Security Parameters Sample Clauses

Security Parameters. [Required for systems that allow users of one system to directly access the other system. Specify the security parameters that are exchanged among/between systems that authenticates that the requesting system is the legitimate system and that the class(es) of service being requested are approved by the ISA. For example, at the system level, if a new service such as E-mail is requested without prior coordination, it should be detected, refused, and documented as a possible intrusion until the interconnected service is authorized. Also, additional security parameters may be required (e.g., personal accountability) to allow the respondent system to determine whether a requestor is authorized to receive the information and/or services requested and whether all details of the transaction fall within the scope of user services authorized in the ISA.]
AutoNDA by SimpleDocs
Security Parameters. EGS and <<VENDOR SYSTEM>> use RESTful web services over HTTPS using most current NIST and Federal Government recommended versions of TLS to implement its system-to-system interface. The EGS system shall connect to the <<VENDOR SYSTEM>> system using the system- to-system interface.
Security Parameters. Data is exchanged using the latest secure connection protocol. SBA currently supports TLS 1.2 and 1.3.
Security Parameters. {Specify the security parameters exchanged between systems to authenticate that the requesting system is the legitimate system and that the class(es) of service requested is approved by the ISA. For example, at the system level, if a new service such as e-mail is requested without prior coordination, it should be detected, refused, and documented as a possible intrusion until the interconnected service is authorized. Also, additional security parameters may be required (e.g., personal accountability) to allow the respondent system to determine whether a requestor is authorized to receive the information and/or services requested and whether all details of the transaction fall with the scope of user services authorized by the ISA. Give the server names/directories and their full location. Examples to include are: encryption being used during transport; whether the data (including passwords) is encrypted in storage; type of connection (e.g. single VPN connection); etc.}
Security Parameters. All Parties are required to protect NMT’s systems and data in accordance with applicable statutory, regulatory and contractual compliance obligations; Provider shall establish procedures, supporting business processes and implement technical measures to ensure the continuity and availability of operations while operating in other-than-normal conditions; Unless otherwise protected by NMT-defined alternative physical safeguards, Provider must: Implement cryptographic mechanisms to prevent unauthorized disclosure of information;
Security Parameters. Interconnections will be used to transmit data between Members and the Network via secured data streams for the purposes specified in this Agreement. If an exchange not covered by this Agreement is detected without prior appropriate approval, it must be refused, and documented as a possible intrusion until the interconnected service is authorized. Also, additional security parameters may be required (e.g., personal accountability) to allow the respondent system to determine whether a requestor is authorized to receive the information and/or services requested and whether all details of the transaction fall within the scope of user services authorized in this Agreement.
Security Parameters. Credit card numbers, fixed log-in passwords, and other security parameters that can be used to gain access to goods or services, shall not be sent over the Internet in readable form. The SSL or SET encryption processes are both acceptable Internet encryption standards for the protection of security parameters. Other encryption processes, such as PGP, are permissible if approved by Gateway.
AutoNDA by SimpleDocs
Security Parameters. The following detailed security measures and controls implemented by each organization to protect the confidentiality, integrity, and availability of the connected systems and the information/data that will pass between them are outlined below; [VA Organization 1] implements the following security measures and controls: • Identification and Authentication - User Access control is managed by strong authentication method and must be assigned on the "Least Privilege" Principal. VA utilizes “two-factor authentication” for general users. A separate token and non-mail enabled account is required for users who require elevated privileges on IT systems. • Logical Access Controls - VA accounts are separated into domains and the system administrators only manage those accounts within their domain. Accounts are audited every ninety (90) days. VA policy requires account termination within twenty-four (24) hours of an employee/contractor departure. Accounts are terminated immediately in the event of a hostile termination. • Physical and Environmental Security - Physical and environmental controls are maintained at VA facilities. Badges are required for employees and contract staff. Access to networking closets and computer rooms require authorization from the facility Chief Information Officer (CIO) and a log is maintained. VA computer rooms are environmentally controlled for operation of the equipment is contains. This includes power; network; heating, ventilation, and air conditioning (HVAC); and fire suppression. • Firewall, IDS, and Encryption - Intrusion detection systems (IDS) are in place at gateways and throughout the VA network. The VA’s Network Security Operations Center monitors the VA network 24x7. Suspicious activity is reviewed and determined recommendations are formulated and assigned to the system administrators. FIPS 140-2 validated encryption is required for transmission of sensitive information. [Organization 2] implements the following security measures and controls: • Identification and Authentication - [Detailed description of policy] • Logical Access Controls - [Detailed description of policy] • Physical and Environmental Security - [Detailed description of policy] • Firewall, IDS, and Encryption - [Detailed description of policy as well as confirmation of properly configured firewalls.]

