PERSONNEL SECURITY REQUIREMENTS Sample Clauses

PERSONNEL SECURITY REQUIREMENTS. Any work to be performed in connection with this Agreement by Contractor, its Affiliates or Subcontractors must be performed in the United States, unless the prior written consent of the CSU is received to perform work outside the United States. Further, CSU Protected Data may not be transmitted or stored outside the United States without the prior written consent of the CSU. Contractor shall require all Representatives, Affiliates and Subcontractors with access to CSU Protected Data, as a condition of their engagement, to participate in annual security awareness training. Contractor shall comply and shall cause its Representatives, Affiliates and Subcontractors to comply with all personnel, facility, safety and security rules and regulations and other instructions of the CSU, when performing work at a CSU facility, and shall conduct its work at the CSU facilities in such a manner as to avoid endangering the safety, or interfering with the convenience of, CSU Representatives or customers. Contractor shall not knowingly permit a Representative, Affiliate, or Subcontractor to have access to the records, data or premises of the CSU when such Representative, Affiliate or Subcontractor:
AutoNDA by SimpleDocs
PERSONNEL SECURITY REQUIREMENTS. The Contractor(s) shall comply with all personnel security requirements included in this contract and any unique organization security requirements described in each Task Order. All Contractor personnel who require access to VA sensitive information/computer systems shall be subject to background investigations and must receive a favorable background investigation from VA. The position sensitivity risk designation [LOW/Tier 1, MODERATE/Tier 2, HIGH/Tier 4] and level of background investigation [National organization Check with Written Inquiries (NACI/Tier 1), Moderate Background Investigation (MBI/Tier 2), and/or Background Investigation (BI/Tier 4)] for each Task Order PWS task shall be designated accordingly, as identified within Section 4.6 of the TO PWS. The level and process of background security investigations for Contractors must be IAW VA Directive and Handbook 0710, “Personnel Suitability and Security Program”.
PERSONNEL SECURITY REQUIREMENTS. Any work to be performed in connection with this Agreement by Contractor, its Affiliates or Subcontractors must be performed in the United States, unless the prior written consent of the CSU is received to perform work outside the United States. Further, CSU Protected Data may not be transmitted or stored outside the United States without the prior written consent of the CSU. Contractor shall require all Representatives, Affiliates and Subcontractors with access to CSU Protected Data, as a condition of their engagement, to participate in annual security awareness training. Contractor shall comply and shall cause its Representatives, Affiliates and Subcontractors to comply with all applicable personnel, facility, safety and security rules and regulations and other instructions of the CSU which are provided to Contractor in writing with reasonable advance notice to come into compliance, if necessary, when performing work at a CSU facility, and shall conduct its work at the CSU facilities in such a manner as to avoid endangering the safety, or interfering with the convenience of, CSU Representatives or customers. Contractor shall not knowingly permit a Representative, Affiliate, or Subcontractor to have access to the records, data or premises of the CSU when such Representative, Affiliate or Subcontractor has not met background check requirements set forth in the Food Services Agreement or any Subcontractor agreement: Contractor agrees that under no circumstances shall any of Contractor’s Representatives, Affiliates or Subcontractors, whether full-time or part-time, connect to any CSU system or access any CSU Protected Data, for purposes of downloading, extracting, storing or transmitting CSU Protected Data through personally owned, rented or borrowed equipment including, but not limited to mobile devices (e.g., laptops, PDAs, cell phones, etc.,) Contractor represents that it maintains comprehensive hiring policies and procedures. Contractor shall conduct or require thorough background checks and obtain references for all its Representatives, Affiliates, and Subcontractors who have access to CSU Protected Data. Any exceptions are at variance with the CSU policy and must be approved in advanced according to CSU policy guidelines.
PERSONNEL SECURITY REQUIREMENTS. The USDS Servicer shall comply with the Department of Education Acquisition Regulation (EDAR) clause 3452.204-72 Contractor Vetting Security Requirements and the Contractor Vetting Security Requirements document contained in Attachment 3. s. Identity, Credential, and Access Management (ICAM) Requirements: i. General ICAM Requirements: 1. All contractors accessing Department and FSA networks and/or data centers who are classified as Privileged Users (PU) are required to use Government furnished Personal Identity Verification (PIV) cards for authentication and access. Note: FSA prohibits contractors from granting access to FSA systems without approval by the Department. 2. The USDS Servicer shall not issue the PIV-I card to the PUs of the FSA system until FSA has approved access for these PUs. 3. The USDS Servicer shall ensure that both PUs and non-Privileged Users, who work on IT resources and applications (for example, the USDS Servicer systems) containing or accessing FSA’s data, utilize PIV/PIV-I cards. The USDS Servicer shall provide card readers and require PUs and non-Privileged Users to use the PIV/PIV-I card for authentication and access to IT resources and applications containing or accessing FSA’s data satisfying an Identity Assurance Level (IAL3) and Authentication Assurance Level 3 (AAL3) as defined in NIST SP 800-63-3. 4. The USDS Servicer shall ensure that a Privileged Access Management (XXX) system is utilized for all PU access to information systems. The XXX solution will manage access and log user activity. USDS Servicer must provide monthly access logs to FSA. 5. The USDS Servicer shall ensure that websites require multi-factor authentication when providing access to PII and other sensitive information. 6. The USDS Servicer shall request xx.xxx accounts, and ensure PIV cards are issued, for all individuals that require access to Department and/or FSA business information systems, networks, or email accounts. 7. For a USDS Servicer(s) using a Government furnished equipment (GFE) Laptop, the user shall use the Department provided Virtual Private Network (VPN) solution(s).
PERSONNEL SECURITY REQUIREMENTS. This section is required to ensure that contractor personnel, affiliates and subcontractors are required to maintain security and privacy of the CSUF ASC information assets. Any work to be performed in connection with this Agreement by Contractor, its Affiliates or Subcontractors must be performed in the United States, unless the prior written consent of the CSUF ASC is received. Further, CSUF ASC Protected Data may not be transmitted or stored outside the United States without the prior written consent of the CSUF ASC. Contractor shall require all Representatives, Affiliates and Subcontractors with access to CSUF ASC Protected Data, as a condition of their engagement, to participate in annual security awareness training. Contractor shall comply, and shall cause its Representatives, Affiliates and Subcontractors to comply, with all personnel, facility, safety and security rules and regulations and other instructions of the CSUF ASC when performing work at a CSU facility, and shall conduct its work at the CSUF ASC facilities in such a manner as to avoid endangering the safety, or interfering with the convenience of, CSUF ASC representatives or customers. Contractor shall not knowingly permit a Representative, Affiliate, or Subcontractor to have access to the records, data or premises of the CSUF ASC when such Representative, Affiliate or Subcontractor:
PERSONNEL SECURITY REQUIREMENTS. Role-based security clearance requirements will be defined for Supplier and End User personnel

