Risk Assessment An assessment of any risks inherent in the work requirements and actions to mitigate these risks.
Periodic Risk Assessment Provider further acknowledges and agrees to conduct periodic risk assessments and remediate any identified security and privacy vulnerabilities in a timely manner.
Risk Assessments a. Risk Assessment - Transfer Agent shall, at least annually, perform risk assessments that are designed to identify material threats (both internal and external) against Fund Data, the likelihood of those threats occurring and the impact of those threats upon the Transfer Agent organization to evaluate and analyze the appropriate level of information security safeguards (“Risk Assessments”).
Impact Assessment If Service Provider desires to make any change, upgrade, replacement or addition that may have an adverse impact or require changes as described in Section 9.6(c) or increase the risk of Service Provider not being able to provide the Services in accordance with this Agreement or violate or be inconsistent with DIR Standards or Strategic Plans, then Service Provider shall prepare a written risk assessment and mitigation plan (1) describing in detail the nature and extent of such adverse impact or risk, (2) describing any benefits, savings or risks to DIR or the DIR Customers associated with such change, and (3) proposing strategies to mitigate any adverse risks or impacts associated with such change and, after consultation and agreement with DIR, implement the plan.
Additional security requirements The following provisions apply in respect of any Additional Security provided:
Needs Assessment 1. The Contractor shall conduct a cultural and linguistic group-needs assessment of the eligible client population in the Contractor’s service area to assess the language needs of the population and determine what reasonable steps are necessary to ensure meaningful access to services and activities to eligible individuals. [22 CCR 98310, 98314] The group-needs assessment shall take into account the following four (4) factors:
Security Assessment If Accenture reasonably determines, or in good faith believes, that Supplier’s security practices or procedures do not meet Supplier’s obligations under the Agreement, then Accenture will notify Supplier of the deficiencies. Supplier will without unreasonable delay: (i) correct such deficiencies at its own expense; (ii) permit Accenture, or its duly authorized representatives, to assess Supplier’s security-related activities that are relevant to the Agreement; and (iii) timely complete a security questionnaire from Accenture on a periodic basis upon Accenture’s request. Security issues identified by Accenture will be assigned risk ratings and an agreed-to timeframe to remediate. Supplier will remediate all the security issues identified within the agreed to timeframes. Upon Supplier’s failure to remediate any high or medium rated security issues within the stated timeframes, Accenture may terminate the Agreement in accordance with Section 8 above.
Federal Medicaid System Security Requirements Compliance Party shall provide a security plan, risk assessment, and security controls review document within three months of the start date of this Agreement (and update it annually thereafter) in order to support audit compliance with 45 CFR 95.621 subpart F, ADP System Security Requirements and Review Process.
System Security Review All systems processing and/or storing DHCS PHI or PI must have at least an annual system risk assessment/security review which provides assurance that administrative, physical, and technical controls are functioning effectively and providing adequate levels of protection. Reviews should include vulnerability scanning tools.
Loss Assessment We will pay up to $1000 for your share of loss assessment charged during the policy period against you by a corporation or as- sociation of property owners, when the assess- ment is made as a result of: