Program Overview Microsoft extends to eligible partners the opportunity to participate in the Program referenced above subject to these Program Terms & Conditions (“Program Terms”). Each entity participating in the Program is hereinafter referred to as a “Participant.” Participation in the Program is voluntary. The Program is governed by the Program Terms, which incorporate by reference the Microsoft Partner Network Agreement (as in effect between Microsoft and Participant, the “MPN Agreement”). Capitalized terms used but not defined in these Program Terms have the meanings assigned to them in the MPN Agreement. These Program Terms are subject to local requirements and may vary by jurisdiction, and Participant retains sole discretion to set pricing for sales of applicable products.
Office of Inspector General Investigative Findings Expert Review In accordance with Senate Bill 799, Acts 2021, 87th Leg., R.S., if Texas Government Code, Section 531.102(m-1)(2) is applicable to this Contract, Contractor affirms that it possesses the necessary occupational licenses and experience.
Post Review With respect to each contract not governed by paragraph 2 of this Part, the procedures set forth in paragraph 4 of Appendix 1 to the Guidelines shall apply.
Business Review Meetings In order to maintain the relationship between the Department and the Contractor, each quarter the Department may request a business review meeting. The business review meeting may include, but is not limited to, the following: • Successful completion of deliverables • Review of the Contractor’s performance • Review of minimum required reports • Addressing of any elevated Customer issues • Review of continuous improvement ideas that may help lower total costs and improve business efficiencies.
System Security Review All systems processing and/or storing County PHI or PI must have at least an annual system risk assessment/security review which provides assurance that administrative, physical, and technical controls are functioning effectively and providing adequate levels of protection. Reviews should include vulnerability scanning tools.