Security Consultant Sample Clauses

Security Consultant. N.B. – Applicants must address each category of work listed above in their application whether it is to be performed by in-house staff or by sub-consultant(s). The members of the team for each of the categories of work listed above must be identified including the firm’s name, individual’s name and professional registration or license number, as applicable, as well as whether the firm is SOMWBA certified as an MBE and/or WBE). Applicants should not list any consultants other than those for the categories of work listed above. The minority and women-owned business enterprises must be selected from the categories of work listed above. Consultants other than those for the categories of work listed above may not be used for purposes of meeting M/WBE requirements. 1. Prior similar experience best illustrating current qualifications for the specific project. 2. Past performance of the firm, if any with regard to public, private, DOE-funded, and MSBA funded projects across the Commonwealth, with respect to: a. Quality of project design. b. Quality, clarity, completeness and accuracy of plans and contract documents. c. Ability to meet established program requirements within allotted budget. d. Ability to meet schedules including submission of design and contract documents, processing of shop drawings, contractor requisitions and change orders. e. Coordination and management of consultants. f. Working relationship with contractors, subcontractors, local awarding authority and MSBA staff and local officials. 3. Current workload and ability to undertake the contract based on the number and scope of projects for which the firm is currently under contract. 4. The identity and qualifications of the consultants who will work on the project. 5. The financial stability of the firm. 6. The qualifications of the personnel to be assigned to the project. 7. Geographical proximity of the firm to the project site or willingness of the firm to make site visits and attend local meetings as required by the client. 8. Additional criteria that the MSBA Designer Selection Panel considers relevant to the project.
AutoNDA by SimpleDocs
Security Consultant. Educational Programming Consultant

Related to Security Consultant

  • Security Contact Operator shall provide the name and contact information of Operator's Security Contact on Exhibit F. The LEA may direct security concerns or questions to the Security Contact.

  • Security Controls Annually, upon Fund’s reasonable request, DST shall provide Fund’s Chief Information Security Officer or his or her designee with a summary of its corporate information security policy and an opportunity to discuss DST’s information security measures, and a high level and non-confidential summary of any penetration testing related to the provision of in-scope services . DST shall review its Security Policy annually.

  • Operator’s Security Contact Information Xxxxxxx X. Xxxxxxx Named Security Contact xxxxxxxx@xxxxxxxxx.xxx Email of Security Contact (000) 000-0000 Phone Number of Security Contact

  • Security Cameras Security cameras have been installed throughout the Facility; however, they will not routinely be used in areas where there is an expectation of privacy, such as restrooms or patient care areas.

  • Security Coordinator Provider shall provide the name and contact information of Provider’s Security Coordinator for the Student Data received pursuant to the DPA.

  • Security Management The Contractor shall comply with the requirements of the DOD 5200.1-M and the DD Form 254. Security of the Contractor’s electronic media shall be in accordance with the above documents. Effective Program Security shall require the Contractor to address Information Security and Operations Security enabled by the Security Classification Guides. The Contractor’s facility must be able to handle and store material up to the Classification Level as referenced in Attachment J-01, DD Form 254.

  • Technical Security Controls 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.

  • Security Clearances A. The General Contractor is to supply the Court with names, dates of birth, and social security numbers of all employees who will be on site. This information must be submitted one (1) week prior to access to the site. The Court has final word on who will or who will not be allowed on the project premises.

  • Contractor Security Clearance Customers may designate certain duties and/or positions as positions of “special trust” because they involve special trust responsibilities, are located in sensitive locations, or have key capabilities with access to sensitive or confidential information. The designation of a special trust position or duties is at the sole discretion of the Customer. Contractor or Contractor’s employees and Staff who, in the performance of this Contract, will be assigned to work in positions determined by the Customer to be positions of special trust, may be required to submit to background screening and be approved by the Customer to work on this Contract.

  • Data Integrity Control Personal Data will remain intact, complete and current during processing activities.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!