Operation Security (OPSEC Sample Clauses

Operation Security (OPSEC. Training: All Contractor employees, including subcontractors, assigned to this contract shall complete Level I OPSEC training within 30 days of reporting for duty and then annually thereafter. Initial Level 1 OPSEC training will be conducted monthly by the Xxxxxxxx OPSEC Officer or a Level II certified OPSEC Officer. (AR 530-1, Operations Security). Annual refresher training shall be completed on-line: Go to Internet Explorer, Fort Xxxxxx website, select Fort Xxxxxx and click on Dir, Plans Training & Mobilization, select Security/Intelligence, and click on Contractor OPSEC Awareness Training. A record of completion will be provided to the COR and unit/activity security manager within X days (specified in task order) of completion. (Ref AR 530-1)
AutoNDA by SimpleDocs
Operation Security (OPSEC training: In accordance with AR 530-1 all personnel, to include contractor employees and associated sub-contractor employees must complete Level I Operations Security (OPSEC) training which is comprised of both initial and continual awareness training (annually). All personnel within the first 30 days of arrival in the organization must receive initial training to include a briefing on the organizations critical information read/sign the OPSEC Individual User Compliance Agreement form. The end state of initial and continual awareness training is that each individual should have the requisite knowledge to safeguard critical information.

Related to Operation Security (OPSEC

  • Aviation Security (1) Each Contracting Party reaffirms that its obligation to the other Contracting Party to protect the security of civil aviation against unlawful interference forms an integral part of this Agreement. Each Contracting Party shall in particular act in conformity with the aviation security provisions of the Convention on Offences and Certain Other Acts Committed on Board Aircraft, signed at Tokyo on 14 September 1963, the Convention for the Suppression of Unlawful Seizure of Aircraft, signed at The Hague on 16 December 1970 and the Convention for the Suppression of Unlawful Acts against the Safety of Civil Aviation, signed at Montreal on 23 September 1971.

  • Information Security IET information security management practices, policies and regulatory compliance requirements are aimed at assuring the confidentiality, integrity and availability of Customer information. The UC Xxxxx Cyber-safety Policy, UC Xxxxx Security Standards Policy (PPM Section 310-22), is adopted by the campus and IET to define the responsibilities and key practices for assuring the security of UC Xxxxx computing systems and electronic data.

  • Information Security Program (1) DTI shall implement and maintain a comprehensive written information security program applicable to the Personal Information ("Information Security Program") which shall include commercially reasonable measures, including, as appropriate, policies and procedures and technical, physical, and administrative safeguards that are consistent with industry standards, providing for (i) the security and confidentiality of the Personal Information, (ii) protection of the Personal Information against reasonably foreseeable threats or hazards to the security or integrity of the Personal Information, (iii) protection against unauthorized access to or use of or loss or theft of the Personal Information, and (iv) appropriate disposal of the Personal Information. Without limiting the generality of the foregoing, the Information Security Program shall provide for (i) continual assessment and re-assessment of the risks to the security of Personal Information acquired or maintained by DTI and its agents, contractors and subcontractors in connection with the Services, including but not limited to (A) identification of internal and external threats that could result in unauthorized disclosure, alteration or destruction of Personal Information and systems used by DTI and its agents, contractors and subcontractors, (B) assessment of the likelihood and potential damage of such threats, taking into account the sensitivity of such Personal Information, and (C) assessment of the sufficiency of policies, procedures, information systems of DTI and its agents, contractors and subcontractors, and other arrangements in place, to control risks; and (ii) appropriate protection against such risks.

  • Application Security The ISP will require that in-house application development be governed by a documented secure software development life cycle methodology, which will include deployment rules for new applications and changes to existing applications in live production environments.

  • Information Security Requirements In cases where the State is not permitted to manage/modify the automation equipment (server/computer/other) that controls testing or monitoring devices, the Contractor agrees to update and provide patches for the automation equipment and any installed operating systems or applications on a quarterly basis (at minimum). The Contractor will submit a report to the State of updates installed within 30 days of the installation as well as a Plan of Actions and Milestones (POA&M) to remediate any vulnerabilities ranging from Critical to Low. The contractor will provide an upgrade path or compensatory security controls for any operating systems and applications listed as beyond “end-of-life” or EOL, within 90 days of the EOL and complete the EOL system’s upgrade within 90 days of the approved plan.