Related to Security Parameters

  • Authorization Required Prior to Parallel Operation 2.2.1 The NYISO, in consultation with the Connecting Transmission Owner, shall use Reasonable Efforts to list applicable parallel Operating Requirements in Attachment 5 of this Agreement. Additionally, the NYISO, in consultation with the Connecting Transmission Owner, shall notify the Interconnection Customer of any changes to these requirements as soon as they are known. The NYISO and Connecting Transmission Owner shall make Reasonable Efforts to cooperate with the Interconnection Customer in meeting requirements necessary for the Interconnection Customer to commence parallel operations by the in-service date. 2.2.2 The Interconnection Customer shall not operate its Small Generating Facility in parallel with the New York State Transmission System or the Distribution System without prior written authorization of the NYISO. The NYISO, in consultation with the Connecting Transmission Owner, will provide such authorization once the NYISO receives notification that the Interconnection Customer has complied with all applicable parallel Operating Requirements. Such authorization shall not be unreasonably withheld, conditioned, or delayed.

  • Registry Interoperability and Continuity Registry Operator shall comply with the Registry Interoperability and Continuity Specifications as set forth in Specification 6 attached hereto (“Specification 6”).

  • Prescription Safety Glasses Prescription safety glasses will be furnished by the employer. The employer retains the authority to establish reasonable rules and procedures regarding frequency of issue, replacement of damaged glasses, limits on reimbursement costs and coordination with the employer's vision plan.

  • Technical and Organisational Measures (1) Before the commencement of processing, the Supplier shall document the execution of the necessary Technical and Organisational Measures, set out in advance of the awarding of the Order or Contract, specifically with regard to the detailed execution of the contract, and shall present these documented measures to the Client for inspection. Upon acceptance by the Client, the documented measures become the foundation of the contract. Insofar as the inspection/audit by the Client shows the need for amendments, such amendments shall be implemented by mutual agreement. (2) The Supplier shall establish the security in accordance with Article 28 Paragraph 3 Point c, and Article 32 GDPR in particular in conjunction with Article 5 Paragraph 1, and Paragraph 2 GDPR. The measures to be taken are measures of data security and measures that guarantee a protection level appropriate to the risk concerning confidentiality, integrity, availability and resilience of the systems. The state of the art, implementation costs, the nature, scope and purposes of processing as well as the probability of occurrence and the severity of the risk to the rights and freedoms of natural persons within the meaning of Article 32 Paragraph 1 GDPR must be taken into account. [Details in Appendix 1] (3) The Technical and Organisational Measures are subject to technical progress and further development. In this respect, it is permissible for the Supplier to implement alternative adequate measures. In so doing, the security level of the defined measures must not be reduced. Substantial changes must be documented.

  • Security Protocols Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.

  • Attachment  C_ CONTRACT AFFIRMATIONS For purposes of these Contract Affirmations, HHS includes both the Health and Human Services Commission (HHSC) and the Department of State Health Services (DSHS). System Agency refers to HHSC, DSHS, or both, that will be a party to this Contract. These Contract Affirmations apply to all Contractors and Grantees (referred to as “Contractor”) regardless of their business form (e.g., individual, partnership, corporation). By entering into this Contract, Contractor affirms, without exception, understands, and agrees to comply with the following items through the life of the Contract:

  • DAF Specifications Developer shall submit initial specifications for the DAF, including System Protection Facilities, to Connecting Transmission Owner and NYISO at least one hundred eighty (180) Calendar Days prior to the Initial Synchronization Date; and final specifications for review and comment at least ninety (90) Calendar Days prior to the Initial Synchronization Date. Connecting Transmission Owner and NYISO shall review such specifications to ensure that the DAF are compatible with the technical specifications, operational control, and safety requirements of the Connecting Transmission Owner and NYISO and comment on such specifications within thirty (30) Calendar Days of Developer’s submission. All specifications provided hereunder shall be deemed to be Confidential Information.

