Safeguarding requirements and procedures (1) The Contractor shall apply the following basic safeguarding requirements and procedures to protect covered contractor information systems. Requirements and procedures for basic safeguarding of covered contractor information systems shall include, at a minimum, the following security controls: (i) Limit information system access to authorized users, processes acting on behalf of authorized users, or devices (including other information systems). (ii) Limit information system access to the types of transactions and functions that authorized users are permitted to execute. (iii) Verify and control/limit connections to and use of external information systems. (iv) Control information posted or processed on publicly accessible information systems. (v) Identify information system users, processes acting on behalf of users, or devices. (vi) Authenticate (or verify) the identities of those users, processes, or devices, as a prerequisite to allowing access to organizational information systems. (vii) Sanitize or destroy information system media containing Federal Contract Information before disposal or release for reuse. (viii) Limit physical access to organizational information systems, equipment, and the respective operating environments to authorized individuals. (ix) Escort visitors and monitor visitor activity; maintain audit logs of physical access; and control and manage physical access devices. (x) Monitor, control, and protect organizational communications (i.e., information transmitted or received by organizational information systems) at the external boundaries and key internal boundaries of the information systems. (xi) Implement subnetworks for publicly accessible system components that are physically or logically separated from internal networks. (xii) Identify, report, and correct information and information system flaws in a timely manner. (xiii) Provide protection from malicious code at appropriate locations within organizational information systems. (xiv) Update malicious code protection mechanisms when new releases are available. (xv) Perform periodic scans of the information system and real-time scans of files from external sources as files are downloaded, opened, or executed.
Agreements and Conditions On or before the Closing Date, Seller shall have complied with and duly performed and satisfied in all material respects all agreements and conditions on its part to be complied with and performed by such date pursuant to this Agreement.
Entitlements and Purchasing Requirements You must purchase the appropriate number of Software Subscription(s), based on the number of Socket-pairs for all Managed Nodes being managed by the Red Hat CloudForms Software. A “Socket-pair” is up to two sockets each occupied by a CPU on a Managed Node. Red Hat CloudForms Software is configured to manage virtual machines on certain public clouds (a “Red Hat CloudForms Enabled Cloud”). You must purchase the appropriate number of Red Hat CloudForms for Public Cloud Software Subscriptions based on the number of Managed VMs instantiated on a Red Hat CloudForms Enabled Cloud. Please confirm that a specific public cloud is a Red Hat CloudForms Enabled Cloud prior to purchasing. A Red Hat Enterprise Linux Software Subscription is bundled with the Red Hat CloudForms Software Subscription and the fees for the Red Hat CloudForms Subscription are based on such bundled use. Any use of the Red Hat Enterprise Linux other than to run the Red Hat CloudForms Software is subject to Red Hat’s standard Software Subscription fees for such use.
Program Requirements The parties shall comply with the Disadvantaged Business Enterprise Program requirements established in 49 CFR Part 26.
Compliance with the Laws and Agreements; No Defaults (a) Each of the Borrower and each Subsidiary is in compliance with all Governmental Requirements applicable to it or its Property and all agreements and other instruments binding upon it or its Property, and possesses all licenses, permits, franchises, exemptions, approvals and other governmental authorizations necessary for the ownership of its Property and the conduct of its business, except where the failure to do so, individually or in the aggregate, could not reasonably be expected to result in a Material Adverse Effect. (b) Neither the Borrower nor any Subsidiary is in default nor has any event or circumstance occurred which, but for the expiration of any applicable grace period or the giving of notice, or both, would constitute a default or would require the Borrower or a Subsidiary to Redeem or make any offer to Redeem under any indenture, note, credit agreement or instrument pursuant to which any Material Indebtedness is outstanding or by which the Borrower or any Subsidiary or any of their Properties is bound. (c) No Default has occurred and is continuing.
COMPLIANCE WITH LICENSING REQUIREMENTS CONTRACTOR shall comply with all necessary licensing requirements and shall obtain appropriate licenses and display the same in a location that is reasonably conspicuous, as well as file copies of same with the County Executive Office.
Compliance with Laws and Agreements; No Default Except where the failure to do so, individually or in the aggregate, could not reasonably be expected to result in a Material Adverse Effect, each Loan Party and each Subsidiary is in compliance with (i) all Requirements of Law applicable to it or its property and (ii) all indentures, agreements and other instruments binding upon it or its property. No Default has occurred and is continuing.
Compliance with Regulatory Requirements Upon demand by Lender, Borrower shall reimburse Lender for Lender’s additional costs and/or reductions in the amount of principal or interest received or receivable by Lender if at any time after the date of this Agreement any law, treaty or regulation or any change in any law, treaty or regulation or the interpretation thereof by any Governmental Authority charged with the administration thereof or any other authority having jurisdiction over Lender or the Loans, whether or not having the force of law, shall impose, modify or deem applicable any reserve and/or special deposit requirement against or in respect of assets held by or deposits in or for the account of the Loans by Lender or impose on Lender any other condition with respect to this Agreement or the Loans, the result of which is to either increase the cost to Lender of making or maintaining the Loans or to reduce the amount of principal or interest received or receivable by Lender with respect to such Loans. Said additional costs and/or reductions will be those which directly result from the imposition of such requirement or condition on the making or maintaining of such Loans.
Training Requirements Grantee shall: A. Authorize and require staff (including volunteers) to attend training, conferences, and meetings as directed by DSHS; B. Appropriately budget funds in order to meet training requirements in a timely manner, and ensure that staff and volunteers are trained as specified in the training requirements listed at xxxxx://xxx.xxxx.xxxxx.xxx/hivstd/training/ and as otherwise specified by DSHS. Grantee shall document that these training requirements are met; and C. Ensure that staff hired for HIV and syphilis testing are trained to perform blood draws within three (3) months of employment.
Compliance with Reporting Requirements The Company is subject to and in full compliance with the reporting requirements of Section 13 or Section 15(d) of the Exchange Act.