We use cookies on our site to analyze traffic, enhance your experience, and provide you with tailored content.

For more information visit our privacy policy.

Rules of Behavior Sample Clauses

Rules of BehaviorThe Contractor shall ensure that all employees, including subcontractor employees, comply with the NIH Information Technology General Rules of Behavior (xxxxx://xxxx.xxx.xxx/InfoSecurity/training/Pages/nihitrob.aspx), which are contained in the NIH Information Security Awareness Training Course xxxx://xxxxxxxxxxxxxx.xxx.xxx.‌‌‌‌‌‌‌
Rules of Behavior. 1. The Contractor (and/or any subcontractor) shall ensure that all employees performing on the contract comply with the HHS Information Technology General Rules of Behavior, and comply with the NIH Information Technology General Rules of Behavior xxxxx://xxxx.xxx.xxx/InfoSecurity/training/Pages/nihitrob.aspx, which are contained in the NIH Information Security Awareness Training Course xxxx://xxxxxxxxxxxxxx.xxx.xxx 2. All Contractor employees performing on the contract must read and adhere to the Rules of Behavior before accessing Department data or other information, systems, and/or networks that store/process government information, initially at the beginning of the contract and at least annually thereafter, which may be done as part of annual NIH Information Security Awareness Training. If the training is provided by the contractor, the signed Rules of Behavior must be provided as a separate deliverable to the CO and/or COR per defined timelines above.
Rules of Behavior. If You purchase Xxxxxx’s FedRAMP SaaS Environment then You, along with Your system administrators, employees, contractors, end-users, and other third parties who are given access to the FedRAMP SaaS Environment, are subject to the FedRAMP Rules of Behavior located at xxxx://xxx.xxxxxx.xxx/company/legal/fedramp.
Rules of Behavior. CMS shall: The Non-CMS Organization shall:
Rules of Behavior. Rules of Behavior are part of a comprehensive program to provide complete information security. These guidelines were established to hold users accountable for their actions and responsible for information security. Rules of Behavior establish D- (0 5/ 20 standards of behavior in recognition of the fact that knowledgeable users are the foundation of a successful security program. Users need to understand that taking personal responsibility for the security of their computer and the data it contains is an essential part of their job.
Rules of Behavior. ‌ Both parties shall ensure that all users with access to the CMS Network, the CMS information system, the Non-CMS Organization network and any data received from the other organization shall adhere to all current HHS Rules of Behavior (RoB) (For Use of Technology Resources and Information), which is available at xxxx://xxx.xxx.xxx/ocio/policy/.
Rules of Behavior a. The Contractor (and/or any subcontractor) must ensure that all employees performing on the contract comply with the HHS Information Technology General Rules of Behavior and HHS Rules of Behavior for Privileged Users. b. All Contractor employees performing on the contract must read and adhere to the Rules of Behavior before accessing Department data or other information, systems, and/or networks that store/process government information, initially at the beginning of the contract and at least annually thereafter, which may be done as part of annual HHS/OASH Information Security Awareness Training. If the training is provided by the contractor, the signed XXX must be provided as a separate deliverable to the CO and/or COR per defined timelines above.
Rules of Behavior. 1) The Contractor (and/or any subcontractor) shall ensure that all employees performing on the contract comply with the HHS Information Technology General Rules of Behavior. 2) All Contractor employees performing on the contract must read and adhere to the Rules of Behavior (ROB) before accessing HHS and FDA data or other information, systems, and/or networks that store/process government information, initially at the beginning of the contract and at least annually thereafter, which may be done as part of annual FDA Information Security Awareness Training. If the training is provided by the contractor, the signed XXX must be provided as a separate deliverable to the CO and/or COR per defined timelines.
Rules of Behavior. If You purchase Ivanti’s FedRAMP SaaS Environment then You, along with Your system administrators, employees, contractors, end-users, and other third parties who are given access to the FedRAMP SaaS Environment, are subject to the FedRAMP Rules of Behavior located at xxxx://xxx.xxxxxx.xxx/company/legal/fedramp.
Rules of BehaviorAccording to the conditions of stay in the Center, during the recovery course, the CLIENT is strictly forbidden: 1. Use of cigarettes and any kind of alcohol and drugs 2. Engaging in sexual activities and any intimate relationship 3. Any form of violence, whether physical, moral, or other 4. Profanity or obscenity 5. Stealing 6. Lying and deception 7. Leaving the territory of the CENTER without authorization of the Administration 8. Disrupting the daily scheduled activities 9. Failure to participate in activities scheduled by the CENTER’s associates 10. Violating Federal or State of Missouri and Nevada laws and regulations