  • STAFF ORIENTATION 4101 The Employer shall provide an appropriate orientation program for nurses newly employed. The orientation program shall include such essential information as policies, nursing procedures, the location of supplies and equipment, fire, safety and disaster plans. Where necessary, orientation shall be provided for nurses moving to a new area of practice. 4102 The Employer shall provide a program of inservice education for nurses pertinent to patient care. 4103 The Employer shall provide, access to reference materials as is required in relation to maintaining current knowledge of general nursing care. Licensed Practical Nurse 2015 Hourly 25.198 26.022 26.836 27.825 28.732 29.745 30.804 31.420 Monthly 4,231.164 4,369.528 4,506.212 4,672.281 4,824.582 4,994.681 5,172.505 5,275.942 Annual 50,773.970 52,434.330 54,074.540 56,067.375 57,894.980 59,936.175 62,070.060 63,311.300 Nurse II 2015 Hourly 32.917 34.066 35.218 36.419 37.593 38.811 39.587 Monthly 5,527.313 5,720.249 5,913.689 6,115.357 6,312.491 6,517.014 6,647.317 Annual 66,327.755 68,642.990 70,964.270 73,384.285 75,749.895 78,204.165 79,767.805 Nurse II (20 Year Scale) 2015 Hourly 33.575 34.747 35.923 37.148 38.345 39.587 Monthly 5,637.802 5,834.600 6,032.070 6,237.768 6,438.765 6,647.317 Annual 67,653.625 70,015.205 72,384.845 74,853.220 77,265.175 79,767.805 Nurse III 2015 Hourly 34.168 35.321 36.523 37.697 38.787 39.975 41.201 42.025 Monthly 5,737.377 5,930.985 6,132.820 6,329.955 6,512.984 6,712.469 6,918.335 7,056.698 Annual 68,848.520 71,171.815 73,593.845 75,959.455 78,155.805 80,549.625 83,020.015 84,680.375 Nurse III (20 Year Scale) 2015 Hourly 34.851 36.027 37.254 38.451 39.563 40.775 42.025 Monthly 5,852.064 6,049.534 6,255.568 6,456.564 6,643.287 6,846.802 7,056.698 Annual 70,224.765 72,594.405 75,066.810 77,478.765 79,719.445 82,161.625 84,680.375 Nurse IV 2015 Hourly 35.340 36.649 37.959 39.387 41.024 42.612 44.273 45.158 Monthly 5,934.175 6,153.978 6,373.949 6,613.734 6,888.613 7,155.265 7,434.175 7,582.781 Annual 71,210.100 73,847.735 76,487.385 79,364.805 82,663.360 85,863.180 89,210.095 90,993.370 Nurse IV (20 Year Scale) 2015 Hourly 36.047 37.382 38.718 40.175 41.844 43.464 45.158 Monthly 6,052.892 6,277.061 6,501.398 6,746.052 7,026.305 7,298.330 7,582.781 Annual 72,634.705 75,324.730 78,016.770 80,952.625 84,315.660 87,579.960 90,993.370 Nurse V 2015 Hourly 37.305 38.733 40.369 41.957 43.690 45.388 47.157 48.100 Monthly 6,264.131 6,503.916 6,778.628 7,045.280 7,336.279 7,621.402 7,918.446 8,076.792 Annual 75,169.575 78,046.995 81,343.535 84,543.355 88,035.350 91,456.820 95,021.355 96,921.500 Nurse V (20 Year Scale) 2015 Hourly 38.051 39.508 41.177 42.797 44.564 46.296 48.100 Monthly 6,389.397 6,634.052 6,914.305 7,186.330 7,483.038 7,773.870 8,076.792 Annual 76,672.765 79,608.620 82,971.655 86,235.955 89,796.460 93,286.440 96,921.500 Nurse Practitioner 2015 Hourly 42.515 45.635 47.511 49.385 51.408 52.437 Monthly 7,138.977 7,662.877 7,977.889 8,292.565 8,632.260 8,805.046 Annual 85,667.725 91,954.525 95,734.665 99,510.775 103,587.120 105,660.555 Nurse Practitioner (20 Year Scale) 2015 Hourly 43.365 46.548 48.461 50.373 52.437 Monthly 7,281.706 7,816.185 8,137.410 8,458.466 8,805.046 Annual 87,380.475 93,794.220 97,648.915 101,501.595 105,660.555 