We use cookies on our site to analyze traffic, enhance your experience, and provide you with tailored content.

For more information visit our privacy policy.

PERSONNEL SECURITY REQUIREMENTS Sample Clauses

PERSONNEL SECURITY REQUIREMENTS. Any work to be performed in connection with this Agreement by Contractor, its Affiliates or Subcontractors must be performed in the United States, unless the prior written consent of the CSU is received to perform work outside the United States. Further, CSU Protected Data may not be transmitted or stored outside the United States without the prior written consent of the CSU. Contractor shall require all Representatives, Affiliates and Subcontractors with access to CSU Protected Data, as a condition of their engagement, to participate in annual security awareness training. Contractor shall comply and shall cause its Representatives, Affiliates and Subcontractors to comply with all personnel, facility, safety and security rules and regulations and other instructions of the CSU, when performing work at a CSU facility, and shall conduct its work at the CSU facilities in such a manner as to avoid endangering the safety, or interfering with the convenience of, CSU Representatives or customers. Contractor shall not knowingly permit a Representative, Affiliate, or Subcontractor to have access to the records, data or premises of the CSU when such Representative, Affiliate or Subcontractor: (a) has been convicted of a crime; (b) has engaged in a dishonest act or a breach of trust; or
PERSONNEL SECURITY REQUIREMENTS. Any work to be performed in connection with this Agreement by Contractor, its Affiliates or Subcontractors must be performed in the United States, unless the prior written consent of the CSU is received to perform work outside the United States. Further, CSU Protected Data may not be transmitted or stored outside the United States without the prior written consent of the CSU. Contractor shall require all Representatives, Affiliates and Subcontractors with access to CSU Protected Data, as a condition of their engagement, to participate in annual security awareness training. Contractor shall comply and shall cause its Representatives, Affiliates and Subcontractors to comply with all applicable personnel, facility, safety and security rules and regulations and other instructions of the CSU which are provided to Contractor in writing with reasonable advance notice to come into compliance, if necessary, when performing work at a CSU facility, and shall conduct its work at the CSU facilities in such a manner as to avoid endangering the safety, or interfering with the convenience of, CSU Representatives or customers. Contractor shall not knowingly permit a Representative, Affiliate, or Subcontractor to have access to the records, data or premises of the CSU when such Representative, Affiliate or Subcontractor has not met background check requirements set forth in the Food Services Agreement or any Subcontractor agreement: Contractor agrees that under no circumstances shall any of Contractor’s Representatives, Affiliates or Subcontractors, whether full-time or part-time, connect to any CSU system or access any CSU Protected Data, for purposes of downloading, extracting, storing or transmitting CSU Protected Data through personally owned, rented or borrowed equipment including, but not limited to mobile devices (e.g., laptops, PDAs, cell phones, etc.,) Contractor represents that it maintains comprehensive hiring policies and procedures. Contractor shall conduct or require thorough background checks and obtain references for all its Representatives, Affiliates, and Subcontractors who have access to CSU Protected Data. Any exceptions are at variance with the CSU policy and must be approved in advanced according to CSU policy guidelines.
PERSONNEL SECURITY REQUIREMENTSThe Contractor(s) shall comply with all personnel security requirements included in this contract and any unique organization security requirements described in each Task Order. All Contractor personnel who require access to VA sensitive information/computer systems shall be subject to background investigations and must receive a favorable background investigation from VA. The position sensitivity risk designation [LOW/Tier 1, MODERATE/Tier 2, HIGH/Tier 4] and level of background investigation [National organization Check with Written Inquiries (NACI/Tier 1), Moderate Background Investigation (MBI/Tier 2), and/or Background Investigation (BI/Tier 4)] for each Task Order PWS task shall be designated accordingly, as identified within Section 4.6 of the TO PWS. The level and process of background security investigations for Contractors must be IAW VA Directive and Handbook 0710, “Personnel Suitability and Security Program”. a. The Contractor shall prescreen all personnel requiring access to the computer systems to ensure they maintain the appropriate Background Investigation, and are able to read, write, speak and understand the English language. b. The Contractor shall bear the expense of obtaining background investigations. c. Within 3 business days after award, the Contractor shall provide a roster of Contractor and Subcontractor employees to the COR to begin their background investigations in accordance with the ProPath template. The Contractor Staff Roster shall contain the Contractor’s Full Name, Date of Birth, Place of Birth, individual background investigation level requirement (Refer to Section 4.6 of the Task Order PWS for investigative requirements by task), etc. The Contractor shall submit full Social Security Numbers either within the Contractor Staff Roster or under separate cover to the COR. The Contractor Staff Roster shall be updated and provided to VA within one day of any changes in employee status, training certification completion status, Background Investigation level status, additions/removal of employees, etc. throughout the Period of Performance. The Contractor Staff Roster shall remain a historical document indicating all past information and the Contractor shall indicate in the Comment field, employees no longer supporting this contract. The preferred method to send the Contractor Staff Roster or Social Security Number is by encrypted e-mail. If unable to send encrypted e-mail, other methods which comply with FIPS 140-2 are to encry...
PERSONNEL SECURITY REQUIREMENTS. Role-based security clearance requirements will be defined for Supplier and End User personnel
PERSONNEL SECURITY REQUIREMENTS. All contractor personnel working under this contract require an IT Level II Clearance prior to working in the facility. Contractor will work thru NRC personnel to obtain a security clearance.
PERSONNEL SECURITY REQUIREMENTS. The USDS Servicer shall comply with the Department of Education Acquisition Regulation (EDAR) clause 3452.204-72 Contractor Vetting Security Requirements and the Contractor Vetting Security Requirements document contained in Attachment 3. s. Identity, Credential, and Access Management (ICAM) Requirements: i. General ICAM Requirements: 1. All contractors accessing Department and FSA networks and/or data centers who are classified as Privileged Users (PU) are required to use Government furnished Personal Identity Verification (PIV) cards for authentication and access. Note: FSA prohibits contractors from granting access to FSA systems without approval by the Department.

