Secure Environment. The District is committed to providing a safe and secure working and learning environment. The District has zero tolerance for threats or acts of violence. The District will act swiftly to defuse and/or eliminate threats of violence or violent act offenders in accordance with the District Workplace Violence Policy.
Secure Environment. Each Participant shall be responsible for maintaining a secure environment that supports the implementation, testing and demonstration of the NHIN Interface Specifications required by the Prime Contracts and implemented in the Trial Implementation.
Secure Environment. The physical premises hosting and supporting the ASP Solution will provide security solutions designed to permit access only by authorized personnel. ****.
Secure Environment. Contractor will maintain SWK Data in secure environment where all secure development, testing, and production databases holding any and all SWK Data shall solely be maintained at all times.
Secure Environment. Following the COVID19 pandemic additional “Special Conditions of Hire during COVID-19” (appendix 6) have been imposed to ensure a Covid secure environment for your event. A Hall Covid risk assessment has been carried out and will be provided to you. You the hirer will be required to carry out a Covid assessment to identify and mitigate any Covid risks associated with your specific event. Thank you Yelvertoft Village Hall Management Committee Yelvertoft Village Hall Hiring Agreement DATED:
Secure Environment. The Project Board has ensured that the physical design and security of the hub is of a standard to ensure the confidential aspects of the MASH concept are met. This is essential to ensure each individual partner has the confidence to share their information whilst maintaining the duty of care and responsibility over it. The MASH concept creates a joined up working environment without barriers to ensure communication and dialogue but only between those who ‘need to know’. Therefore it follows that any person who does not ‘need to know’ is not permitted into the hub. (Recommendation 14) Bibliography: Audit Commission. (2003). Corporate Governance, Improvement and Trust in local public service. London. ISBN 1 86240 462 3 xxxx://xxx.xxxxxxxxxxxxxxx.xxx.xx/SiteCollectionDocuments/AuditCommissionRepo rts/NationalStudies/CorporateGovernance.pdf Department for Children Schools & Families. (2009). The roles and responsibilities of the Lead member for Children’s Services and the Director of Children’s Services.
Secure Environment. Test-takers cannot use supplemental materials or information by accessing documents or Websites on their testing computer. Use of such materials is considered cheating. • Provide a designated area either outside or within the room used for testing where test-takers can place belongings. • Provide scratch paper and pencil only when administering a math test.
Secure Environment. (a) Licensee shall provide a secure environment to maintain the ATLAS OCSP Software in Source Code form at a reasonable number of Purchaser Sites (the “Lab Environment”) for the use of employees, agents, contractors and subcontractors of Licensee, as reasonably necessary for Licensee’s exercise of its rights under this License Agreement, that have executed a written agreement containing terms at least as protective as those contained in this License Agreement (the “Confidential Parties”). Notwithstanding the foregoing, Licensee’s employees, agents, contractors and subcontractors may access the Source Code located at Purchaser Sites remotely, but only as reasonably necessary for Licensee’s exercise of its rights under this License Agreement.
Secure Environment. TDSO shall be responsible for maintaining a secure environment and System. TDSO shall use appropriate safeguards to prevent use or disclosure of Message Content other than as permitted by this Agreement, including appropriate administrative, physical, and technical safeguards that protect the confidentiality, integrity, and availability of that Message Content. Appropriate safeguards include, but are not limited to, those identified in the HIPAA Security Rule, 45 C.F.R. Part 160 and Part 164, Subparts A and C, as safeguards, standards, “required” implementation specifications and “addressable” implementation specifications. To the extent that an ”addressable” implementation specification is not reasonable and appropriate in the TDSO’s environment, then the TDSO shall document why it would not be reasonable and appropriate to implement the implementation specification and the TDSO shall, instead, implement an equivalent alternative measure if reasonable and appropriate. The TDSO’s documentation shall be maintained throughout the TDSO’s Termas a TDSO.
Secure Environment. Maintain all Pupil Records obtained pursuant to this Amendment in a secure computer environment and not copy, reproduce or transmit data obtained pursuant to this Amendment except as necessary for the provision of Services or as required or allowed under applicable law or court order. Provider has security measures in place to help protect against loss, misuse and alteration of the Pupil Records under Provider's control. When the Service is accessed using a supported web browser, Secure Socket Layer ("SSL") or equivalent technology protects information, using both server authentication to help ensure that Pupil Records are safe, secure and available to only authorized users. Provider shall host the service in a secure server environment that uses a firewall and other advance technology in an effort to prevent interference or access from outside intruders. The service will require unique account identifiers, usernames and passwords.