Public Liability In the event of a claim brought against the contractor / consultant for 3rd party property damage the contractor / consultant will be responsible for a deductible (excess) of R525 000 • In the event of a claim brought against the contractor / consultant for removal of lateral support, the contractor / consultant will be responsible for a deductible (excess) of R750 000 • In the event of a claim brought against the contractor / consultant for damage to aircraft, the contractor / consultant will be responsible for a deductible (excess) of R750 000 • Contractors / consultants may re-insure the deductibles
Library Borrowing privileges available without charge. Upon retirement an employee shall be issued a permanent individual library card.
Architecture The Private Improvements shall have architectural features, detailing, and design elements in accordance with the Project Schematic Drawings. All accessory screening walls or fences, if necessary, shall use similar primary material, color, and detailing as on the Private Improvements.
Programming Processor is not responsible for programming or reprogramming of fuel dispensers.
Database The LERG is available through Telcordia. ICONN is available through the Qwest web site.
Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.
Industry Standards Supplier will implement appropriate technical and organizational security measures that comply with Industry Standards in all applicable goods, services, equipment, software systems and platforms that Supplier uses to access, process and/or store Accenture Data. “Industry Standards” means security measures that are commercially reasonable in the information technology industry and that are designed to ensure the security, integrity, and confidentiality of Accenture Data, and to protect against Security Incidents.
Interfaces GTE provides the CLECs with choices for access to OSS pre-ordering, ordering, maintenance and repair systems. Availability of the interfaces is fundamental to the CLEC being able to effectively do business with GTE. Additionally, in many instances, CLEC personnel must work with the service personnel of GTE. Measurements in this category assess the availability to the CLECs of systems and personnel at GTE work centers.
Firmware 7.1 The Supplier must deliver the equipment, Goods or hardware equipped with all the firmware required to use all the Goods or hardware’s functions. Any software embedded in the equipment, Goods or hardware, including the firmware, is provided to the Local Government with a license to use this software, with all license costs and royalties being included in the Fee Schedule (Schedule C). All firmware will be the most recent version available at the time of shipping.
Cryptography Supplier will maintain policies and standards on the use of cryptographic controls that are implemented to protect Accenture Data.