Manage Security Sample Clauses

Manage Security. The contractor shall manage security activities at the unclassified, CUI, and all applicable classification levels encompassing all security disciplines (Information Security, Operations Security, Anti-Terrorism and Force Protection, International Security, Physical Security, Communications Security, Information Systems Security, and Personnel Security). This requirement is to utilize the above security functions to protect the programs information and technology.
AutoNDA by SimpleDocs
Manage Security. The Contractor shall manage all security pertaining to CM and EM/VR for deployed LCS that are located at any location in the Western Pacific and Indian Oceans and the countries and ports therein. This includes physical, operational, and information security.

Related to Manage Security

  • STATE SECURITY 4.01 Nothing in this Agreement shall be construed as requiring the Employer to do or refrain from doing anything contrary to any instruction, direction or regulations given or made by or on behalf of the Government of Canada in the interest of the safety or security of Canada or any state allied or associated with Canada.

  • Site Security While providing services at a DSHS location, the Contractor, its agents, employees, or Subcontractors shall conform in all respects with physical, fire, or other security regulations specific to the DSHS location.

  • Portfolio Security Portfolio Security will mean any security owned by the Fund.

  • E7 Security The Authority shall be responsible for maintaining the security of the Authority premises in accordance with its standard security requirements. The Contractor shall comply with all security requirements of the Authority while on the Authority premises, and shall ensure that all Staff comply with such requirements.

  • Not a Security None of the Notes shall be deemed to be a security within the meaning of the Securities Act of 1933 or the Securities Exchange Act of 1934.

  • System Security (a) If any party hereto is given access to the other party’s computer systems or software (collectively, the “Systems”) in connection with the Services, the party given access (the “Availed Party”) shall comply with all of the other party’s system security policies, procedures and requirements that have been provided to the Availed Party in advance and in writing (collectively, “Security Regulations”), and shall not tamper with, compromise or circumvent any security or audit measures employed by such other party. The Availed Party shall access and use only those Systems of the other party for which it has been granted the right to access and use. (b) Each party hereto shall use commercially reasonable efforts to ensure that only those of its personnel who are specifically authorized to have access to the Systems of the other party gain such access, and use commercially reasonable efforts to prevent unauthorized access, use, destruction, alteration or loss of information contained therein, including notifying its personnel of the restrictions set forth in this Agreement and of the Security Regulations. (c) If, at any time, the Availed Party determines that any of its personnel has sought to circumvent, or has circumvented, the Security Regulations, that any unauthorized Availed Party personnel has accessed the Systems, or that any of its personnel has engaged in activities that may lead to the unauthorized access, use, destruction, alteration or loss of data, information or software of the other party hereto, the Availed Party shall promptly terminate any such person’s access to the Systems and immediately notify the other party hereto. In addition, such other party hereto shall have the right to deny personnel of the Availed Party access to its Systems upon notice to the Availed Party in the event that the other party hereto reasonably believes that such personnel have engaged in any of the activities set forth above in this Section 9.2(c) or otherwise pose a security concern. The Availed Party shall use commercially reasonable efforts to cooperate with the other party hereto in investigating any apparent unauthorized access to such other party’s Systems.

  • ASSOCIATION SECURITY 5.01 The Hospital will deduct from each nurse covered by this Agreement an amount equal to the regular monthly Association dues designated by the Association. The deduction period for a part-time nurse may be extended where the nurse does not receive any pay in a particular month. Where a nurse has no dues deducted during the payroll period from which dues are normally deducted, that deduction shall be made in the next payroll period provided the nurse has earnings in the next payroll period. If the failure to deduct dues results from an error by the Hospital, then, as soon as the error is called to its attention by the union, the Hospital shall make the deduction in the manner agreed to by the parties. If there is no agreement, the Hospital shall make the deduction in the manner prescribed by the union. 5.02 Such dues shall be deducted monthly and in the case of newly employed nurses, such deductions shall commence in the month following their date of hire. 5.03 The amount of the regular monthly dues shall be those authorized by the Association and the Vice-President, Finance of the Association shall notify the Hospital of any changes therein and such notification shall be the Hospital's conclusive authority to make the deduction specified. In the case of any local dues levies, notification will be made by the local treasurer and such notification shall be the Hospital’s conclusive authority to make the deduction specified. 5.04 In consideration of the deducting and forwarding of Association dues by the Hospital, the Association agrees to indemnify and save harmless the Hospital against any claims or liabilities arising or resulting from the operation of this Article. 5.05 The amounts so deducted shall be remitted monthly to the Vice-President, Finance of the Association, no later than the end of the month following the month in which the dues were deducted. In remitting such dues, the Hospital shall provide a list of nurses from whom deductions were made, their work site (if the bargaining unit covers more than one site) and the nurses’ social insurance numbers, amount of dues deducted and, where feasible, the Hospital shall also provide the job classification, and status of the nurses. The list shall also include deletions and additions from the preceding month highlighting new hires, resignations, terminations, new unpaid leave of absence of greater than one (1) month and returns from leaves of absence. A copy of this list will be sent concurrently to the local Association. Where the parties agree, the Hospital may also provide the information in an electronic format or on a computer disk. If the central parties are able to agree on a template for dues related information, it will be distributed and jointly recommended to the Hospitals. 5.06 The Hospital agrees that an officer of the Association or Union representative shall be allowed a reasonable period during regular working hours to interview newly hired nurses during their probationary period. During such interview, membership forms may be provided to the nurse. These interviews shall be scheduled in advance as determined by local negotiation and may be arranged collectively or individually by the Hospital. NOTE: The list provided for in Article 5.05 shall include any other information that is currently provided to ONA. Additionally, the Hospital will provide each nurse with a T-4 Supplementary Slip showing the dues deducted in the previous year for income tax purposes where such information is or becomes readily available through the Hospital's payroll system.

  • Financial Services Article 116

  • SOFTWARE SECURITY If applicable, BA warrants that software security features will be compatible with the CE’s HIPAA compliance requirements. This HIPAA Business Associate Agreement-Addendum shall supersede any prior HIPAA Business Associate Agreements between CE and BA.

  • Portfolio Securities Portfolio securities of the Issuer may be bought or sold by or through Distributors, and Distributors may participate directly or indirectly in brokerage commissions or "spreads" for transactions in portfolio securities of the Issuer.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!