Disaster Services In the event of a local, state, or federal emergency, including natural, man-made, criminal, terrorist, and/or bioterrorism events, declared as a state disaster by the Governor, or a federal disaster declared by the appropriate federal official, Grantee may be called upon to assist the System Agency in providing the following services: i. Community evacuation; ii. Health and medical assistance; iii. Assessment of health and medical needs; iv. Health surveillance; v. Medical care personnel; vi. Health and medical equipment and supplies; vii. Patient evacuation; viii. In-hospital care and hospital facility status; ix. Food, drug and medical device safety; x. Worker health and safety; xi. Mental health and substance abuse; xii. Public health information; xiii. Vector control and veterinary services; and xiv. Victim identification and mortuary services.
Business Continuity and Disaster Recovery Bank shall maintain and update from time to time business continuation and disaster recovery procedures with respect to its global custody business, which are designed, in the event of a significant business disruption affecting Bank, to be sufficient to enable Bank to resume and continue to perform its duties and obligations under this Agreement without undue delay or disruption. Bank shall test the operability of such procedures at least annually. Bank shall enter into and shall maintain in effect at all times during the term of this Agreement reasonable provision for (i) periodic back-up of the computer files and data with respect to Customer and (ii) use of alternative electronic data processing equipment to provide services under this Agreement. Upon reasonable request, Bank shall discuss with Customer any business continuation and disaster recovery procedures of Bank. Bank represents that its business continuation and disaster recovery procedures are appropriate for its business as a global custodian to investment companies registered under the 1940 Act.
Incident Event and Communications Management a. Incident Management/Notification of Breach - DST shall develop, implement and maintain an incident response plan that specifies actions to be taken when DST or one of its subcontractors suspects or detects that a party has gained material unauthorized access to Fund Data or systems or applications containing any Fund Data (the “Response Plan”). Such Response Plan shall include the following: i. Escalation Procedures - An escalation procedure that includes notification to senior managers and appropriate reporting to regulatory and law enforcement agencies. This procedure shall provide for reporting of incidents that compromise the confidentiality of Fund Data (including backed up data) to Fund via telephone or email (and provide a confirmatory notice in writing as soon as practicable); provided that the foregoing notice obligation is excused for such period of time as DST is prohibited by law, rule, regulation or other governmental authority from notifying Fund. ii. Incident Reporting - DST will use commercially reasonable efforts to promptly furnish to Fund information that DST has regarding the general circumstances and extent of such unauthorized access to the Fund Data.
Data Necessary to Perform Services The Trust or its agent shall furnish to USBFS the data necessary to perform the services described herein at such times and in such form as mutually agreed upon.
Requester and Approved User Responsibilities The Requester agrees through the submission of the DAR that the PI named has reviewed and understands the principles for responsible research use and data management of the genomic datasets as defined in the NIH Security Best Practices for Controlled-Access Data Subject to the GDS Policy. The Requester and Approved Users further acknowledge that they are responsible for ensuring that all uses of the data are consistent with national, tribal, and state laws and regulations, as appropriate, as well as relevant institutional policies and procedures for managing sensitive genomic and phenotypic data. The Requester certifies that the PI is in good standing (i.e., no known sanctions) with the institution, relevant funding agencies, and regulatory agencies and is eligible to conduct independent research (i.e., is not a postdoctoral fellow, student, or trainee). The Requester and any Approved Users may use the dataset(s) only in accordance with the parameters described on the study page and in the 1 If contractor services are to be utilized, PI requesting the data must provide a brief description of the services that the contractor will perform for the PI (e.g., data cleaning services) in the research use statement of the DAR. Additionally, the Key Personnel section of the DAR must include the name of the contractor’s employee(s) who will conduct the work. These requirements apply whether the contractor carries out the work at the PI’s facility or at the contractor’s facility. In addition, the PI is expected to include in any contract agreement requirements to ensure that any of the contractor’s employees who have access to the data adhere to the NIH GDS Policy, this Data Use Certification Agreement, and the NIH Security Best Practices for Controlled-Access Data Subject to the GDS Policy. Note that any scientific collaborators, including contractors, who are not at the