Identification Security and Access Requirements Sample Clauses

Identification Security and Access Requirements 
AutoNDA by SimpleDocs

Related to Identification Security and Access Requirements

  • RETENTION AND ACCESS REQUIREMENTS FOR RECORDS The County shall retain all records pertinent to this agreement for a period of no less than 3 years from the expiration or termination date. As used in this provision, records includes books, documents, accounting procedures and practice, and other data, regardless of the type or format. The County shall provide access and the right to examine all records related to this agreement to the U.S. Forest Service Inspector General, or Comptroller General or their authorized representative. The rights of access in this section must not be limited to the required retention period but must last as long as the records are kept. If any litigation, claim, negotiation, audit, or other action involving the records has been started before the end of the 3-year period, the records must be kept until all issues are resolved, or until the end of the regular 3-year period, whichever is later. Records for nonexpendable property acquired in whole or in part, with Federal funds must be retained for 3 years after its final disposition.

  • Inclusion and accessibility The institution will provide support to incoming mobile participants with fewer opportunities, according to the requirements of the Erasmus Charter for Higher Education. Information and assistance can be provided by the following contact points and information sources: Country Available infrastructure adjusted for people with Description of infrastructure Contact e-mail and phone Website for information FROM TO CZ PL --- --- --- PL CZ --- --- xxxx://xxx.xxxxxxxxx.xxxx.xx/?la ng=en Country Available support services for people with Description of infrastructure Contact e-mail and phone Website for information FROM TO CZ PL --- --- --- PL CZ --- --- ---

  • Information Security IET information security management practices, policies and regulatory compliance requirements are aimed at assuring the confidentiality, integrity and availability of Customer information. The UC Xxxxx Cyber-safety Policy, UC Xxxxx Security Standards Policy (PPM Section 310-22), is adopted by the campus and IET to define the responsibilities and key practices for assuring the security of UC Xxxxx computing systems and electronic data.

Time is Money Join Law Insider Premium to draft better contracts faster.