Related to PERSONNEL SECURITY REQUIREMENTS

  • Security Requirements 11.1 The Supplier shall comply, and shall procure the compliance of the Suppliers Personnel, with the Security Policy and the Security Plan and the Supplier shall ensure that the Security Plan produced by the Supplier fully complies with the Security Policy.

  • Policy Requirements All of the policies of insurance referred to in this Article XIII shall be written in form reasonably satisfactory to Landlord and any Facility Mortgagee and issued by insurance companies with a minimum policyholder rating of “A-” and a financial rating of “VII” in the most recent version of Best’s Key Rating Guide, or a minimum rating of “BBB” from Standard & Poor’s or equivalent. If Tenant obtains and maintains the general liability insurance described in Section 13.1(e) above on a “claims made” basis, Tenant shall provide continuous liability coverage for claims arising during the Term. In the event such “claims made” basis policy is canceled or not renewed for any reason whatsoever (or converted to an “occurrence” basis policy), Tenant shall either obtain (a) “tail” insurance coverage converting the policies to “occurrence” basis policies providing coverage for a period of at least three (3) years beyond the expiration of the Term, or (b) an extended reporting period of at least three (3) years beyond the expiration of the Term. Tenant shall pay all of the premiums therefor, and deliver certificates thereof to Landlord prior to their effective date (and with respect to any renewal policy, prior to the expiration of the existing policy), and in the event of the failure of Tenant either to effect such insurance in the names herein called for or to pay the premiums therefor, or to deliver such certificates thereof to Landlord, at the times required, Landlord shall be entitled, but shall have no obligation, to effect such insurance and pay the premiums therefor, in which event the cost thereof, together with interest thereon at the Overdue Rate, shall be repayable to Landlord upon demand therefor. Tenant shall obtain, to the extent available on commercially reasonable terms, the agreement of each insurer, by endorsement on the policy or policies issued by it, or by independent instrument furnished to Landlord, that it will give to Landlord thirty (30) days’ (or ten (10) days’ in the case of non-payment of premium) written notice before the policy or policies in question shall be altered, allowed to expire or cancelled. Notwithstanding any provision of this Article XIII to the contrary, Landlord acknowledges and agrees that the coverage required to be maintained by Tenant may be provided under one or more policies with various deductibles or self-insurance retentions by Tenant or its Affiliates, subject to Landlord’s approval not to be unreasonably withheld. Upon written request by Xxxxxxxx, Tenant shall provide Landlord copies of the property insurance policies when issued by the insurers providing such coverage.

