Integration Security Review Sample Clauses

Integration Security Review. SFDC may conduct periodic security evaluations of the Integration (“Security Reviews”), which may include a qualitative assessment involving review of a questionnaire completed by Partner, an interview with appropriate Partner personnel, and/or security testing. SFDC conducts such Security Reviews for its own benefit and Partner may not rely on, publicly disclose, or promote an Integration's successful passage of such Security Review. Partner shall not distribute an Integration unless such Integration has successfully passed the Integration Security Review. There may be fees associated with such review. If the Integration, in whole or in part, runs outside SFDC’s systems, security testing may include remote application-level security testing of the Integration, and network-level security testing including a vulnerability threat assessment. SFDC may conduct such testing itself or through a third party. SFDC will provide reasonable notice to Partner before starting such testing. SFDC will cooperate reasonably with Partner to mitigate the effects of such testing on Partner’s business and operations. Partner agrees to cooperate reasonably with such testing. Despite the foregoing, such testing may in rare cases cause downtime or other adverse effects on the Integration or Partner’s systems. Partner agrees that SFDC and its agents or contractors conducting the testing will bear no responsibility or liability arising from such testing. Any Partner Confidential Information to which SFDC obtains access in the course of a Security Review will be subject to Section 5 (Confidentiality).
AutoNDA by SimpleDocs

Related to Integration Security Review

  • System Security Review All systems processing and/or storing County PHI or PI must have at least an annual system risk assessment/security review which provides assurance that administrative, physical, and technical controls are functioning effectively and providing adequate levels of protection. Reviews should include vulnerability scanning tools.

  • Project Monitoring Reporting and Evaluation The Recipient shall furnish to the Association each Project Report not later than forty-five (45) days after the end of each calendar semester, covering the calendar semester.

  • Monitoring Services IDT staff shall, using methods that include face-to-face and other contacts with the member, monitor the services a member receives. This monitoring shall ensure that: a. The member receives the services and supports authorized, arranged for and coordinated by the IDT staff; b. The services and supports identified in the MCP as being provided by natural and community supports are being provided; and c. The quality of the services and supports received is adequate and still necessary to continue to meet the needs and preferences of the member and support the member’s outcomes identified in the MCP.

  • Aviation Security 1. In accordance with their rights and obligations under international law, the Parties reaffirm that their obligation to each other to protect the security of civil aviation against acts of unlawful interference forms an integral part of this Agreement. Without limiting the generality of their rights and obligations under international law, the Parties shall in particular act in conformity with the provisions of the Convention on Offenses and Certain Other Acts Committed on Board Aircraft, done at Tokyo September 14, 1963, the Convention for the Suppression of Unlawful Seizure of Aircraft, done at The Hague December 16, 1970, the Convention for the Suppression of Unlawful Acts against the Safety of Civil Aviation, done at Montreal September 23, 1971, and the Protocol for the Suppression of Unlawful Acts of Violence at Airports Serving International Civil Aviation, done at Montreal February 24, 1988. 2. The Parties shall provide upon request all necessary assistance to each other to prevent acts of unlawful seizure of civil aircraft and other unlawful acts against the safety of such aircraft, of their passengers and crew, and of airports and air navigation facilities, and to address any other threat to the security of civil air navigation. 3. The Parties shall, in their mutual relations, act in conformity with the aviation security standards and appropriate recommended practices established by the International Civil Aviation Organization and designated as Annexes to the Convention; they shall require that operators of aircraft of their registry, operators of aircraft who have their principal place of business or permanent residence in their territory, and the operators of airports in their territory act in conformity with such aviation security provisions. 4. Each Party agrees to observe the security provisions required by the other Party for entry into, for departure from, and while within the territory of that other Party and to take adequate measures to protect aircraft and to inspect passengers, crew, and their baggage and carry-on items, as well as cargo and aircraft stores, prior to and during boarding or loading. Each Party shall also give positive consideration to any request from the other Party for special security measures to meet a particular threat. 5. When an incident or threat of an incident of unlawful seizure of aircraft or other unlawful acts against the safety of passengers, crew, aircraft, airports or air navigation facilities occurs, the Parties shall assist each other by facilitating communications and other appropriate measures intended to terminate rapidly and safely such incident or threat. 6. When a Party has reasonable grounds to believe that the other Party has departed from the aviation security provisions of this Article, the aeronautical authorities of that Party may request immediate consultations with the aeronautical authorities of the other Party. Failure to reach a satisfactory agreement within 15 days from the date of such request shall constitute grounds to withhold, revoke, limit, or impose conditions on the operating authorization and technical permissions of an airline or airlines of that Party. When required by an emergency, a Party may take interim action prior to the expiry of 15 days.

