Organizational Security and Risk Management Sample Clauses

Organizational Security and Risk Management. I. NCC will document and at least annually update its policies and procedures, as well as security and compliance controls, in the following major categories to ensure the security of the Credit Bureau Data:
AutoNDA by SimpleDocs

Related to Organizational Security and Risk Management

  • Organizational Security 2.1.1 It is the mutual intention of the parties that the provisions of this Article protect the rights of individual workers without restricting CSEA’s rights.

  • Financial Security Arrangements At least 20 Business Days prior to the commencement of the design, procurement, installation, or construction of a discrete portion of the Connecting Transmission Owner’s Interconnection Facilities and Upgrades, the Interconnection Customer shall provide the Connecting Transmission Owner, at the Interconnection Customer’s option, a guarantee, a surety bond, letter of credit or other form of security that is reasonably acceptable to the Connecting Transmission Owner and is consistent with the Uniform Commercial Code of the jurisdiction where the Point of Interconnection is located. Such security for payment shall be in an amount sufficient to cover the costs for constructing, designing, procuring, and installing the applicable portion of the Connecting Transmission Owner’s Interconnection Facilities and Upgrades and shall be reduced on a dollar-for-dollar basis for payments made to the Connecting Transmission Owner under this Agreement during its term. The Connecting Transmission Owner may draw on any such security to the extent that the Interconnection Customer fails to make any payments due under this Agreement. In addition:

  • Monitoring Arrangements 8.1 We will formally monitor the progress of the access agreement at least once a year through the SCITT Policy Committee who will report annually to the Board of Governors of the Lead School (Dorcan Technology College, Swindon). Initial monitoring will be concerned with participation rates and the development of data on lower income and other under-represented groups, against which to monitor. When specific baselines, targets, and milestones are determined we will look to monitor against these.

  • Electronic and Information Resources Accessibility and Security Standards a. Applicability: The following Electronic and Information Resources (“EIR”) requirements apply to the Contract because the Grantee performs services that include EIR that the System Agency's employees are required or permitted to access or members of the public are required or permitted to access. This Section does not apply to incidental uses of EIR in the performance of the Agreement, unless the Parties agree that the EIR will become property of the State of Texas or will be used by HHSC’s clients or recipients after completion of the Agreement. Nothing in this section is intended to prescribe the use of particular designs or technologies or to prevent the use of alternative technologies, provided they result in substantially equivalent or greater access to and use of a Product.

  • Technical Security Controls 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.

  • Financial Management System Subrecipient shall establish and maintain a sound financial management system, based upon generally accepted accounting principles. Contractor’s system shall provide fiscal control and accounting procedures that will include the following:

  • Export Law Assurances You are responsible for complying with all trade regulations and laws both foreign and domestic. You acknowledge that this Software may only be exported or re-exported in accordance with U.S. Government Export Administration Regulations. Without authorization from the U.S. Government, You may not export or re-export the Software (i) to any prohibited country, person, entity, or end-user as specified by U.S. export controls or (ii) for use in the design, development or production of nuclear, chemical, or biological weapons, or missile technology, or any other prohibited use. You warrant and represent that neither the Bureau of Export Administration of the U.S. Commerce Department not any other U.S. Government entity or agency has suspended, revoked or denied, in whole or in part, Your export privileges. For current information on U.S. export requirements and restrictions visit xxx.xxx.xxx.xxx/.

Time is Money Join Law Insider Premium to draft better contracts faster.