{"component": "clause", "props": {"groups": [{"snippet": "A. Contractor shall, with respect to all employees of Contractor performing services hereunder:\n1. Perform background checks as to past employment history.\n2. Inquire as to past criminal felony convictions.\n3. Ascertain that those employees who are required to drive in the course of performing services hereunder have valid California driver\u2019s licenses and no DUI convictions within two (2) years prior to commencement of services hereunder.\n4. Perform drug screening to determine that such employees are not users of illegal controlled substances as defined by federal law.\nB. Contractor shall not assign to County property any Contractor personnel as to whom the foregoing procedures indicate:\n1. Inability or unwillingness to perform in a competent manner.\n2. Past criminal convictions for theft, burglary or conduct causing property damage or mental or physical harm to persons.\n3. Where such employee\u2019s duties include driving a vehicle, absence of a valid California driver\u2019s license or a DUI conviction within the prior two (2) years.\n4. Usage of illegal controlled substances as defined by federal law.\nC. If any of the problems identified with respect to Contractor\u2019s employees are discovered after assignment of an employee to County property, or if County otherwise reasonably deems an assigned employee unacceptable, Contractor shall remove and replace such employee at the County property.\nD. Nothing herein shall render any employee of Contractor an employee of County. THE CONTRACTOR\u2019S PERSONNEL REQUIREMENTS: All employees must pass the County\u2019s background check and meet all requirements as set forth below:\n1. All personnel to be employed in performance of the work under this Contract shall be subject to security clearance. Clearance must be updated and renewed every twelve (12) months from original date of clearance.\n2. No person, who is required to enter a secured facility of the Sheriff, shall be assigned to perform work under this contract that has not received prior clearance from the Sheriff-Coroner Department.\n3. Within fifteen (15) days of the effective date of this Contract, Contractor shall prepare and submit a complete and accurate \u201cContractor Security Clearance\u201d information form for all Contractor\u2019s employee who will be working on or who will need access to the Sheriff-Coroner\u2019s facilities to perform work covered by this Contract. County project manager shall provide form(s) to Contractor\u2019s project manager. Contractor is also responsible for ensuring that anytime an employee is assigned to work on Sheriff-Coroner\u2019s facilities under this contract that a Security Clearance form is submitted and approved prior to that employee requiring access to such premises for providing services under this contract.\n4. Contractor shall inform employees assigned to perform work within secured facilities of the Sheriff-Coroner that the employee is required to inform Contractor if/when any information provided on the security clearance form changes. Contractor shall submit an updated security clearance form whenever there is a change in information provided by an employee. Contractor shall be responsible for ensuring to submit Security Clearance forms in order to renew the Security Clearance(s) every twelve months. Renewal forms shall be submitted at least ten", "size": 33, "snippet_links": [{"key": "contractor-shall", "type": "clause", "offset": [3, 19]}, {"key": "with-respect-to", "type": "clause", "offset": [21, 36]}, {"key": "employees-of-contractor", "type": "clause", "offset": [41, 64]}, {"key": "performing-services", "type": "definition", "offset": [65, 84]}, {"key": "background-checks", "type": "clause", "offset": [107, 124]}, {"key": "employment-history", "type": "clause", "offset": [136, 154]}, {"key": "felony-convictions", "type": "clause", "offset": [187, 205]}, {"key": "employees-who", "type": "clause", "offset": [231, 244]}, {"key": "in-the-course-of", "type": "definition", "offset": [267, 283]}, {"key": "commencement-of-services", "type": "clause", "offset": [407, 431]}, {"key": "drug-screening", "type": "definition", "offset": [454, 468]}, {"key": "to-determine", "type": "clause", "offset": [469, 481]}, {"key": "controlled-substances", "type": "clause", "offset": [527, 548]}, {"key": "federal-law", "type": "definition", "offset": [563, 574]}, {"key": "county-property", "type": "definition", "offset": [610, 625]}, {"key": "contractor-personnel", "type": "definition", "offset": [630, 