Safeguarding requirements and procedures (1) The Contractor shall apply the following basic safeguarding requirements and procedures to protect covered contractor information systems. Requirements and procedures for basic safeguarding of covered contractor information systems shall include, at a minimum, the following security controls: (i) Limit information system access to authorized users, processes acting on behalf of authorized users, or devices (including other information systems). (ii) Limit information system access to the types of transactions and functions that authorized users are permitted to execute. (iii) Verify and control/limit connections to and use of external information systems. (iv) Control information posted or processed on publicly accessible information systems. (v) Identify information system users, processes acting on behalf of users, or devices. (vi) Authenticate (or verify) the identities of those users, processes, or devices, as a prerequisite to allowing access to organizational information systems. (vii) Sanitize or destroy information system media containing Federal Contract Information before disposal or release for reuse. (viii) Limit physical access to organizational information systems, equipment, and the respective operating environments to authorized individuals. (ix) Escort visitors and monitor visitor activity; maintain audit logs of physical access; and control and manage physical access devices. (x) Monitor, control, and protect organizational communications (i.e., information transmitted or received by organizational information systems) at the external boundaries and key internal boundaries of the information systems. (xi) Implement subnetworks for publicly accessible system components that are physically or logically separated from internal networks. (xii) Identify, report, and correct information and information system flaws in a timely manner. (xiii) Provide protection from malicious code at appropriate locations within organizational information systems. (xiv) Update malicious code protection mechanisms when new releases are available. (xv) Perform periodic scans of the information system and real-time scans of files from external sources as files are downloaded, opened, or executed.
Security Requirements 7.1 The Authority will review the Contractor’s Security Plan when submitted by the Contractor in accordance with the Schedule (Security Requirements and Plan) and at least annually thereafter.
Endorsements and Procedures Company agrees to place on the backside of each Check processed for collection at the Bank through this Service a restrictively endorsement which reads “Mobile Deposit to Central Bank”, or words to that effect as satisfactory to Bank. Endorsements must be made on the back of the Check within 1&1/2 inches from the top edge, although Bank may accept endorsements outside this space. Any loss Bank incurs from a delay or processing error resulting from an irregular endorsement or other markings by Company will be Company’s responsibility. Bank may reject any Check payable to co-payees, even if Company is one of the payees listed on the face of the Check. Bank will consider, but is not obligated to accept, Check’s listing Company as one of the co-payees, provided a) the image of the Check presented to Bank under the Service contains the legible signature endorsement of all co-payees to the instrument, including Company; and b) contains a restrictive endorsement above the co-payees signatures which reads “Mobile Deposit to account of [Company’s full name]”. If Company is a sole proprietorship, Checks written as payable in the name of the individual owner of Company may be deposited to Company’s Account at Bank through this Service so long Checks are presented in compliance with the Service’s terms and conditions. Company agrees to comply with any and all other procedures and instructions for use of the Mobile Deposit Service as the Bank may establish from time to time, such as within any applicable Users Guide (the “Procedures”). Cut-off Times for Deposits: Deposits made via Mobile Deposit must be made before 7:00 PM Eastern Standard Time on a Business Day in order to be considered deposited same day. Deposits made after 7:00 PM Eastern Standard Time on a Business Day will be considered deposited the next Business Day. Receipt of Items: Bank reserves the right to reject any item transmitted through Mobile Deposit, at Bank’s discretion, without liability to Company. Bank shall not be responsible for items Bank does not receive or for Check images that are dropped during transmission. An image of an item shall be deemed received when Company receives a confirmation from Bank that we have received the image. Receipt of such confirmation does not mean the transmission was error free or complete. Processing and/or transmission errors can occur after Bank acknowledges receipt that may impact transaction completion. Following receipt of such confirmation, the Bank will process the image by preparing a “substitute check” or clearing the item as an image. Availability of Funds: Once deposited, subject to the cut-off time described above, our policy, in most cases, is to make funds from Company’s Check deposits available to Company on the second Business Day after the day Bank receives the Check in compliance with this Service, unless a different or longer time period is required under Company’s Account Rules and Regulations’ Funds Availability Policy or should Bank decide to apply a longer hold period due to Company’s history of repeated overdrafts or grounds that Bank reasonably believes affects the ultimate collectability of the Check. In all cases, Company will receive full availability of the funds memorialized in Checks accepted by Bank under this Service by the seventh Business Day after Bank accepts the Check for deposit. If Company’s Account has been open 30 days or less, however, Company may not receive full availability until the ninth Business Day after the day of deposit. Disposal of Transmitted Items: After Company receive confirmation that Bank has received and accepted an image of a Check under this Service, and once Company receive full credit for the Check as manifested in Company’s Account balance as communicated by Bank, Company must and shall prominently marking the original Check “VOID” and then destroying that same Check by cross-cut shredding or another commercially acceptable means of destruction. Destroying the Check prevents it from being presented for deposit another time. After destruction of the original Check, the image will be the sole evidence of the original instrument. Company agree that Company will never re-present the original check, nor give the original Check to anyone else for any purpose other than its destruction.