Weekend Worker - Licensed Practical Nurse 2015 Hourly 28.977 29.925 30.861 31.999 33.042 34.206 35.425 36.133 Monthly 4,865.721 5,024.906 5,182.076 5,373.165 5,548.303 5,743.758 5,948.448 6,067.333 Annual 58,388.655 60,298.875 62,184.915 64,477.985 66,579.630 68,925.090 71,381.375 72,807.995 Weekend Worker - Nurse II 2015 Hourly 37.855 39.176 40.501 41.882 43.232 44.633 45.526 Monthly 6,356.485 6,578.303 6,800.793 7,032.686 7,259.373 7,494.625 7,644.574 Annual 76,277.825 78,939.640 81,609.515 84,392.230 87,112.480 89,935.495 91,734.890 Weekend Worker - Nurse II (20 Year Scale) 2015 Hourly 38.612 39.959 41.311 42.720 44.097 45.526 Monthly 6,483.598 6,709.782 6,936.805 7,173.400 7,404.621 7,644.574 Annual 77,803.180 80,517.385 83,241.665 86,080.800 88,855.455 91,734.890 Weekend Worker - Nurse III 2015 Hourly 39.293 40.619 42.002 43.352 44.605 45.971 47.381 48.329 Monthly 6,597.950 6,820.607 7,052.836 7,279.523 7,489.923 7,719.297 7,956.060 8,115.245 Annual 79,175.395 81,847.285 84,634.030 87,354.280 89,879.075 92,631.565 95,472.715 97,382.935 Weekend Worker - Nurse III (20 Year Scale) 2015 Hourly 40.079 41.431 42.842 44.219 45.497 46.891 48.329 Monthly 6,729.932 6,956.955 7,193.886 7,425.107 7,639.705 7,873.780 8,115.245 Annual 80,759.185 83,483.465 86,326.630 89,101.285 91,676.455 94,485.365 97,382.935 Weekend Worker - Nurse IV 2015 Hourly 40.641 42.146 43.653 45.295 47.177 49.003 50.914 51.932 Monthly 6,824.301 7,077.016 7,330.066 7,605.785 7,921.805 8,228.420 8,549.309 8,720.248 Annual 81,891.615 84,924.190 87,960.795 91,269.425 95,061.655 98,741.045 102,591.710 104,642.980 Weekend Worker - Nurse IV (20 Year Scale) 2015 Hourly 41.454 42.989 44.526 46.201 48.121 49.983 51.932 Monthly 6,960.818 7,218.570 7,476.658 7,757.918 8,080.318 8,392.979 8,720.248 Annual 83,529.810 86,622.835 89,719.890 93,095.015 96,963.815 100,715.745 104,642.980 Weekend Worker - Nurse V 2015 Hourly 42.900 44.543 46.425 48.251 50.244 52.196 54.230 55.315 Monthly 7,203.625 7,479.512 7,795.531 8,102.147 8,436.805 8,764.578 9,106.121 9,288.310 Annual 86,443.500 89,754.145 93,546.375 97,225.765 101,241.660 105,174.940 109,273.450 111,459.725 Weekend Worker - Nurse V (20 Year Scale) 2015 Hourly 43.758 45.434 47.353 49.216 51.249 53.240 55.315 Monthly 7,347.698 7,629.126 7,951.358 8,264.187 8,605.561 8,939.883 9,288.310 Annual 88,172.370 91,549.510 95,416.295 99,170.240 103,266.735 107,278.600 111,459.725 1 Eligibility for the 20 Year increment is determined in accordance w ith Article 2105.

  • Service Specification The Parties have agreed upon the scope and specification of the Services provided under this Service Agreement in the Service Specification.

  • Technical Specifications The Technical Specifications furnished on the CD are intended to establish the standards for quality, performance and technical requirements for all labor, workmanship, material, methods and equipment necessary to complete the Work. When specifications and drawings are provided or referenced by the County, these are to be considered part of the Scope of Work, and to be specifically documented in the Detailed Scope of Work. For convenience, the County supplied specifications, if any, and the Technical Specifications furnished on the CD.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!