650]}, {"key": "the-foregoing", "type": "clause", "offset": [662, 675]}, {"key": "criminal-convictions", "type": "definition", "offset": [769, 789]}, {"key": "property-damage", "type": "definition", "offset": [829, 844]}, {"key": "physical-harm-to-persons", "type": "definition", "offset": [858, 882]}, {"key": "duties-include", "type": "clause", "offset": [909, 923]}, {"key": "to-contractor", "type": "clause", "offset": [1161, 1174]}, {"key": "assignment-of", "type": "clause", "offset": [1208, 1221]}, {"key": "an-employee", "type": "definition", "offset": [1222, 1233]}, {"key": "assigned-employee", "type": "definition", "offset": [1297, 1314]}, {"key": "the-county", "type": "definition", "offset": [1382, 1392]}, {"key": "any-employee", "type": "clause", "offset": [1434, 1446]}, {"key": "of-county", "type": "clause", "offset": [1473, 1482]}, {"key": "the-contractor", "type": "clause", "offset": [1484, 1498]}, {"key": "personnel-requirements", "type": "clause", "offset": [1501, 1523]}, {"key": "employees-must", "type": "clause", "offset": [1529, 1543]}, {"key": "all-requirements", "type": "clause", "offset": [1588, 1604]}, {"key": "all-personnel", "type": "clause", "offset": [1628, 1641]}, {"key": "performance-of-the-work", "type": "clause", "offset": [1660, 1683]}, {"key": "under-this-contract", "type": "clause", "offset": [1684, 1703]}, {"key": "subject-to", "type": "definition", "offset": [1713, 1723]}, {"key": "original-date", "type": "definition", "offset": [1812, 1825]}, {"key": "no-person", "type": "definition", "offset": [1843, 1852]}, {"key": "to-enter", "type": "definition", "offset": [1870, 1878]}, {"key": "secured-facility", "type": "clause", "offset": [1881, 1897]}, {"key": "effective-date-of-this-contract", "type": "definition", "offset": [2078, 2109]}, {"key": "complete-and-accurate", "type": "clause", "offset": [2149, 2170]}, {"key": "contractor-security-clearance", "type": "definition", "offset": [2172, 2201]}, {"key": "information-form", "type": "clause", "offset": [2203, 2219]}, {"key": "access-to-the", "type": "clause", "offset": [2290, 2303]}, {"key": "covered-by", "type": "definition", "offset": [2349, 2359]}, {"key": "county-project-manager", "type": "definition", "offset": [2375, 2397]}, {"key": "responsible-for", "type": "clause", "offset": [2472, 2487]}, {"key": "work-on", "type": "definition", "offset": [2537, 2544]}, {"key": "clearance-form", "type": "definition", "offset": [2610, 2624]}, {"key": "providing-services", "type": "clause", "offset": [2712, 2730]}, {"key": "employees-assigned", "type": "clause", "offset": [2779, 2797]}, {"key": "secured-facilities", "type": "definition", "offset": [2821, 2839]}, {"key": "the-employee", "type": "clause", "offset": [2868, 2880]}, {"key": "the-security", "type": "clause", "offset": [2950, 2962]}, {"key": "information-provided-by", "type": "clause", "offset": [3076, 3099]}, {"key": "be-responsible", "type": "clause", "offset": [3130, 3144]}, {"key": "to-submit", "type": "definition", "offset": [3158, 3167]}, {"key": "in-order-to", "type": "clause", "offset": [3193, 3204]}, {"key": "twelve-months", "type": "clause", "offset": [3243, 3256]}], "samples": [{"hash": "fEtRdfmlqHm", "uri": "/contracts/fEtRdfmlqHm#security-requirements", "label": "Helicopter Maintenance Services Contract", "score": 33.3246459961, "published": true}, {"hash": "dKZeNXPxoqQ", "uri": "/contracts/dKZeNXPxoqQ#security-requirements", "label": "Contract Ma 060 22010038", "score": 32.9876022339, "published": true}, {"hash": "diCOn9NbkmE", "uri": "/contracts/diCOn9NbkmE#security-requirements", "label": "Fire Protection Systems Maintenance Service Contract", "score": 32.2023239136, "published": true}], "hash": "a1722b1ad3b66e2a8f615ff456199d44", "id": 5}, {"snippet": "The Supplier shall comply, and shall procure the compliance of the Staff, with the Security Policy and the Security Management Plan (if any) and the Supplier shall ensure that the Security Management Plan produced by the Supplier fully complies with the Security Policy. The Customer shall notify the Supplier of any changes or proposed changes to the Security Policy. If the Supplier believes that a change or proposed change to the Security Policy will have a material and unavoidable cost implication to the provision of the Goods and/or Services it may notify the Customer. In doing so, the Supplier must support its request by providing evidence of the cause of any increased costs and the steps that it has taken to mitigate those costs. Any change to the Call Off Contract Charges