Security Assessment Findings Sample Clauses

Security Assessment Findings. Upon completion of a Security Assessment, Recipient will provide Provider will provide a Security Assessment completion letter that summarizes Provider’s Security Assessment findings. These findings may identify critical security deficiencies identified as “Mandatory” that require correction before Recipient can release, or continue to release, Recipient Confidential Information to Provider. Provider will implement and continue to maintain all mutually agreed upon “Mandatory” security findings within a mutually agreed upon timeframe. If mutual agreement to “Mandatory” security findings and/or timeframe cannot be reached, then these issues may be escalated using the dispute resolution provisions within this Agreement.
AutoNDA by SimpleDocs
Security Assessment Findings. Upon completion of an assessment, USAA will provide TrueCar with an assessment completion letter that details USAA’s findings. These findings may identify critical security deficiencies identified as “Mandatory” that require immediate correction before USAA can release, or continue to release, Protected Information to TrueCar. TrueCar will implement and continue to maintain all mutually agreed upon “Mandatory” security findings during the Term. If mutual agreement to “Mandatory” security findings cannot be reached, then these issues may be escalated using the dispute resolution provisions within this Agreement.

Related to Security Assessment Findings

  • Security Assessment If Accenture reasonably determines, or in good faith believes, that Supplier’s security practices or procedures do not meet Supplier’s obligations under the Agreement, then Accenture will notify Supplier of the deficiencies. Supplier will without unreasonable delay: (i) correct such deficiencies at its own expense; (ii) permit Accenture, or its duly authorized representatives, to assess Supplier’s security-related activities that are relevant to the Agreement; and (iii) timely complete a security questionnaire from Accenture on a periodic basis upon Accenture’s request. Security issues identified by Accenture will be assigned risk ratings and an agreed-to timeframe to remediate. Supplier will remediate all the security issues identified within the agreed to timeframes. Upon Supplier’s failure to remediate any high or medium rated security issues within the stated timeframes, Accenture may terminate the Agreement in accordance with Section 8 above.

  • Diagnostic Assessment 6.3.1 Boards shall provide a list of pre-approved assessment tools consistent with their Board improvement plan for student achievement and which is compliant with Ministry of Education PPM (PPM 155: Diagnostic Assessment in Support of Student Learning, date of issue January 7, 2013). 6.3.2 Teachers shall use their professional judgment to determine which assessment and/or evaluation tool(s) from the Board list of preapproved assessment tools is applicable, for which student(s), as well as the frequency and timing of the tool. In order to inform their instruction, teachers must utilize diagnostic assessment during the school year.

  • Needs Assessment The determination of whether the Annual Income of a family or individual occupying or seeking to occupy a Qualifying Unit complies with the requirements for Extremely Low-Income Households or Low- to Moderate-Income Households shall be made by the applicable housing authority in the CDBG-DR Program area prior to admission of such family or individual to occupancy of a Qualifying Unit.

  • Conformity Assessment Procedures 1. Each Party shall give positive consideration to accepting the results of conformity assessment procedures of other Parties, even where those procedures differ from its own, provided it is satisfied that those procedures offer an assurance of conformity with applicable technical regulations or standards equivalent to its own procedures. 2. Each Party shall seek to enhance the acceptance of the results of conformity assessment procedures conducted in the territories of other Parties with a view to increasing efficiency, avoiding duplication and ensuring cost effectiveness of the conformity assessments. In this regard, each Party may choose, depending on the situation of the Party and the specific sectors involved, a broad range of approaches. These may include but are not limited to: (a) recognition by a Party of the results of conformity assessments performed in the territory of another Party; (b) recognition of co-operative arrangements between accreditation bodies in the territories of the Parties; (c) mutual recognition of conformity assessment procedures conducted by bodies located in the territory of each Party; (d) accreditation of conformity assessment bodies in the territory of another Party; (e) use of existing regional and international multilateral recognition agreements and arrangements; (f) designating conformity assessment bodies located in the territory of another Party to perform conformity assessment; and (g) suppliers’ declaration of conformity. 3. Each Party shall exchange information with other Parties on its experience in the development and application of the approaches in Paragraph 2(a) to (g) and other appropriate approaches with a view to facilitating the acceptance of the results of conformity assessment procedures. 4. A Party shall, upon request of another Party, explain its reasons for not accepting the results of any conformity assessment procedure performed in the territory of that other Party.

