We use cookies on our site to analyze traffic, enhance your experience, and provide you with tailored content.

For more information visit our privacy policy.

Security Consultant Sample Clauses

Security Consultant. N.B. – Applicants must address each category of work listed above in their application whether it is to be performed by in-house staff or by sub-consultant(s). The members of the team for each of the categories of work listed above must be identified including the firm’s name, individual’s name and professional registration or license number, as applicable, as well as whether the firm is SOMWBA certified as an MBE and/or WBE). Applicants should not list any consultants other than those for the categories of work listed above. The minority and women-owned business enterprises must be selected from the categories of work listed above. Consultants other than those for the categories of work listed above may not be used for purposes of meeting M/WBE requirements. 1. Prior similar experience best illustrating current qualifications for the specific project. 2. Past performance of the firm, if any with regard to public, private, DOE-funded, and MSBA funded projects across the Commonwealth, with respect to: a. Quality of project design. b. Quality, clarity, completeness and accuracy of plans and contract documents. c. Ability to meet established program requirements within allotted budget. d. Ability to meet schedules including submission of design and contract documents, processing of shop drawings, contractor requisitions and change orders. e. Coordination and management of consultants. f. Working relationship with contractors, subcontractors, local awarding authority and MSBA staff and local officials. 3. Current workload and ability to undertake the contract based on the number and scope of projects for which the firm is currently under contract. 4. The identity and qualifications of the consultants who will work on the project. 5. The financial stability of the firm. 6. The qualifications of the personnel to be assigned to the project. 7. Geographical proximity of the firm to the project site or willingness of the firm to make site visits and attend local meetings as required by the client. 8. Additional criteria that the MSBA Designer Selection Panel considers relevant to the project.
Security ConsultantEducational Programming Consultant
Security ConsultantProject Management Consultant(s)

Related to Security Consultant

  • Security Contact Operator shall provide the name and contact information of Operator's Security Contact on Exhibit F. The LEA may direct security concerns or questions to the Security Contact.

  • Security Controls Annually, upon Fund’s reasonable request, DST shall provide Fund’s Chief Information Security Officer or his or her designee with a summary of its corporate information security policy and an opportunity to discuss DST’s information security measures, and a high level and non-confidential summary of any penetration testing related to the provision of in-scope services . DST shall review its Security Policy annually.

  • Operator’s Security Contact Information Xxxxxxx X. Xxxxxxx Named Security Contact xxxxxxxx@xxxxxxxxx.xxx Email of Security Contact (000) 000-0000 Phone Number of Security Contact

  • Security Cameras Security cameras have been installed throughout the Facility; however, they will not routinely be used in areas where there is an expectation of privacy, such as restrooms or patient care areas.

  • Security Coordinator Provider shall provide the name and contact information of Provider’s Security Coordinator for the Student Data received pursuant to the DPA.

  • Security Management The Contractor shall comply with the requirements of the DOD 5200.1-M and the DD Form 254. Security of the Contractor’s electronic media shall be in accordance with the above documents. Effective Program Security shall require the Contractor to address Information Security and Operations Security enabled by the Security Classification Guides. The Contractor’s facility must be able to handle and store material up to the Classification Level as referenced in Attachment J-01, DD Form 254.

  • Technical Security Controls 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.

  • SERVICES BY CONSULTANT The Consultant shall provide the professional services as defined in this Agreement and as necessary to accomplish the scope of services attached hereto as Attachment B and incorporated herein by this reference as if set forth in full. The Consultant shall furnish all services, labor, and related equipment to conduct and complete the work, except as specifically noted otherwise in this Agreement.

  • By Consultant (i) If the Company breaches this Agreement or fails to make any payments or provide information required hereunder; or, (ii) If the Company ceases business or, other than in an Initial Merger, sells a controlling interest to a third party, or agrees to a consolidation or merger of itself with or into another corporation, or enters into such a transaction outside of the scope of this Agreement, or sells substantially all of its assets to another corporation, entity or individual outside of the scope of this Agreement; or, (iii) If the Company subsequent to the execution hereof has a receiver appointed for its business or assets, or otherwise becomes insolvent or unable to timely satisfy its obligations in the ordinary course of, including but not limited to the obligation to pay the Initial Fee, the Transaction fee, or the Consulting Fee; or, (iv) If the Company subsequent to the execution hereof institutes, makes a general assignment for the benefit of creditors, has instituted against it any bankruptcy proceeding for reorganization for rearrangement of its financial affairs, files a petition in a court of bankruptcy, or is adjudicated a bankrupt; or, (v) If any of the disclosures made herein or subsequent hereto by the Company to Consultant are determined to be materially false or misleading. In the event Consultant elects to terminate without cause or this Agreement is terminated prior to the expiration of the Primary Term or any Extension Period by mutual written agreement, or by the Company for the reasons set forth in A(i) and (ii) above, the Company shall only be responsible to pay Consultant for unreimbursed expenses, Consulting Fee and Transaction Fee accrued up to and including the effective date of termination. If this Agreement is terminated by the Company for any other reason, or by Consultant for reasons set forth in B(i) through (v) above, Consultant shall be entitled to any outstanding unpaid portion of reimbursable expenses, Transaction Fee, if any, and for the remainder of the unexpired portion of the applicable term (Primary Term or Extension Period) of the Agreement.

  • Security Clearances A. The General Contractor is to supply the Court with names, dates of birth, and social security numbers of all employees who will be on site. This information must be submitted one (1) week prior to access to the site. The Court has final word on who will or who will not be allowed on the project premises.