shall then be subject to the Variation Procedure. Until and/or unless a change to the Call Off Contract Charges is agreed by the Customer pursuant to the Variation Procedure the Supplier shall continue to provide the Goods and/or Services in accordance with its existing obligations.", "size": 71, "snippet_links": [{"key": "the-supplier-shall", "type": "clause", "offset": [0, 18]}, {"key": "security-policy", "type": "definition", "offset": [83, 98]}, {"key": "security-management-plan", "type": "definition", "offset": [107, 131]}, {"key": "the-customer-shall", "type": "clause", "offset": [271, 289]}, {"key": "notify-the", "type": "clause", "offset": [290, 300]}, {"key": "changes-to-the", "type": "definition", "offset": [337, 351]}, {"key": "if-the-supplier", "type": "clause", "offset": [369, 384]}, {"key": "a-change", "type": "clause", "offset": [399, 407]}, {"key": "change-to", "type": "definition", "offset": [420, 429]}, {"key": "goods-and-or-services", "type": "definition", "offset": [528, 549]}, {"key": "the-supplier-must", "type": "clause", "offset": [591, 608]}, {"key": "evidence-of", "type": "clause", "offset": [642, 653]}, {"key": "increased-costs", "type": "clause", "offset": [671, 686]}, {"key": "to-mitigate", "type": "definition", "offset": [719, 730]}, {"key": "any-change", "type": "definition", "offset": [744, 754]}, {"key": "call-off-contract-charges", "type": "definition", "offset": [762, 787]}, {"key": "subject-to-the", "type": "definition", "offset": [802, 816]}, {"key": "variation-procedure", "type": "definition", "offset": [817, 836]}, {"key": "by-the-customer", "type": "clause", "offset": [910, 925]}, {"key": "pursuant-to-the", "type": "definition", "offset": [926, 941]}, {"key": "provide-the", "type": "clause", "offset": [993, 1004]}, {"key": "in-accordance-with", "type": "definition", "offset": [1027, 1045]}, {"key": "existing-obligations", "type": "clause", "offset": [1050, 1070]}], "samples": [{"hash": "6pFwjqZAe5J", "uri": "/contracts/6pFwjqZAe5J#security-requirements", "label": "Call Off Contract", "score": 25.4811763763, "published": true}, {"hash": "4yY0Cvukfx2", "uri": "/contracts/4yY0Cvukfx2#security-requirements", "label": "Call Off Contract", "score": 25.4305267334, "published": true}, {"hash": "1Q78Cqi88bU", "uri": "/contracts/1Q78Cqi88bU#security-requirements", "label": "Call Off Contract", "score": 25.4182071686, "published": true}], "hash": "e8e5f48828a0e9af8f82d798b6cbf08a", "id": 2}, {"snippet": "20.1.1 The Supplier shall comply, and shall procure the compliance of the Staff, with the Security Policy and the Security Management Plan and the Supplier shall ensure that the Security Management Plan produced by the Supplier fully complies with the Security Policy.\n20.1.2 The Customer shall notify the Supplier of any changes or proposed changes to the Security Policy.\n20.1.3 If the Supplier believes that a change or proposed change to the Security Policy will have a material and unavoidable cost implication to the provision of the Services it may notify the Customer. In doing so, the Supplier must support its request by providing evidence of the cause of any increased costs and the steps that it has taken to mitigate those costs. Any change to the Contract Charges shall then be agreed in accordance with the procedure set out in clause 36.\n20.1.4 Until and/or unless a change to the Contract Charges is agreed by the Customer pursuant to clauses 20.1.2 and 20.1.3 the Supplier shall continue to perform the Services and/or provide the Goods in accordance with its existing obligations.", "size": 33, "snippet_links": [{"key": "the-supplier-shall", "type": "clause", "offset": [7, 25]}, {"key": "security-policy", "type": "definition", "offset": [90, 105]}, {"key": "security-management-plan", "type": "definition", "offset": [114, 138]}, {"key": "the-customer-shall", "type": "clause", "offset": [276, 294]}, {"key": "notify-the", "type": "clause", "offset": [295, 305]}, {"key": "changes-to-the", "type": "definition", "offset": [342, 356]}, {"key": "if-the-supplier", "type": "clause", "offset": [381, 396]}, {"key": "a-change", "type": "clause", "offset": [411, 419]}, {"key": "change-to", "type": "definition", "offset": [432, 441]}, {"key": "the-provision-of-the-services", "type": "clause", "offset": [519, 548]}, {"key": "the-supplier-must", "type": "clause", "offset": [590, 607]}, {"key": "evidence-of", "type": "clause", "offset": [641, 652]}, {"key": "increased-costs", "type": "clause", "offset": [670, 685]}, {"key": "to-mitigate", "type": "definition", "offset": [718, 