  • Project Review A. Programmatic Allowances 1. If FEMA determines that the entire scope of an Undertaking conforms to one or more allowances in Appendix B of this Agreement, with determinations for Tier II Allowances being made by SOI-qualified staff, FEMA shall complete the Section 106 review process by documenting this determination in the project file, without SHPO review or notification. 2. If the Undertaking involves a National Historic Landmark (NHL), FEMA shall notify the SHPO, participating Tribe(s), and the NPS NHL Program Manager of the NPS Midwest Regional Office that the Undertaking conforms to one or more allowances. FEMA shall provide information about the proposed scope of work for the Undertaking and the allowance(s) enabling FEMA’s determination. 3. If FEMA determines any portion of an Undertaking’s scope of work does not conform to one or more allowances listed in Appendix B, FEMA shall conduct expedited or standard Section 106 review, as appropriate, for the entire Undertaking in accordance with Stipulation II.B, Expedited Review for Emergency Undertakings, or Stipulation II.C, Standard Project Review. 4. Allowances may be revised and new allowances may be added to this Agreement in accordance with Stipulation IV.A.3, Amendments. B. Expedited Review for Emergency Undertakings

  • Evaluation, Testing, and Monitoring 1. The System Agency may review, test, evaluate and monitor Grantee’s Products and services, as well as associated documentation and technical support for compliance with the Accessibility Standards. Review, testing, evaluation and monitoring may be conducted before and after the award of a contract. Testing and monitoring may include user acceptance testing. Neither the review, testing (including acceptance testing), evaluation or monitoring of any Product or service, nor the absence of review, testing, evaluation or monitoring, will result in a waiver of the State’s right to contest the Grantee’s assertion of compliance with the Accessibility Standards. 2. Grantee agrees to cooperate fully and provide the System Agency and its representatives timely access to Products, records, and other items and information needed to conduct such review, evaluation, testing, and monitoring.

  • Information Security IET information security management practices, policies and regulatory compliance requirements are aimed at assuring the confidentiality, integrity and availability of Customer information. The UC Xxxxx Cyber-safety Policy, UC Xxxxx Security Standards Policy (PPM Section 310-22), is adopted by the campus and IET to define the responsibilities and key practices for assuring the security of UC Xxxxx computing systems and electronic data.

  • Constructability Review Prepare detailed interdisciplinary constructability review within Fourteen (14) days of receipt of the plans from the District that: 10.1.2.1.6.1 Ensures construction documents are well coordinated and reviewed for errors; 10.1.2.1.6.2 Identifies to the extent known, construction deficiencies and areas of concern; 10.1.2.1.6.3 Back-checks design drawings for inclusion of modifications; and 10.1.2.1.6.4 Provides the District with written confirmation that: 10.1.2.1.6.4.1 Requirements noted in the design documents prepared for the Project are consistent with and conform to the District's Project requirements and design standards. 10.1.2.1.6.4.2 Various components have been coordinated and are consistent with each other so as to minimize conflicts within or between components of the design documents.

  • Application Security The ISP will require that in-house application development be governed by a documented secure software development life cycle methodology, which will include deployment rules for new applications and changes to existing applications in live production environments.

  • OIG INSPECTION, AUDIT, AND REVIEW RIGHTS ‌ In addition to any other rights OIG may have by statute, regulation, or contract, OIG or its duly authorized representative(s) may conduct interviews, examine or request copies of Xxxxxx’x books, records, and other documents and supporting materials and/or conduct on-site reviews of any of Xxxxxx’x locations for the purpose of verifying and evaluating: (a) Xxxxxx’x compliance with the terms of this IA and (b) Xxxxxx’x compliance with the requirements of the Federal health care programs. The documentation described above shall be made available by Xxxxxx to OIG or its duly authorized representative(s) at all reasonable times for inspection, audit, and/or reproduction. Furthermore, for purposes of this provision, OIG or its duly authorized representative(s) may interview Xxxxxx and any of Xxxxxx’x employees or contractors who consent to be interviewed at the individual’s place of business during normal business hours or at such other place and time as may be mutually agreed upon between the individual and OIG. Xxxxxx shall assist OIG or its duly authorized representative(s) in contacting and arranging interviews with such individuals upon OIG’s request. Xxxxxx’x employees and contractors may elect to be interviewed with or without a representative of Xxxxxx present.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!