  • Authority Requirements During the Compliance Period, the following provisions shall apply.

  • Quality Requirements Performance Indicator Heading Indicator (specific) Threshold Method of Measurement Frequency of monitoring Consequence of Breach QUALITY Patient Safety - Incidents I1 Number of incidents Adverse incidents include the following: clinical or non clinical adverse events that have potential to cause avoidable harm to a patient, including medical errors or adverse events related to medical devices or other equipment. Clinical or non- clinical accidents, accidental injuries to staff and members of the public, verbal, physical or psychological abuse or harassment, unusual or dangerous occurrences, damage to trust property, plant or equipment, fire or flood, security, theft or loss, near misses are identified as any event where under different circumstances significant injury or loss may have occurred Number of recorded incidents in the contract month Monthly Remedial Action Plan brought to Performance Meeting following breach; action under Module C Clause 32 if needed I2 Number of Sis Definition of SUI according to trust policy and national guidance Number of Serious Untoward Incidents reported in contract month Monthly Remedial Action Plan brought to Performance Meeting following breach; action under Module C Clause 32 if needed S1 Percentage of eligible staff received child safeguarding training at level 2 (as identified in LSCB training strategy) 95% Number received training/ Number of identified staff requiring training Monthly S2 Percentage of eligible staff received adult safeguarding awareness training at level 2 ( as identified in K&M Safeguarding Vulnerable Adults training strategy) 95% Number of staff trained/ Number of identified staff requiring training Monthly

  • Personal Property Requirements The Collateral Agent shall have received:

  • Business Day Requirements In the event that any notice or other action or omission is required to be taken by a Party under this Agreement on a day that is not a Business Day then such notice or other action or omission shall be deemed to be required to be taken on the next occurring Business Day.

  • Environmental Compliance and Conditions Except as set forth on Schedule 3.16:

  • Eligibility Requirements The Trustee hereunder shall at all times (i) be a corporation or association having its principal office in a state and city acceptable to the Seller, organized and doing business under the laws of such state or the United States of America, authorized under such laws to exercise corporate trust powers, having a combined capital and surplus of at least $50,000,000, or shall be a member of a bank holding system, the aggregate combined capital and surplus of which is at least $50,000,000, provided that its separate capital and surplus shall at all times be at least the amount specified in Section 310(a)(2) of the Trust Indenture Act of 1939, (ii) be subject to supervision or examination by federal or state authority and (iii) have a credit rating or be otherwise acceptable to the Rating Agencies such that neither of the Rating Agencies would reduce their respective then current ratings of the Certificates (or have provided such security from time to time as is sufficient to avoid such reduction) as evidenced in writing by each Rating Agency. If such corporation or association publishes reports of condition at least annually, pursuant to law or to the requirements of the aforesaid supervising or examining authority, then for the purposes of this Section the combined capital and surplus of such corporation or association shall be deemed to be its combined capital and surplus as set forth in its most recent report of condition so published. In case at any time the Trustee shall cease to be eligible in accordance with the provisions of this Section, the Trustee shall resign immediately in the manner and with the effect specified in Section 8.08.

  • Compliance Policies and Procedures To assist the Fund in complying with Rule 38a-1 of the 1940 Act, BBH&Co. represents that it has adopted written policies and procedures reasonably designed to prevent violation of the federal securities laws in fulfilling its obligations under the Agreement and that it has in place a compliance program to monitor its compliance with those policies and procedures. BBH&Co will upon request provide the Fund with information about our compliance program as mutually agreed.

Time is Money Join Law Insider Premium to draft better contracts faster.