729]}, {"key": "any-change", "type": "definition", "offset": [743, 753]}, {"key": "contract-charges", "type": "clause", "offset": [761, 777]}, {"key": "in-accordance-with", "type": "definition", "offset": [799, 817]}, {"key": "the-procedure", "type": "definition", "offset": [818, 831]}, {"key": "set-out", "type": "definition", "offset": [832, 839]}, {"key": "in-clause", "type": "clause", "offset": [840, 849]}, {"key": "by-the-customer", "type": "clause", "offset": [924, 939]}, {"key": "pursuant-to-clauses", "type": "clause", "offset": [940, 959]}, {"key": "continue-to-perform", "type": "clause", "offset": [997, 1016]}, {"key": "the-goods", "type": "definition", "offset": [1045, 1054]}, {"key": "existing-obligations", "type": "clause", "offset": [1078, 1098]}], "samples": [{"hash": "ckAWMky0bbJ", "uri": "/contracts/ckAWMky0bbJ#security-requirements", "label": "Framework Agreement", "score": 23.0410671234, "published": true}, {"hash": "3vEwNdkuD69", "uri": "/contracts/3vEwNdkuD69#security-requirements", "label": "Framework Agreement", "score": 22.9411354065, "published": true}, {"hash": "htjHySxH9EX", "uri": "/contracts/htjHySxH9EX#security-requirements", "label": "Framework Agreement", "score": 22.8877487183, "published": true}], "hash": "30794afd5123dc3a843bb900196c46e6", "id": 6}, {"snippet": "7.1 The Authority will review the Contractor\u2019s Security Plan when submitted by the Contractor in accordance with the Schedule (Security Requirements and Plan) and at least annually thereafter.", "size": 133, "snippet_links": [{"key": "the-authority-will", "type": "clause", "offset": [4, 22]}, {"key": "security-plan", "type": "clause", "offset": [47, 60]}, {"key": "by-the-contractor", "type": "clause", "offset": [76, 93]}, {"key": "in-accordance-with", "type": "definition", "offset": [94, 112]}, {"key": "the-schedule", "type": "clause", "offset": [113, 125]}, {"key": "security-requirements-and-plan", "type": "clause", "offset": [127, 157]}], "samples": [{"hash": "j5vsbD9cyX5", "uri": "/contracts/j5vsbD9cyX5#security-requirements", "label": "Provision of Services Agreement", "score": 26.5414104462, "published": true}, {"hash": "4VncJcprUq7", "uri": "/contracts/4VncJcprUq7#security-requirements", "label": "Support Agreement", "score": 26.5318279266, "published": true}, {"hash": "zQBlZNz36p", "uri": "/contracts/zQBlZNz36p#security-requirements", "label": "Employability Support Programme Agreement", "score": 26.5304584503, "published": true}], "hash": "887d0e03648f616bfaebfe74739c1dfa", "id": 1}, {"snippet": "16 32.1.1 CONTRACTOR agrees to maintain the confidentiality of all COUNTY and 17 COUNTY-related records and information pursuant to all statutory laws relating to privacy and 18 confidentiality that currently exists or exists at any time during the term of this Agreement.", "size": 32, "snippet_links": [{"key": "to-maintain", "type": "clause", "offset": [28, 39]}, {"key": "records-and-information", "type": "clause", "offset": [96, 119]}, {"key": "pursuant-to", "type": "clause", "offset": [120, 131]}, {"key": "relating-to", "type": "definition", "offset": [151, 162]}, {"key": "privacy-and", "type": "definition", "offset": [163, 174]}, {"key": "at-any-time", "type": "clause", "offset": [226, 237]}, {"key": "during-the-term-of-this-agreement", "type": "clause", "offset": [238, 271]}], "samples": [{"hash": "4t4bjxdSRkV", "uri": "/contracts/4t4bjxdSRkV#security-requirements", "label": "Family Resource Center Services Agreement", "score": 28.224067688, "published": true}, {"hash": "A6ZBuVlu7v", "uri": "/contracts/A6ZBuVlu7v#security-requirements", "label": "Group Home Services Agreement", "score": 26.7896881104, "published": true}, {"hash": "9OOmYv9t9Rj", "uri": "/contracts/9OOmYv9t9Rj#security-requirements", "label": "Group Home Services Agreement", "score": 26.7896881104, "published": true}], "hash": "abbb93e8cd0a144f6701e7ebe683ad9c", "id": 7}, {"snippet": "CONTRACTOR agrees to maintain the confidentiality of all COUNTY and COUNTY-related records and information pursuant to all statutory laws relating to privacy and confidentiality that currently exists or exists at any time during the term of this Agreement. CONTRACTOR represents and warrants that it has implemented and will maintain during the term of this Agreement administrative, physical, and technical safeguards to reasonably protect private and confidential client information, to protect against anticipated threats to the security or integrity of COUNTY data, and to protect against unauthorized physical or electronic access to or use of COUNTY