Information Technology Enterprise Architecture Requirements If this Contract involves information technology-related products or services, the Contractor agrees that all such products or services are compatible with any of the technology standards found at xxxxx://xxx.xx.xxx/iot/2394.htm that are applicable, including the assistive technology standard. The State may terminate this Contract for default if the terms of this paragraph are breached.
List of Operator’s Subprocessors [Box 26] [Box 27] [Box 28] [Box 29]
CONTINUITY OF OPERATIONS (1) Engage in any business activities substantially different than those in which Borrower is presently engaged, (2) cease operations, liquidate, merge, transfer, acquire or consolidate with any other entity, change its name, dissolve or transfer or sell Collateral out of the ordinary course of business, or (3) pay any dividends on Borrower's stock (other than dividends payable in its stock), provided, however that notwithstanding the foregoing, but only so long as no Event of Default has occurred and is continuing or would result from the payment of dividends, if Borrower is a "Subchapter S Corporation" (as defined in the Internal Revenue Code of 1986, as amended), Borrower may pay cash dividends on its stock to its shareholders from time to time in amounts necessary to enable the shareholders to pay income taxes and make estimated income tax payments to satisfy their liabilities under federal and state law which arise solely from their status as Shareholders of a Subchapter S Corporation because of their ownership of shares of Borrower's stock, or purchase or retire any of Borrower's outstanding shares or alter or amend Borrower's capital structure.
Certified and Minority Business Enterprises Reports Upon Customer request, the Contractor shall report to the requesting Customer the Contractor’s spend with certified and other minority business enterprises in the provision of commodities or services related to the Customer’s orders. These reports shall include the period covered, the name, minority code, and Federal Employer Identification Number of each minority business utilized during the period; commodities and services provided by the minority business enterprise, and the amount paid to each minority business enterprise on behalf of the Customer.
SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes.
Foreign-Owned Companies in Connection with Critical Infrastructure If Texas Government Code, Section 2274.0102(a)(1) (relating to prohibition on contracts with certain foreign-owned companies in connection with critical infrastructure) is applicable to this Contract, pursuant to Government Code Section 2274.0102, Contractor certifies that neither it nor its parent company, nor any affiliate of Contractor or its parent company, is: (1) majority owned or controlled by citizens or governmental entities of China, Iran, North Korea, Russia, or any other country designated by the Governor under Government Code Section 2274.0103, or (2) headquartered in any of those countries.
Infrastructure Vulnerability Scanning Supplier will scan its internal environments (e.g., servers, network devices, etc.) related to Deliverables monthly and external environments related to Deliverables weekly. Supplier will have a defined process to address any findings but will ensure that any high-risk vulnerabilities are addressed within 30 days.
Industrial Operations Analyst (IOA The IOA is a GSA Government official who audits Contractor records and conducts Contractor Assistance Visits (CAVs) to the Contractor’s place of business to assist the Contractor with task order reporting, Contract Access Fee (CAF) management, and other general contract administration functions deemed necessary by the Government.
CERTIFICATION REGARDING CERTAIN FOREIGN-OWNED COMPANIES IN CONNECTION WITH CRITICAL INFRASTRUCTURE (Texas law as of September 1, 2021) By submitting a proposal to this Solicitation, you certify that you agree to the following required by Texas law as of September 1, 2021: Proposing Company is prohibited from entering into a contract or other agreement relating to critical infrastructure that would grant to the company direct or remote access to or control of critical infrastructure in this state, excluding access specifically allowed by the Proposing Company for product warranty and support purposes. Company, certifies that neither it nor its parent company nor any affiliate of company or its parent company, is (1) owned by or the majority of stock or other ownership interest of the company is held or controlled by individuals who are citizens of China, Iran, North Korea, Russia, or a designated country; (2) a company or other entity, including governmental entity, that is owned or controlled by citizens of or is directly controlled by the government of China, Iran, North Korea, Russia, or a designated country; or (3) headquartered in China, Iran, North Korea, Russia, or a designated country. For purposes of this contract, “critical infrastructure” means “a communication infrastructure system, cybersecurity system, electric grid, hazardous waste treatment system, or water treatment facility.” See Tex. Gov’t Code § 2274.0101(2) of SB 1226 (87th leg.). The company verifies and certifies that company will not grant direct or remote access to or control of critical infrastructure, except for product warranty and support purposes, to prohibited individuals, companies, or entities, including governmental entities, owned, controlled, or headquartered in China, Iran, North Korea, Russia, or a designated country, as determined by the Governor.
CONTINUITY OF OPERATION Section 1: No Strikes, Work Stoppages or Lockouts Neither of the parties shall utilize any economic sanction to force its position on the other party over any issue. Further, no Employee or group of Employees shall individually or through concerted action, take part in any activity that impedes the operation of the business, except as otherwise authorized by this Agreement. Should any person or group of people participate in any such unauthorized activity, upon notification of such occurrence, the Union or the Company, as the case may be, will direct such person or group of people to resume normal operations and will take effective means to cease the unauthorized conduct. Any employee or group of employees who participate in such unauthorized activity shall be subject to immediate dismissal, unless mitigating circumstances exist that are acceptable to the ERRC. Should either party suffer financial damage as a result of such unauthorized activity, they may pursue compensation for such loss at the arbitration step of the Concern Resolution Process, and the arbitrator shall have full authority to remedy any violation of this Article.