Regional Security Team Sample Clauses

Regional Security Team. ‌ The Regional Security Team consists of representatives of VMR, Member Cities, the State of Arizona, and the United States Department of Homeland Security. These representatives shall have the authority to make recommendations in the areas of emergency response, fire/life safety, and security. The Regional Security Team meets on a bi-monthly basis to discuss and plan activities requiring interface between state and local emergency response departments. VMR shall chair the Regional Security Team. Final decisions regarding emergency response, fire/safety and security will be the responsibility of VMR’s CEO, the Board of Directors, and the designated public safety representatives from the Member Cities. Emergency ProceduresAn emergency procedure will be developed by VMR consistent with the requirements defined in National Fire Protection Association 130 (NFPA 130) – Fixed Guideway Transit Systems, Chapter 6 as it currently exists or is hereafter amended or updated to the newest addition. Other applicable guidelines and regulations may also apply or be considered in developing future emergency procedures. The emergency procedure (Security and Emergency Preparedness Plan SEPP) will be reviewed and coordinated with and approved by state and local emergency response departments. Emergency Drills‌ Emergency response drills will be conducted at periodic intervals as defined by NFPA 130, Chapter 9 and other appropriate authority. VMR will plan and conduct drills in coordination with appropriate emergency response organizations through the Regional Security Team.
AutoNDA by SimpleDocs
Regional Security Team. The Regional Security Team consists of representatives of VMR, Member Cities, the State of Arizona, and the United States Department of Homeland Security. These representatives shall have the authority to make recommendations in the areas of emergency response, fire/life safety, and security. The Regional Security Team meets on a monthly basis to discuss and plan activities requiring interface between state and local emergency response departments. VMR shall chair the Regional Security Team. Final decisions regarding emergency response, fire/safety and security will be the responsibility of VMR’s CEO, the Board of Directors, and the Member Cities.

Related to Regional Security Team

  • NATIONAL SECURITY Nothing in this Agreement shall be construed:

  • Additional Security This guarantee is in addition to and is not in any way prejudiced by any other guarantee or security now or subsequently held by any Finance Party.

  • Organizational Security 2.1.1 It is the mutual intention of the parties that the provisions of this Article protect the rights of individual workers without restricting CSEA’s rights.

  • Additional security requirements The following provisions apply in respect of any Additional Security provided:

  • Technical Security Controls 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.

  • Additional Service Characteristics 3.12 The technical specification of the Bitstream 2a Service is set out in Appendix B.

  • Contractor Security Clearance Customers may designate certain duties and/or positions as positions of “special trust” because they involve special trust responsibilities, are located in sensitive locations, or have key capabilities with access to sensitive or confidential information. The designation of a special trust position or duties is at the sole discretion of the Customer. Contractor or Contractor’s employees and Staff who, in the performance of this Contract, will be assigned to work in positions determined by the Customer to be positions of special trust, may be required to submit to background screening and be approved by the Customer to work on this Contract.

  • ONLINE LINGUISTIC SUPPORT 6.1. The participant must carry out the OLS language assessment before and at the end of the mobility period. The completion of the online assessment before departure is a pre-requisite for the mobility, except in duly justified cases.

  • Information Security Program (1) DTI shall implement and maintain a comprehensive written information security program applicable to the Personal Information ("Information Security Program") which shall include commercially reasonable measures, including, as appropriate, policies and procedures and technical, physical, and administrative safeguards that are consistent with industry standards, providing for (i) the security and confidentiality of the Personal Information, (ii) protection of the Personal Information against reasonably foreseeable threats or hazards to the security or integrity of the Personal Information, (iii) protection against unauthorized access to or use of or loss or theft of the Personal Information, and (iv) appropriate disposal of the Personal Information. Without limiting the generality of the foregoing, the Information Security Program shall provide for (i) continual assessment and re-assessment of the risks to the security of Personal Information acquired or maintained by DTI and its agents, contractors and subcontractors in connection with the Services, including but not limited to (A) identification of internal and external threats that could result in unauthorized disclosure, alteration or destruction of Personal Information and systems used by DTI and its agents, contractors and subcontractors, (B) assessment of the likelihood and potential damage of such threats, taking into account the sensitivity of such Personal Information, and (C) assessment of the sufficiency of policies, procedures, information systems of DTI and its agents, contractors and subcontractors, and other arrangements in place, to control risks; and (ii) appropriate protection against such risks.

  • System Security Review All systems processing and/or storing DHCS PHI or PI must have at least an annual system risk assessment/security review which provides assurance that administrative, physical, and technical controls are functioning effectively and providing adequate levels of protection. Reviews should include vulnerability scanning tools.

Time is Money Join Law Insider Premium to draft better contracts faster.