We use cookies on our site to analyze traffic, enhance your experience, and provide you with tailored content.

For more information visit our privacy policy.

Manage Security Sample Clauses

Manage SecurityThe contractor shall manage security activities at the unclassified, CUI, and all applicable classification levels encompassing all security disciplines (Information Security, Operations Security, Anti-Terrorism and Force Protection, International Security, Physical Security, Communications Security, Information Systems Security, and Personnel Security). This requirement is to utilize the above security functions to protect the programs information and technology.
Manage SecurityThe Contractor shall manage all security pertaining to CM and EM/VR for deployed LCS that are located at any location in the Western Pacific and Indian Oceans and the countries and ports therein. This includes physical, operational, and information security.

Related to Manage Security

  • STATE SECURITY 4.01 Nothing in this Agreement shall be construed as requiring the Employer to do or refrain from doing anything contrary to any instruction, direction or regulations given or made by or on behalf of the Government of Canada in the interest of the safety or security of Canada or any state allied or associated with Canada.

  • Site Security While providing services at a DSHS location, the Contractor, its agents, employees, or Subcontractors shall conform in all respects with physical, fire, or other security regulations specific to the DSHS location.

  • Portfolio Security Portfolio Security will mean any security owned by the Fund.

  • E7 Security The Authority shall be responsible for maintaining the security of the Authority premises in accordance with its standard security requirements. The Contractor shall comply with all security requirements of the Authority while on the Authority premises, and shall ensure that all Staff comply with such requirements.

  • Not a Security None of the Notes shall be deemed to be a security within the meaning of the Securities Act of 1933 or the Securities Exchange Act of 1934.

  • System Security (a) If any party hereto is given access to the other party’s computer systems or software (collectively, the “Systems”) in connection with the Services, the party given access (the “Availed Party”) shall comply with all of the other party’s system security policies, procedures and requirements that have been provided to the Availed Party in advance and in writing (collectively, “Security Regulations”), and shall not tamper with, compromise or circumvent any security or audit measures employed by such other party. The Availed Party shall access and use only those Systems of the other party for which it has been granted the right to access and use. (b) Each party hereto shall use commercially reasonable efforts to ensure that only those of its personnel who are specifically authorized to have access to the Systems of the other party gain such access, and use commercially reasonable efforts to prevent unauthorized access, use, destruction, alteration or loss of information contained therein, including notifying its personnel of the restrictions set forth in this Agreement and of the Security Regulations. (c) If, at any time, the Availed Party determines that any of its personnel has sought to circumvent, or has circumvented, the Security Regulations, that any unauthorized Availed Party personnel has accessed the Systems, or that any of its personnel has engaged in activities that may lead to the unauthorized access, use, destruction, alteration or loss of data, information or software of the other party hereto, the Availed Party shall promptly terminate any such person’s access to the Systems and immediately notify the other party hereto. In addition, such other party hereto shall have the right to deny personnel of the Availed Party access to its Systems upon notice to the Availed Party in the event that the other party hereto reasonably believes that such personnel have engaged in any of the activities set forth above in this Section 9.2(c) or otherwise pose a security concern. The Availed Party shall use commercially reasonable efforts to cooperate with the other party hereto in investigating any apparent unauthorized access to such other party’s Systems.

  • ASSOCIATION SECURITY 5.01 The Hospital will deduct from each nurse covered by this Agreement an amount equal to the regular monthly Association dues designated by the Association. The deduction period for a part-time nurse may be extended where the nurse does not receive any pay in a particular month. Where a nurse has no dues deducted during the payroll period from which dues are normally deducted, that deduction shall be made in the next payroll period provided the nurse has earnings in the next payroll period. If the failure to deduct dues results from an error by the Hospital, then, as soon as the error is called to its attention by the union, the Hospital shall make the deduction in the manner agreed to by the parties. If there is no agreement, the Hospital shall make the deduction in the manner prescribed by the union. 5.02 Such dues shall be deducted monthly and in the case of newly employed nurses, such deductions shall commence in the month following their date of hire. 5.03 The amount of the regular monthly dues shall be those authorized by the Association and the Vice-President, Finance of the Association shall notify the Hospital of any changes therein and such notification shall be the Hospital's conclusive authority to make the deduction specified. In the case of any local dues levies, notification will be made by the local treasurer and such notification shall be the Hospital’s conclusive authority to make the deduction specified. 5.04 In consideration of the deducting and forwarding of Association dues by the Hospital, the Association agrees to indemnify and save harmless the Hospital against any claims or liabilities arising or resulting from the operation of this Article. 5.05 The amounts so deducted shall be remitted monthly to the Vice-President, Finance of the Association, no later than the end of the month following the month in which the dues were deducted. In remitting such dues, the Hospital shall provide a list of nurses from whom deductions were made, their work site (if the bargaining unit covers more than one site) and the nurses’ social insurance numbers, amount of dues deducted and, where feasible, the Hospital shall also provide the job classification, and status of the nurses. The list shall also include deletions and additions from the preceding month highlighting new hires, resignations, terminations, new unpaid leave of absence of greater than one (1) month and returns from leaves of absence. A copy of this list will be sent concurrently to the local Association. Where the parties agree, the Hospital may also provide the information in an electronic format or on a computer disk. If the central parties are able to agree on a template for dues related information, it will be distributed and jointly recommended to the Hospitals. 5.06 The Hospital agrees that an officer of the Association or Union representative shall be allowed a reasonable period during regular working hours to interview newly hired nurses during their probationary period. During such interview, membership forms may be provided to the nurse. These interviews shall be scheduled in advance as determined by local negotiation and may be arranged collectively or individually by the Hospital. NOTE: The list provided for in Article 5.05 shall include any other information that is currently provided to ONA. Additionally, the Hospital will provide each nurse with a T-4 Supplementary Slip showing the dues deducted in the previous year for income tax purposes where such information is or becomes readily available through the Hospital's payroll system.

  • Asset Management Supplier will: i) maintain an asset inventory of all media and equipment where Accenture Data is stored. Access to such media and equipment will be restricted to authorized Personnel; ii) classify Accenture Data so that it is properly identified and access to it is appropriately restricted; iii) maintain an acceptable use policy with restrictions on printing Accenture Data and procedures for appropriately disposing of printed materials that contain Accenture Data when such data is no longer needed under the Agreement; iv) maintain an appropriate approval process whereby Supplier’s approval is required prior to its Personnel storing Accenture Data on portable devices, remotely accessing Accenture Data, or processing such data outside of Supplier facilities. If remote access is approved, Personnel will use multi-factor authentication, which may include the use of smart cards with certificates, One Time Password (OTP) tokens, and biometrics.

  • Financial Services Article 116

  • Prudential Bache Securities Inc. ("Prudential-Bache"), a registered broker-dealer, (ii) The Prudential Insurance Company of America ("Prudential"), (iii) Pruco Securities Corporation, a registered broker-dealer, (iv) any Prudential-Bache or Prudential subsidiary or affiliate duly registered as a broker-dealer and/or a transfer agent pursuant to the 1934 Act or (vi) any other Prudential-Bache or Prudential affiliate or subsidiary; provided, however, that PMFS shall be as fully responsible to the Fund for the acts and omissions of any agent or subcontractor as it is for its own acts and omissions.