Video Surveillance All video surveillance will be directed by the YSU police department.
Electronic Surveillance The primary purpose of electronic surveillance is to ensure the health, welfare and safety of all educators, students and visitors to District property and to safeguard District facilities and equipment. As such, the District and the Association agree:
Surveillance The COR will receive and document all complaints from Government personnel regarding the services provided. If appropriate, the COR will send the complaints to the Contractor for corrective action.
Configuration Management The Contractor shall maintain a configuration management program, which shall provide for the administrative and functional systems necessary for configuration identification, control, status accounting and reporting, to ensure configuration identity with the UCEU and associated cables produced by the Contractor. The Contractor shall maintain a Contractor approved Configuration Management Plan that complies with ANSI/EIA-649 2011. Notwithstanding ANSI/EIA-649 2011, the Contractor’s configuration management program shall comply with the VLS Configuration Management Plans, TL130-AD-PLN-010-VLS, and shall comply with the following:
Review of Submittals A/E and ODR review is only for conformance with the design concept and the information provided in the Contract Documents. Responses to submittals will be in writing. The approval of a separate item does not indicate approval of an assembly in which the item functions. The approval of a submittal does not relieve the Contractor of responsibility for any deviation from the requirements of the Contract unless the Contractor informs the A/E and ODR of such deviation in a clear, conspicuous, and written manner on the submittal transmittal and at the time of submission, and obtains the A/E’s and Owner’s written specific approval of the particular deviation.
Help Desk A help desk for Product support issues (the “Help Desk”) will be available to Customer. Unless specified in an Order, Customer should contact 000.000.0000 to receive a telephone number for the applicable supporting Solutions & Support Center. Customer will appoint one Product administrator and one backup administrator to serve as the primary point of contact regarding maintenance services.
Vulnerability Management BNY Mellon will maintain a documented process to identify and remediate security vulnerabilities affecting its systems used to provide the services. BNY Mellon will classify security vulnerabilities using industry recognized standards and conduct continuous monitoring and testing of its networks, hardware and software including regular penetration testing and ethical hack assessments. BNY Mellon will remediate identified security vulnerabilities in accordance with its process.
Contact Tracing While the employees are on the job site, Producers may require that employees participate in systems that enable contact tracing, such as use of a “punch card” system to record the employee’s location throughout the day or by means of electronic devices (e.g., phone “apps” or wearable electronic devices that track the movement or location of a person or which detect when a person wearing the device comes into close contact with another person wearing the device). Producers may require employees to sign documentation consenting to the use of such electronic devices in contact tracing. In the event that a Producer uses electronic devices for contact tracing, it may access information collected from those devices only for purposes of tracing individuals that the employee has been in contact with during working hours when there has been a COVID- 19-related event, or for purposes of managing and enforcing social distancing protocols.
Infrastructure Vulnerability Scanning Supplier will scan its internal environments (e.g., servers, network devices, etc.) related to Deliverables monthly and external environments related to Deliverables weekly. Supplier will have a defined process to address any findings but will ensure that any high-risk vulnerabilities are addressed within 30 days.
Monitoring In each case in which the Foreign Custody Manager maintains Foreign Assets with an Eligible Foreign Custodian selected by the Foreign Custody Manager, the Foreign Custody Manager shall establish a system to monitor (i) the appropriateness of maintaining the Foreign Assets with such Eligible Foreign Custodian and (ii) the contract governing the custody arrangements established by the Foreign Custody Manager with the Eligible Foreign Custodian. In the event the Foreign Custody Manager determines that the custody arrangements with an Eligible Foreign Custodian it has selected are no longer appropriate, the Foreign Custody Manager shall notify the Board in accordance with Section 3.2.5 hereunder.