  • Risk Assessment An assessment of any risks inherent in the work requirements and actions to mitigate these risks.

  • Risk Assessments a. Risk Assessment - DST shall, at least annually, perform risk assessments that are designed to identify material threats (both internal and external) against Fund Data, the likelihood of those threats Schedule 10.2 p.2 occurring and the impact of those threats upon DST organization to evaluate and analyze the appropriate level of information security safeguards (“Risk Assessments”). b. Risk Mitigation - DST shall use commercially reasonable efforts to manage, control and remediate threats identified in the Risk Assessments that it believes are likely to result in material unauthorized access, copying, use, processing, disclosure, alteration, transfer, loss or destruction of Fund Data, consistent with the Objective, and commensurate with the sensitivity of the Fund Data and the complexity and scope of the activities of DST pursuant to the Agreement. c. Security Controls Testing - DST shall, on approximately an annual basis, engage an independent external party to conduct a review (including information security) of DST’s systems that are related to the provision of services. DST shall have a process to review and evaluate high risk findings resulting from this testing.

  • Office of Inspector General Investigative Findings Expert Review In accordance with Senate Bill 799, Acts 2021, 87th Leg., R.S., if Texas Government Code, Section 531.102(m-1)(2) is applicable to this Contract, Contractor affirms that it possesses the necessary occupational licenses and experience.

  • Screening and Assessment Grantee shall: 1. Comply with all applicable rules in the TAC for SUD programs as stated in the SUD UM Guidelines Information, Rules, and Regulations regarding Screening and Assessment. 2. When documenting a CMBHS Substance Use Disorder screening, Grantee shall conduct the screening in a confidential, face-to-face interview unless there is documented justification for an interview by phone. 3. Document Financial Eligibility in CMBHS as required in the SUD UM Guidelines. 4. Conduct and document a CMBHS SUD Initial Assessment with the client to determine the appropriate levels of care for SUD treatment. The CMBHS assessment will identify the impact of substances on the physical, mental health, and other identified issues including Tuberculosis, Hepatitis C, sexually transmitted infection (STI), and Human Immunodeficiency Virus (HIV). i. If client indicates risk for these communicable diseases, Grantee shall refer the client to the appropriate community resources for further testing and counseling. ii. If the client is at risk for HIV, Grantee shall refer the client to pre and post- test counseling on HIV. 5. Grantee will also consider referring to the TRA Statewide HIV Intensive Residential Treatment facility to concurrently address medical needs and SUD. 6. If a client is living with HIV, Grantee will refer the client to the appropriate community resources to complete the necessary referrals and health related paperwork. 7. The assessment shall be signed by a Qualified Credential Counselor (QCC) and filed in the client record within three (3) service days of admission or a program may accept an evaluation from an outside entity if it meets the criteria for admission and was completed during the thirty (30) business days preceding admission.

  • Loss Assessment We will pay up to $1000 for your share of loss assessment charged during the policy period against you by a corporation or as- sociation of property owners, when the assess- ment is made as a result of:

  • Data Protection Impact Assessment and Prior Consultation Processor shall provide reasonable assistance to the Company with any data protection impact assessments, and prior consultations with Supervising Authorities or other competent data privacy authorities, which Company reasonably considers to be required by article 35 or 36 of the GDPR or equivalent provisions of any other Data Protection Law, in each case solely in relation to Processing of Company Personal Data by, and taking into account the nature of the Processing and information available to, the Contracted Processors.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!