Information Technology Accessibility Standards Any information technology related products or services purchased, used or maintained through this Grant must be compatible with the principles and goals contained in the Electronic and Information Technology Accessibility Standards adopted by the Architectural and Transportation Barriers Compliance Board under Section 508 of the federal Rehabilitation Act of 1973 (29 U.S.C. §794d), as amended. The federal Electronic and Information Technology Accessibility Standards can be found at: xxxx://xxx.xxxxxx-xxxxx.xxx/508.htm.
Enterprise Information Management Standards Performing Agency shall conform to HHS standards for data management as described by the policies of the HHS Chief Data and Analytics Officer. These include, but are not limited to, standards for documentation and communication of data models, metadata, and other data definition methods that are required by HHS for ongoing data governance, strategic portfolio analysis, interoperability planning, and valuation of HHS System data assets.
New Hampshire Specific Data Security Requirements The Provider agrees to the following privacy and security standards from “the Minimum Standards for Privacy and Security of Student and Employee Data” from the New Hampshire Department of Education. Specifically, the Provider agrees to: (1) Limit system access to the types of transactions and functions that authorized users, such as students, parents, and LEA are permitted to execute; (2) Limit unsuccessful logon attempts; (3) Employ cryptographic mechanisms to protect the confidentiality of remote access sessions; (4) Authorize wireless access prior to allowing such connections; (5) Create and retain system audit logs and records to the extent needed to enable the monitoring, analysis, investigation, and reporting of unlawful or unauthorized system activity; (6) Ensure that the actions of individual system users can be uniquely traced to those users so they can be held accountable for their actions; (7) Establish and maintain baseline configurations and inventories of organizational systems (including hardware, software, firmware, and documentation) throughout the respective system development life cycles; (8) Restrict, disable, or prevent the use of nonessential programs, functions, ports, protocols, and services; (9) Enforce a minimum password complexity and change of characters when new passwords are created; (10) Perform maintenance on organizational systems; (11) Provide controls on the tools, techniques, mechanisms, and personnel used to conduct system maintenance; (12) Ensure equipment removed for off-site maintenance is sanitized of any Student Data in accordance with NIST SP 800-88 Revision 1; (13) Protect (i.e., physically control and securely store) system media containing Student Data, both paper and digital; (14) Sanitize or destroy system media containing Student Data in accordance with NIST SP 800-88 Revision 1 before disposal or release for reuse; (15) Control access to media containing Student Data and maintain accountability for media during transport outside of controlled areas; (16) Periodically assess the security controls in organizational systems to determine if the controls are effective in their application and develop and implement plans of action designed to correct deficiencies and reduce or eliminate vulnerabilities in organizational systems; (17) Monitor, control, and protect communications (i.e., information transmitted or received by organizational systems) at the external boundaries and key internal boundaries of organizational systems; (18) Deny network communications traffic by default and allow network communications traffic by exception (i.e., deny all, permit by exception); (19) Protect the confidentiality of Student Data at rest; (20) Identify, report, and correct system flaws in a timely manner; (21) Provide protection from malicious code (i.e. Antivirus and Antimalware) at designated locations within organizational systems; (22) Monitor system security alerts and advisories and take action in response; and (23) Update malicious code protection mechanisms when new releases are available.
Statistical, Demographic or Market-Related Data All statistical, demographic or market-related data included in the Registration Statement, the Disclosure Package or the Prospectus are based on or derived from sources that the Company believes to be reliable and accurate and all such data included in the Registration Statement, the Disclosure Package or the Prospectus accurately reflects the materials upon which it is based or from which it was derived.
Utilities and Public Access Each Individual Property has rights of access to public ways and is served by water, sewer, sanitary sewer and storm drain facilities adequate to service such Individual Property for its respective intended uses. All public utilities necessary or convenient to the full use and enjoyment of each Individual Property are located either in the public right-of-way abutting such Individual Property (which are connected so as to serve such Individual Property without passing over other property) or in recorded easements serving such Individual Property and such easements are set forth in and insured by the Title Insurance Policies. All roads necessary for the use of each Individual Property for their current respective purposes have been completed and dedicated to public use and accepted by all Governmental Authorities.
