Security Controls Annually, upon Fund’s reasonable request, DST shall provide Fund’s Chief Information Security Officer or his or her designee with a summary of its corporate information security policy and an opportunity to discuss DST’s information security measures, and a high level and non-confidential summary of any penetration testing related to the provision of in-scope services . DST shall review its Security Policy annually.
Security Cameras Security cameras have been installed throughout the Facility; however, they will not routinely be used in areas where there is an expectation of privacy, such as restrooms or patient care areas.
Procurement of Small Works Works estimated to cost $250,000 equivalent or less per contract, up to an aggregate amount not to exceed $800,000 equivalent, may be procured under lump-sum, fixed-price contracts awarded on the basis of quotations obtained from three (3) qualified domestic contractors in response to a written invitation. The invitation shall include a detailed description of the works, including basic specifications, the required completion date, a basic form of agreement acceptable to the Bank, and relevant drawings, where applicable. The award shall be made to the contractor who offers the lowest price quotation for the required work, and who has the experience and resources to complete the contract successfully. Part D: Review by the Bank of Procurement Decisions
Security Contact Operator shall provide the name and contact information of Operator's Security Contact on Exhibit F. The LEA may direct security concerns or questions to the Security Contact.
Operator’s Security Contact Information Xxxxxxx X. Xxxxxxx Named Security Contact xxxxxxxx@xxxxxxxxx.xxx Email of Security Contact (000) 000-0000 Phone Number of Security Contact
Construction Phase Services 3.1.1 – Basic Construction Services
SECURITY CLEARANCE REQUIREMENTS The OCO must tailor security requirements (both facility and employee), clauses, provisions, and other applicable terms and conditions specific to each task order’s solicitation and award. Only those Contractors that meet the required security clearance levels on individual task order solicitations are eligible to compete for such task orders. In general, all necessary facility and employee security clearances shall be at the expense of the Contractor. In some cases, Government offices that conduct background investigations do not have a means for accepting direct compensation from Contractors and instead charge customer agencies for the background investigations. In these cases, the Contractor shall be flexible in establishing ways of reimbursing the Government for these expenses. The individual task order should specify the terms and conditions for reimbursement, if any, for obtaining security clearances. The Contractor shall comply with all security requirements in task orders awarded under OASIS SB.
Security Clearances A. The General Contractor is to supply the Court with names, dates of birth, and social security numbers of all employees who will be on site. This information must be submitted one (1) week prior to access to the site. The Court has final word on who will or who will not be allowed on the project premises.
SECURITY CODES If the Custodian issues to the Company security codes, passwords or test keys in order that it may verify that certain transmissions of information, including Proper Instructions, have been originated by the Company, the Company shall take all commercially reasonable steps to safeguard any security codes, passwords, test keys or other security devices which the Custodian shall make available.
Technical Security Controls 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.