act (MMPA) • Endangered Species Act (ESA) • Data Quality Control Act (P.L. 106-514) • Information Technology Security Policy • Fisheries Management Plans (FMP) • Biological Opinions (BO) • Take Reduction Team (TRT) • NOAA Safety Standards • Fair Labor Standards Act (FLSA) • Service Contract Act (SCA) • Department of Labor Wage Determinations • Applicable Federal and State labor laws • At-Sea Monitor Health and Safety regulations • Federal, state, and local safety regulations • Merchant Marine Act (Xxxxx Act) and General Maritime Law • U.S. Xxxxxxxxx and Harbor Worker’s Compensation Act

  • Policies and Procedures i) The policies and procedures of the designated employer apply to the employee while working at both sites.

  • Compliance with Laws, Rules and Regulations a. Assurances. The Contractor agrees that all activity pursuant to this Contract will be in accordance with all applicable current federal, state and local laws, rules, and regulations, including but not limited to the Public Records Act (chapter 42.56 RCW), the Freedom of Information Act (5 U.S.C. 522) and the Records Retention Act (chapter 40.14 RCW).

  • COMPLIANCE WITH NEW YORK STATE INFORMATION SECURITY BREACH AND NOTIFICATION ACT Contractor shall comply with the provisions of the New York State Information Security Breach and Notification Act (General Business Law Section 899-aa; State Technology Law Section 208).

  • Compliance with Consensus Policies and Temporary Policies Registry Operator shall comply with and implement all Consensus Policies and Temporary Policies found at <xxxx://xxx.xxxxx.xxx/general/consensus-­‐policies.htm>, as of the Effective Date and as may in the future be developed and adopted in accordance with the ICANN Bylaws, provided such future Consensus Polices and Temporary Policies are adopted in accordance with the procedure and relate to those topics and subject to those limitations set forth in Specification 1 attached hereto (“Specification 1”).

Time is Money Join Law Insider Premium to draft better contracts faster.