Related to PERSONNEL SECURITY REQUIREMENTS

  • Security Requirements 7.1 The Authority will review the Contractor’s Security Plan when submitted by the Contractor in accordance with the Schedule (Security Requirements and Plan) and at least annually thereafter.

  • Accessibility Requirements Under Tex. Gov’t Code Chapter 2054, Subchapter M, and implementing rules of the Texas Department of Information Resources, the System Agency must procure Products and services that comply with the Accessibility Standards when those Products are available in the commercial marketplace or when those Products are developed in response to a procurement solicitation. Accordingly, Grantee must provide electronic and information resources and associated Product documentation and technical support that comply with the Accessibility Standards.

  • Data Security Requirements Without limiting Contractor’s obligation of confidentiality as further described in this Contract, Contractor must establish, maintain, and enforce a data privacy program and an information and cyber security program, including safety, physical, and technical security and resiliency policies and procedures, that comply with the requirements set forth in this Contract and, to the extent such programs are consistent with and not less protective than the requirements set forth in this Contract and are at least equal to applicable best industry practices and standards (NIST 800-53).

  • Safety Requirements Prior to setting sail the Operator of the Sector 43 Vessel shall detail and identify any vessel safety operating procedures and 44 other important information to the assigned ASM. The Sector Member 45 acknowledges that an ASM must complete a pre‐trip vessel safety checklist 46 as provided by NMFS prior to leaving port. An ASM cannot be deployed on 1 a vessel that has failed to review the safety issues, and such vessel is 2 prohibited from leaving port without the ASM on board (unless a waiver is 3 granted). For the safety of the vessels captain, crew and the ASM; the ASM 4 will not be allowed on deck any time that gear is being deployed. 5 6 The Sector and its Members note that each ASM must be provided with all 7 the equipment specified by the NEFOP. It is the responsibility of the 8 individual ASM and its employer to ensure that all equipment is in good

  • Facility Requirements 1. Maintain wheelchair accessibility to program activities according to governing law, including the Americans With Disabilities Act (ADA), as applicable. 2. Provide service site(s) that will promote attainment of Contractor’s program objectives. Arrange the physical environment to support those activities. 3. Decrease program costs when possible by procuring items at no cost from County surplus stores and by accepting delivery of such items by County.

  • E-Verify Requirements To the extent applicable under ARIZ. REV. STAT. § 41- 4401, the Contractor and its subcontractors warrant compliance with all federal immigration laws and regulations that relate to their employees and their compliance with the E-verify requirements under ARIZ. REV. STAT. § 23-214(A). Contractor’s or its subcontractor’s failure to comply with such warranty shall be deemed a material breach of this Agreement and may result in the termination of this Agreement by the City.

  • Federal Medicaid System Security Requirements Compliance Party shall provide a security plan, risk assessment, and security controls review document within three months of the start date of this Agreement (and update it annually thereafter) in order to support audit compliance with 45 CFR 95.621 subpart F, ADP System Security Requirements and Review Process.

  • Personnel Requirements a. The CONTRACTOR shall secure, at the CONTRACTOR'S own expense, all personnel required to perform this Contract. b. The CONTRACTOR shall ensure that the CONTRACTOR'S employees or agents are experienced and fully qualified to engage in the activities and perform the services required under this Contract, and that all applicable licensing and operating requirements imposed or required under federal, state, or county law, and all applicable accreditation and other standards of quality generally accepted in the field of the activities of such employees and agents are complied with and satisfied.

  • City Requirements Design, construction, materials, sizing, other specifications, permitting, inspections, testing, documentation and furnishing of as-built drawings, and acceptance of completed infrastructure shall be in accordance with City Requirements. Design and construction shall be by professionals licensed in the state of North Carolina to do the relevant work. City approval of the design of the Improvements shall be required prior to construction, as set forth in City Requirements. If Developer is connecting to the County sewer system, the City may require Developer to furnish the contract providing for such connection.

  • Personnel Requirements and Documentation Grantee will; 1. maintain current personnel documentation on each employee. All documents must be factual and accurate. Health-related information must be stored separately with restricted access as appropriate under Tex. Gov. Code §552.102. Training records may be stored separately from the main personnel file but must be easily accessible upon request. Required documentation includes the following, as applicable: i. A copy of the current job description signed by the employee; ii. Application or resume with documentation of required qualifications and verification of required credentials; iii. Verification of work experience; iv. Annual performance evaluations; v. Personnel data that includes date hired, rate of pay, and documentation of all pay increases and bonuses; vi. Documentation of appropriate screening and/or background checks, to include probation or parole documentation; vii. Signed documentation of initial and other required training; and viii. Records of any disciplinary actions. 2. document authentication must include signature, credentials when applicable, and date. If the document relates to past activity, the date of the activity must also be recorded. Documentation must be permanent and legible. When it is necessary to correct a required document, the error must be marked through with a single line, dated, and initialed by the writer.