Requester must submit their own DAR. Addendum to this Agreement for the appropriate research use, as well as any limitations on such use, of the dataset(s), as described in the DAR, and as required by law. Through the submission of this DAR, the Requester and Approved Users acknowledge receiving and reviewing a copy of the Addendum which includes Data Use Limitation(s) for each dataset requested. The Requester and Approved Users agree to comply with the terms listed in the Addendum. Through submission of the DAR, the PI and Requester agree to submit a Project Renewal or Project Close-out prior to the expiration date of the one (1) year data access period. The PI also agrees to submit an annual Progress Update prior to the one (1) year anniversary2 of the project, as described under Research Use Reporting (Term 10) below. By approving and submitting the attached DAR, the Institutional Signing Official provides assurance that relevant institutional policies and applicable local, state, tribal, and federal laws and regulations, as applicable, have been followed, including IRB approval, if required. Approved Users may be required to have IRB approval if they have access to personal identifying information for research participants in the original study at their institution, or through their collaborators. The Institutional Signing Official also assures, through the approval of the DAR, that other institutional departments with relevant authorities (e.g., those overseeing human subjects research, information technology, technology transfer) have reviewed the relevant sections of the NIH GDS Policy and the associated procedures and are in agreement with the principles defined. The Requester acknowledges that controlled-access datasets subject to the NIH GDS Policy may be updated to exclude or include additional information. Unless otherwise indicated, all statements herein are presumed to be true and applicable to the access and use of all versions of these datasets.
Reporting of Non-Force Majeure Events Each Party (the “Notifying Party”) shall notify the other Parties when the Notifying Party becomes aware of its inability to comply with the provisions of this Agreement for a reason other than a Force Majeure event. The Parties agree to cooperate with each other and provide necessary information regarding such inability to comply, including the date, duration, reason for the inability to comply, and corrective actions taken or planned to be taken with respect to such inability to comply. Notwithstanding the foregoing, notification, cooperation or information provided under this Article shall not entitle the Party receiving such notification to allege a cause for anticipatory breach of this Agreement.
Construction Management Services a. A-E may be required to review and recommend approval of submittals, shop drawings, Request for Information (RFI) and/or calculations for temporary structures such as trench shoring, false work and other temporary structural forms. b. A-E may be required to review and advise the County Representative on the overall project schedule, including staging and completion dates, duration, milestones, and interfaces. Immediately notify Representative if the proposed work schedule does not conform to the contract documents, including the plans, specifications, and permits or that may require special inspection or testing, or work stoppage. c. Review on a monthly basis the project schedule and/or Critical Path Method (CPM) schedule submitted by the Construction Contractor. Make recommendations concerning the Construction Contractor’s adherence thereto. Recommend possible solutions to scheduling problems so as to complete the project on time, within budget, and in accordance with the contract drawings and specifications. d. Review scope of work and identify potential contract change orders. Prepare independent cost estimates for any changes resulting from design revisions or change in field conditions. Prepare and recommend for approval all contract change orders. e. Evaluate the merit of any potential claims or requests for equitable adjustment submitted by the Construction Contractor. Prepare analysis of potential claims include recommendations regarding settlement of the claims. f. Assist County staff in project related issues with other Agencies, or departments, engineering and material testing support firms, CEQA consultants, utilities agencies, etc. g. Assist in community outreach meetings and media relations h. Review for acceptance/approval of Storm Water Pollution Prevention Plan (SWPPP) in accordance with the general Permit of Discharges of Storm Water Associated with Construction Activity (Construction General Permit, including dewatering/diversion plans per the State’s DeMinimus Permit).
Information Systems Acquisition Development and Maintenance a. Client Data – Client Data will only be used by State Street for the purposes specified in this Agreement.
Infrastructure Vulnerability Scanning Supplier will scan its internal environments (e.g., servers, network devices, etc.) related to Deliverables monthly and external environments related to Deliverables weekly. Supplier will have a defined process to address any findings but will ensure that any high-risk vulnerabilities are addressed within 30 days.
Information Management Information and Records