Security Consultant Sample Clauses

Security Consultant. N.B. – Applicants must address each category of work listed above in their application whether it is to be performed by in-house staff or by sub-consultant(s). The members of the team for each of the categories of work listed above must be identified including the firm’s name, individual’s name and professional registration or license number, as applicable, as well as whether the firm is SOMWBA certified as an MBE and/or WBE). Failure to address each category may result in the elimination of the applicant from consideration on this project. Applicants should not list any consultants other than those for the categories of work listed above. The minority and women-owned business enterprises must be selected from the categories of work listed above. Consultants other than those for the categories of work listed above may not be used for purposes of meeting M/WBE requirements. The Owner and Designer Selection Panel will consider the following additional criteria in evaluating proposals:
AutoNDA by SimpleDocs
Security Consultant. Applicants must address each category of work listed above in their application whether it is to be performed by in-house staff or by sub-consultant(s). The members of the team for each of the categories of work listed above must be identified including the firm’s name, individual’s name and professional registration or license number, as applicable, as well as whether the firm is SDO certified as an MBE and/or WBE. Failure to address each category may result in the elimination of the applicant from consideration on this project. Applicants should not list any consultants other than those for the categories of work listed above. The minority and women-owned business enterprises must be selected to perform services addressing the categories of work listed above or be assigned to tasks required under Basic Services as specifically set forth in the Contract for Designer Services as amended. Consultants other than those proposed for the categories of work listed above or required to perform Basic Services may not be used for purposes of meeting M/WBE requirements. Applicants are strongly encouraged to utilize multiple disciplines and firms to meet their MBE/WBE goals. Consultants to the prime Designer can team within their disciplines in order to meet the MBE/WBE goals but must state this relationship on the organizational chart (Section 6 of the application form). The Owner and Designer Selection Panel will consider the following additional criteria in evaluating proposals:
Security Consultant. Educational Programming Consultant ** N.B. – Applicants must address each category of work listed above in their application whether it is to be performed by in-house staff or by sub-consultant(s). The members of the team for each of the categories of work listed above must be identified including the firm’s name, individual’s name and professional registration or license number, as applicable, as well as whether the firm is SDO certified as an MBE and/or WBE. Failure to address each category may result in the elimination of the applicant from consideration on this project. Applicants should not list any consultants other than those for the categories of work listed above. The minority and women-owned business enterprises must be selected to perform services addressing the categories of work listed above or be assigned to tasks required under Basic Services as specifically set forth in the Contract for Designer Services as amended. Consultants other than those proposed for the categories of work listed above or required to perform Basic Services may not be used for purposes of meeting M/WBE requirements. Applicants are strongly encouraged to utilize multiple disciplines and firms to meet their MBE/WBE goals. Consultants to the prime Designer can team within their disciplines in order to meet the MBE/WBE goals but must state this relationship on the organizational chart (Section 6 of the application form). The Owner and Designer Selection Panel will consider the following additional criteria in evaluating proposals: Prior similar experience best illustrating current qualifications for the specific project. Past performance of the firm, if any with regard to public, private, DOE-funded, and MSBA funded projects across the Commonwealth, with respect to: Quality of project design. Quality, clarity, completeness and accuracy of plans and contract documents. Ability to meet established program requirements within allotted budget. Ability to meet schedules including submission of design and contract documents, processing of shop drawings, contractor requisitions and change orders. Coordination and management of consultants. Working relationship with contractors, subcontractors, local awarding authority and MSBA staff and local officials. Current workload and ability to undertake the contract based on the number and scope of projects for which the firm is currently under contract. The identity and qualifications of the consultants who will work on the project. The...

Related to Security Consultant

  • Security Contact Operator shall provide the name and contact information of Operator's Security Contact on Exhibit F. The LEA may direct security concerns or questions to the Security Contact.

  • Security Controls Annually, upon Fund’s reasonable request, Transfer Agent shall provide Fund’s Chief Information Security Officer or his or her designee with a copy of its corporate information security controls that form the basis for Transfer Agent’s Security Policy and an opportunity to discuss Transfer Agent’s information security measures, and a high level summary of any vulnerability testing conducted by Transfer Agent on its information security controls, with a qualified member of Transfer Agent’s information technology management team. Transfer Agent shall review its Security Policy annually.

  • Operator’s Security Contact Information Xxxxxxx X. Xxxxxxx Named Security Contact xxxxxxxx@xxxxxxxxx.xxx Email of Security Contact (000) 000-0000 Phone Number of Security Contact

  • Security Compliance Apple will take appropriate steps to ensure compliance with security procedures by its employees, contractors and sub processors and Apple shall ensure that any persons authorized to process Personal Data comply with applicable laws regarding the confidentiality and security of Personal Data with regards to the Service.

  • Security Cameras Security cameras have been installed throughout the Facility; however, they will not routinely be used in areas where there is an expectation of privacy, such as restrooms or patient care areas.

  • Security Coordinator Provider shall provide the name and contact information of Provider’s Security Coordinator for the Student Data received pursuant to the DPA.

  • Security Management The Contractor shall comply with the requirements of the DOD 5200.1-M and the DD Form 254. Security of the Contractor’s electronic media shall be in accordance with the above documents. Effective Program Security shall require the Contractor to address Information Security and Operations Security enabled by the Security Classification Guides. The Contractor’s facility must be able to handle and store material up to the Classification Level as referenced in Attachment J-01, DD Form 254.

  • Technical Security Controls 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.

  • Security Clearances A. The General Contractor is to supply the Department of Corrections with full names, dates of birth, and social security numbers of all employees who will be on site. This information must be submitted a minimum of two (2) weeks prior to access to the site. The Department of Corrections has final word on who will be permitted access to the site. A form for this purpose is attached for your use.

  • Security Audit Customer agrees that PROS’ Audit Report will be used to satisfy any audit or inspection requests by or on behalf of Customer, and PROS will make Audit Reports available to Customer upon request. PROS will promptly remediate any material weaknesses or significant control deficiencies identified in any Audit Reports. In the event that an audit opinion is qualified and the qualification has not been remediated by the date of the Audit Report, PROS shall (i) provide Customer with PROS remediation plan; and (ii) execute such plan in accordance with its terms.

Time is Money Join Law Insider Premium to draft better contracts faster.