COMPLIANCE WITH POLICIES AND PROCEDURES During the period that Executive is employed with the Company hereunder, Executive shall adhere to the policies and standards of professionalism set forth in the policies and procedures of the Company and IAC as they may exist from time to time.
Compliance Policies and Procedures To assist the Fund in complying with Rule 38a-1 of the 1940 Act, BBH&Co. represents that it has adopted written policies and procedures reasonably designed to prevent violation of the federal securities laws in fulfilling its obligations under the Agreement and that it has in place a compliance program to monitor its compliance with those policies and procedures. BBH&Co will upon request provide the Fund with information about our compliance program as mutually agreed.
City Requirements Design, construction, materials, sizing, other specifications, permitting, inspections, testing, documentation and furnishing of as-built drawings, and acceptance of completed infrastructure shall be in accordance with City Requirements. Design and construction shall be by professionals licensed in the state of North Carolina to do the relevant work. City approval of the design of the Improvements shall be required prior to construction, as set forth in City Requirements. If Developer is connecting to the County sewer system, the City may require Developer to furnish the contract providing for such connection.
Safety Requirements Prior to setting sail the Operator of the Sector 43 Vessel shall detail and identify any vessel safety operating procedures and 44 other important information to the assigned ASM. The Sector Member 45 acknowledges that an ASM must complete a pre‐trip vessel safety checklist 46 as provided by NMFS prior to leaving port. An ASM cannot be deployed on 1 a vessel that has failed to review the safety issues, and such vessel is 2 prohibited from leaving port without the ASM on board (unless a waiver is 3 granted). For the safety of the vessels captain, crew and the ASM; the ASM 4 will not be allowed on deck any time that gear is being deployed. 5 6 The Sector and its Members note that each ASM must be provided with all 7 the equipment specified by the NEFOP. It is the responsibility of the 8 individual ASM and its employer to ensure that all equipment is in good
Administrative Claims Requirements and Procedures No suit or arbitration shall be brought arising out of this Agreement against City unless a claim has first been presented in writing and filed with City and acted upon by City in accordance with the procedures set forth in Chapter 1.34 of the Chula Vista Municipal Code, as same may be amended, the provisions of which, including such policies and procedures used by City in the implementation of same, are incorporated herein by this reference. Upon request by City, Consultant shall meet and confer in good faith with City for the purpose of resolving any dispute over the terms of this Agreement.
Data Security Requirements Without limiting Contractor’s obligation of confidentiality as further described in this Contract, Contractor must establish, maintain, and enforce a data privacy program and an information and cyber security program, including safety, physical, and technical security and resiliency policies and procedures, that comply with the requirements set forth in this Contract and, to the extent such programs are consistent with and not less protective than the requirements set forth in this Contract and are at least equal to applicable best industry practices and standards (NIST 800-53).
Personnel Requirements and Documentation Grantee will; 1. maintain current personnel documentation on each employee. All documents must be factual and accurate. Health-related information must be stored separately with restricted access as appropriate under Tex. Gov. Code §552.102. Training records may be stored separately from the main personnel file but must be easily accessible upon request. Required documentation includes the following, as applicable: i. A copy of the current job description signed by the employee; ii. Application or resume with documentation of required qualifications and verification of required credentials; iii. Verification of work experience; iv. Annual performance evaluations; v. Personnel data that includes date hired, rate of pay, and documentation of all pay increases and bonuses; vi. Documentation of appropriate screening and/or background checks, to include probation or parole documentation; vii. Signed documentation of initial and other required training; and viii. Records of any disciplinary actions. 2. document authentication must include signature, credentials when applicable, and date. If the document relates to past activity, the date of the activity must also be recorded. Documentation must be permanent and legible. When it is necessary to correct a required document, the error must be marked through with a single line, dated, and initialed by the writer.