  • UNION SECURITY AND CHECKOFF 5:01 It shall be a condition of continued employment for all employees including probationary employees, as defined in Article 2, to become members and maintain membership in good standing in the Union.

  • UNION SECURITY 7.01 The Employer shall deduct monthly from the pay due to each employee who is covered by this Agreement a sum equal to the monthly Union dues of each such employee. Where an employee has no earnings during the first payroll period, the deduction shall be made in the next payroll period where the employee has earnings, within that month. The Union shall notify the employer in writing of the amount of such dues from time to time. The Employer will send to the Union its cheque for the dues so deducted in the month following the month in which the dues are deducted. When arrears or adjustments are submitted retroactively, the dues month and an explanation will accompany any such dues.

  • ASSOCIATION SECURITY 5.01 The Hospital will deduct from each nurse covered by this Agreement an amount equal to the regular monthly Association dues designated by the Association. The deduction period for a part-time nurse may be extended where the nurse does not receive any pay in a particular month. Where a nurse has no dues deducted during the payroll period from which dues are normally deducted, that deduction shall be made in the next payroll period provided the nurse has earnings in the next payroll period. If the failure to deduct dues results from an error by the Hospital, then, as soon as the error is called to its attention by the union, the Hospital shall make the deduction in the manner agreed to by the parties. If there is no agreement, the Hospital shall make the deduction in the manner prescribed by the union.

  • ARTICLE UNION SECURITY (a) It is agreed that all employees covered by this Agree- ment shall become and remain members of the Union in good standing as a condition of employment. New employees shall make application for membership in the Union at the time of their hiring and shall become and remain members of the Union in good standing, as a condition of employment. The Employer agrees that it will inform all new employees prior to or at the time of hiring of the Union security provisions of the Agree- ment. The Employer or designate will during the first three (3) weeks of each individual’s employment make known to the new employee the names and work locations of union stewards in the store. The Employer shall, during the term of this Agreement, as a condition of employment, deduct from members of the bargaining unit the regular weekly Union Dues and such Dues shall be remitted to the Union prior to the 15th day of the month following the month in which such deduction is made. The Employer shall notify the Union of new full-time employees’ classifications and rates of pay in addition to ter- minations, on a monthly basis. Deduction statements shall be documented by location, containing the full name of the employee and his starting date and social insurance number subject to the employee consenting to the use of his or her social insurance number. The Employer agrees to record the annual Union Dues deductions for each employee on his Form. Employers shall provide dues information to the Union in an electronic format acceptable to both parties. In the event that such weekly Dues are changed during the term of the Agreement, such change must be given to the Employer by notice properly authorized by Union Officials and shall become effective within one month following the date the notice is received. New employees shall be documented and documents for- warded to the Union Office within two (2) weeks of hiring. The first sixty (60) days worked at each store shall be con- sidered a probationary period. It is understood between the Employer and the Union that a probationary employee shall be considered an employee for all purposes of the Agree- ment save that a probationary employee may be dismissed at any time during the probationary period.

  • Security Assessment If Accenture reasonably determines, or in good faith believes, that Supplier’s security practices or procedures do not meet Supplier’s obligations under the Agreement, then Accenture will notify Supplier of the deficiencies. Supplier will without unreasonable delay: (i) correct such deficiencies at its own expense; (ii) permit Accenture, or its duly authorized representatives, to assess Supplier’s security-related activities that are relevant to the Agreement; and (iii) timely complete a security questionnaire from Accenture on a periodic basis upon Accenture’s request. Security issues identified by Accenture will be assigned risk ratings and an agreed-to timeframe to remediate. Supplier will remediate all the security issues identified within the agreed to timeframes. Upon Supplier’s failure to remediate any high or medium rated security issues within the stated timeframes, Accenture may terminate the Agreement in accordance with Section 8 above.

Time is Money Join Law Insider Premium to draft better contracts faster.