INTEGRITY PROGRAM Sample Clauses

INTEGRITY PROGRAM. 7.1 CP shall cooperate with GLOBALG.A.P. during Integrity Program activities and close any CP non-conformity found during Integrity Assessment. Refusing, hindering or avoiding the Integrity Assessment may lead to CP suspension.
AutoNDA by SimpleDocs
INTEGRITY PROGRAM. 7.1 CP authorizes CB/VB and GLOBALG.A.P. to conduct Integrity Assessments in CP’s and related PGM’s premises and grants CB/VB and GLOBALG.A.P. unrestricted access to conduct Integrity Assessments in CPs’ and related PGMs’ sites in accordance with the relevant GLOBALG.A.P. System Rules. If subcontractors are involved in the production of registered products, CP shall ensure that CB/VB and GLOBALG.A.P. are entitled to conduct Integrity Assessments on the subcontractorssite for those activities related to the GLOBALG.A.P. System. 220505_GG_Sublicense and Certification Agreement_V5_en.docx
INTEGRITY PROGRAM. 6.1 CP shall cooperate with QCI during Integrity Program activities and close any CP non-conformity found during an integrity assessment. Refusing, hindering, or avoiding an integrity assessment may lead to CP suspension and loss of certification.

Related to INTEGRITY PROGRAM

  • Security Program Contractor will develop and implement an effective security program for the Project Site, which program shall require the Contractor and subcontractors to take measures for the protection of their tools, materials, equipment, and structures. As between Contractor and Owner, Contractor shall be solely responsible for security against theft of and damage of all tools and equipment of every kind and nature and used in connection with the Work, regardless of by whom owned.

  • Safety Program The Contractor shall design a specific safety program for the Work for the site(s). The Contractor shall establish and require all Subcontractors to establish reasonable safety programs. The Contractor shall also submit its standard monthly safety reports to the Owner and Design Professional. No imposition of responsibility on the Contractor for safety under this Contract shall relieve any subcontractor of its responsibility for safety of persons or property on or near the Project Site. The Contractor shall include in his plant he names of the person in charge of Safety.

  • CONTRACTOR INTEGRITY PROVISIONS It is essential that those who seek to contract with the Commonwealth of Pennsylvania (“Commonwealth”) observe high standards of honesty and integrity. They must conduct themselves in a manner that fosters public confidence in the integrity of the Commonwealth contracting and procurement process.

  • Security Protocols Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.

  • E-Verify Program Grantee certifies that it utilizes and will continue to utilize the U.S. Department of Homeland Security's E-Verify system to determine the eligibility of:

  • Information Security Program (1) DTI shall implement and maintain a comprehensive written information security program applicable to the Personal Information ("Information Security Program") which shall include commercially reasonable measures, including, as appropriate, policies and procedures and technical, physical, and administrative safeguards that are consistent with industry standards, providing for (i) the security and confidentiality of the Personal Information, (ii) protection of the Personal Information against reasonably foreseeable threats or hazards to the security or integrity of the Personal Information, (iii) protection against unauthorized access to or use of or loss or theft of the Personal Information, and (iv) appropriate disposal of the Personal Information. Without limiting the generality of the foregoing, the Information Security Program shall provide for (i) continual assessment and re-assessment of the risks to the security of Personal Information acquired or maintained by DTI and its agents, contractors and subcontractors in connection with the Services, including but not limited to (A) identification of internal and external threats that could result in unauthorized disclosure, alteration or destruction of Personal Information and systems used by DTI and its agents, contractors and subcontractors, (B) assessment of the likelihood and potential damage of such threats, taking into account the sensitivity of such Personal Information, and (C) assessment of the sufficiency of policies, procedures, information systems of DTI and its agents, contractors and subcontractors, and other arrangements in place, to control risks; and (ii) appropriate protection against such risks.

  • THIRD PARTY PROGRAMS This Licensed Software may contain third party software programs (“Third Party Programs”) that are available under open source or free software licenses. This License Agreement does not alter any rights or obligations You may have under those open source or free software licenses. Notwithstanding anything to the contrary contained in such licenses, the disclaimer of warranties and the limitation of liability provisions in this License Agreement shall apply to such Third Party Programs.

  • SECURITY PROCESSES If requested by an Authorized User as part the Request for Quote process, Contractor shall complete a Consensus Assessment Initiative Questionnaire (CAIQ) including on an annual basis thereafter, if requested by the Authorized User. The CAIQ is available at Cloud Security Alliance (xxxxx://xxxxxxxxxxxxxxxxxxxxx.xxx/). The CAIQ may be used to assist the Authorized User in building the necessary assessment processes when engaging with Contractors. In addition to a request for a CAIQ, Contractor shall cooperate with all reasonable Authorized User requests for a Written description of Contractor’s physical/virtual security and/or internal control processes. The Authorized User shall have the right to reject any Contractor’s RFQ response or terminate an Authorized User Agreement when such a request has been denied. For example, Federal, State and local regulations and/or laws may require that Contractors operate within the Authorized User’s regulatory environment. In order to ensure that security is adequate and free of gaps in control coverage, the Authorized User may require information from the Contractor’s Service Organization Controls (SOC) audit report.

  • Program Integrity The state must have processes in place to ensure that there is no duplication of federal funding for any aspect of the demonstration.

  • Constructability Program 5.2.1 Implement and conduct a constructability program to identify and document Project cost and schedule savings opportunities. The constructability program shall follow accepted industry practices and be reviewed by Owner at design milestones. Whenever the term “value engineering” is used in conjunction with this Agreement or the Project, it has its commonly accepted meaning within the construction industry and does not imply the practice of professional engineering without a license. If any value engineering activities constitute the professional practice of engineering, then such activities shall be performed by an engineer licensed in Texas.

Time is Money Join Law Insider Premium to draft better contracts faster.