Fingerprinting Requirements Contractor hereby acknowledges that, if applicable, it is required to comply with the requirements of Education Code Section 45125.1 with respect to fingerprinting of employees who may have contact with the District's students. The Contractor shall also ensure that its Contractors on the Project also comply with the requirements of Section 45125.1. If required by Education Code Section 45125.1, the Contractor must provide for the completion of a Fingerprint Certification form, in the District’s required format, prior to any of the Contractor's employees, or those of any other Contractors, coming into contact with the District's students. Contractor further acknowledges that other fingerprinting requirements may apply, as set forth in Education Code Section 45125 et seq., and will comply with any such requirements.
Computer Tape The computer tape regarding the Receivables made available by the Seller to the Depositor is complete and accurate in all respects as of the Transfer Date.
Printing If this Agreement involves the duplication of more than 5,000 copies of a single page or more than 25,000 copies of multiple pages, this Agreement incorporates by reference DEAR 970.5208-1 Printing (Dec 2000).
Fingerprinting For purposes of this Agreement and because the District will provide a qualified employee for the supervision of District's students at all times that Consultant is present and performing services at an active school site, Consultant shall be relieved of the requirements to provide a criminal background check pursuant to California Education Code 45125.1.
Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.
Firmware 7.1 The Supplier must deliver the equipment, Goods or hardware equipped with all the firmware required to use all the Goods or hardware’s functions. Any software embedded in the equipment, Goods or hardware, including the firmware, is provided to the Local Government with a license to use this software, with all license costs and royalties being included in the Fee Schedule (Schedule C). All firmware will be the most recent version available at the time of shipping.
Workstation Encryption Supplier will require hard disk encryption of at least 256-bit Advanced Encryption Standard (AES) on all workstations and/or laptops used by Personnel where such Personnel are accessing or processing Accenture Data.
Computers All computers, hardware, software, computer upgrades and maintenance in connection therewith shall be at Owner's expense.
Telephone Monitoring/Recording From time to time we may monitor and/or record telephone calls between you and us to assure the quality of our customer service or as required by applicable law.
Passwords Passwords are an important aspect of computer security. A poorly chosen password may result in unauthorized access and/or exploitation of Placer County’s resources. All users, including contractors and vendors with access to the County’s systems, are responsible for the creation and protection of passwords and additionally any updates to County Password policies must be followed. Users must not use the same password for Placer County accounts and personal accounts. The reliability of passwords for maintaining confidentiality cannot be guaranteed. Always assume that someone, in addition to the intended or designated recipient, may read any and all messages and files. Any user suspecting that his/her password may have been compromised must, without delay, report the incident to Placer County IT. 10.2.4.1 Passwords must never be shared or disclosed. If a password is accidentally exposed or suspected of exposure, the password should be changed immediately. 10.2.4.2 All passwords must be changed on a specified, periodic basis. 10.2.4.3 Default passwords provided by the vendor for access to applications/systems on the network must be changed to unique and secret passwords. 10.2.4.4 Immediately inform the Information Technology Service Desk when user accounts are no longer required or will not be used for a period of 30 days or more. 10.2.4.5 All accounts not used for 90 days will be automatically disabled.