Electronic and Information Resources Accessibility and Security Standards a. Applicability: The following Electronic and Information Resources (“EIR”) requirements apply to the Contract because the Grantee performs services that include EIR that the System Agency's employees are required or permitted to access or members of the public are required or permitted to access. This Section does not apply to incidental uses of EIR in the performance of the Agreement, unless the Parties agree that the EIR will become property of the State of Texas or will be used by HHSC’s clients or recipients after completion of the Agreement. Nothing in this section is intended to prescribe the use of particular designs or technologies or to prevent the use of alternative technologies, provided they result in substantially equivalent or greater access to and use of a Product.
Service Level Standards In addition to all other requirements in this Agreement, and in accordance with the Best Claims Practices & Estimating Guidelines, Vendor shall use reasonable and good faith efforts to meet the Service Level Standards set forth below.
Root-‐zone Information Publication ICANN’s publication of root-‐zone contact information for the TLD will include Registry Operator and its administrative and technical contacts. Any request to modify the contact information for the Registry Operator must be made in the format specified from time to time by ICANN at xxxx://xxx.xxxx.xxx/domains/root/.
Ethical Standards 7.8.1 Within ninety (90) days after the Effective Date, Developer shall adopt written policies establishing ethical standards of conduct for all Developer-Related Entities, including Developer’s supervisory and management personnel, in dealing with (a) IFA and the Department and (b) employment relations. Such policy shall be subject to review and comment by IFA prior to adoption. Such policy shall include standards of ethical conduct concerning the following: 7.8.1.1 Restrictions on gifts and contributions to, and lobbying of, IFA, the Department and any of their respective members, commissioners, directors, officers and employees, and elected State officials; 7.8.1.2 Protection of employees from unethical practices in selection, use, hiring, compensation or other terms and conditions of employment, or in firing, promotion and termination of employees; 7.8.1.3 Protection of employees from retaliatory actions (including discharge, demotion, suspension, threat, harassment, pay reduction or other discrimination in the terms and conditions of employment) in response to reporting of illegal (including the making of a false claim), unethical or unsafe actions or failures to act by any Developer-Related Entity; 7.8.1.4 Restrictions on directors, members, officers or supervisory or management personnel of any Developer-Related Entity engaging in any transaction or activity, including receiving or offering a financial incentive, benefit, loan or other financial interest, that is, or to a reasonable person appears to be, in conflict with or incompatible with the proper discharge of duties or independence of judgment or action in the performance of duties, or adverse to the interests of the Project or employees; 7.8.1.5 Restrictions on use of office or job position for a purpose that is, or would to a reasonable person appear to be, primarily for the private benefit of a director, member, officer or supervisory or management person, rather than primarily for the benefit of Developer or the Project, or primarily to achieve a private gain or an exemption from duty or responsibility for a director, member, officer or supervisory or management person; and 7.8.1.6 Restrictions on directors, members, officers or employees of any Developer-Related Entity performing any of the Work if the performance of such services would be prohibited under IFA’s conflict of interest rules and policies. 7.8.2 Developer shall cause its directors, members, officers and supervisory and management personnel, and require those of all other Developer-Related Entities, to adhere to and enforce the adopted policy on ethical standards of conduct. Developer shall establish reasonable systems and procedures to promote and monitor compliance with the policy. 7.8.3 Notwithstanding the foregoing in this Section 7.8, Developer has an affirmative obligation under this Agreement to disclose to IFA and to the Indiana State Ethics Commission when an interested party is or becomes an employee of IFA or the State. This obligation extends only to those facts that Developer knows or reasonably could know. For purposes of this Section 7.8.3, “interested party” means (a) the individual executing this Agreement, (b) an individual who has an interest of three percent (3%) or more of Developer, (c) any member of the immediate family of an individual specified in clause (a) or (b). For purposes of the preceding sentence, “immediate family” means the spouse and the unemancipated children of an individual.
OMB Standards Unless specified otherwise within this agreement, the Subrecipient shall procure all materials, property, or services in accordance with the requirements of 24 CFR 84.40−48.