data. Such safeguards and controls shall include at a minimum: Storage of confidential paper files that ensures records are secured, handled, transported, and destroyed in a manner that prevents unauthorized access. Control of access to physical and electronic records to ensure COUNTY data is accessed only by individuals with a need to know for the delivery of contract services. Control to prevent unauthorized access and to prevent CONTRACTOR employees from providing COUNTY data to unauthorized individuals. Firewall protection. Use of encryption methods of electronic COUNTY data while in transit from CONTRACTOR networks to external networks, when applicable. Measures to securely store all COUNTY data, including, but not be limited to, encryption at rest and multiple levels of authentication and measures to ensure COUNTY data shall not be altered or corrupted without COUNTY's prior written consent. CONTRACTOR further represents and warrants that it has implemented and will maintain during the term of this Agreement administrative, technical, and physical safeguards and controls consistent with State and federal security requirements.", "size": 31, "snippet_links": [{"key": "to-maintain", "type": "clause", "offset": [18, 29]}, {"key": "county-and-county", "type": "definition", "offset": [57, 74]}, {"key": "records-and-information", "type": "clause", "offset": [83, 106]}, {"key": "pursuant-to", "type": "clause", "offset": [107, 118]}, {"key": "relating-to", "type": "definition", "offset": [138, 149]}, {"key": "privacy-and-confidentiality", "type": "clause", "offset": [150, 177]}, {"key": "at-any-time", "type": "clause", "offset": [210, 221]}, {"key": "during-the-term-of-this-agreement", "type": "clause", "offset": [222, 255]}, {"key": "represents-and-warrants-that-it", "type": "clause", "offset": [268, 299]}, {"key": "technical-safeguards", "type": "clause", "offset": [398, 418]}, {"key": "confidential-client-information", "type": "clause", "offset": [453, 484]}, {"key": "the-security", "type": "clause", "offset": [528, 540]}, {"key": "county-data", "type": "definition", "offset": [557, 568]}, {"key": "access-to", "type": "clause", "offset": [629, 638]}, {"key": "unauthorized-access", "type": "definition", "offset": [851, 870]}, {"key": "control-of-access", "type": "definition", "offset": [872, 889]}, {"key": "electronic-records", "type": "clause", "offset": [906, 924]}, {"key": "to-ensure", "type": "clause", "offset": [925, 934]}, {"key": "need-to-know", "type": "clause", "offset": [986, 998]}, {"key": "contract-services", "type": "definition", "offset": [1019, 1036]}, {"key": "contractor-employees", "type": "clause", "offset": [1092, 1112]}, {"key": "firewall-protection", "type": "clause", "offset": [1169, 1188]}, {"key": "from-contractor", "type": "clause", "offset": [1259, 1274]}, {"key": "external-networks", "type": "definition", "offset": [1287, 1304]}, {"key": "when-applicable", "type": "clause", "offset": [1306, 1321]}, {"key": "measures-to", "type": "clause", "offset": [1323, 1334]}, {"key": "encryption-at-rest", "type": "clause", "offset": [1401, 1419]}, {"key": "prior-written-consent", "type": "clause", "offset": [1544, 1565]}, {"key": "physical-safeguards", "type": "definition", "offset": [1717, 1736]}, {"key": "state-and-federal", "type": "definition", "offset": [1766, 1783]}], "samples": [{"hash": "kj95AeS86r6", "uri": "/contracts/kj95AeS86r6#security-requirements", "label": "Consultation Services Agreement", "score": 30.1985702515, "published": true}, {"hash": "fIwJEBlcY3n", "uri": "/contracts/fIwJEBlcY3n#security-requirements", "label": "Early Childhood Education Services Agreement", "score": 28.8057365417, "published": true}, {"hash": "idWZ9cDZVjQ", "uri": "/contracts/idWZ9cDZVjQ#security-requirements", "label": "Agreement for the Provision of Services", "score": 28.0743732452, "published": true}], "hash": "8cb5009699035eeae7893a85be59658b", "id": 8}, {"snippet": "8.1 The County operates several secured facilities: most notable are several Probation, Sheriff and Airport operated sites. Contractors and their employees who perform services in these facilities will be required to strict operation policies and may be required to pass a background check prior to their employment due to security requirements for certain facilities covered under this Contract. During performance of the work, especially at detention facilities, workers shall closely monitor all tools, equipment and other materials at all times. Workers shall have no contact verbal or physical, with any inmate of these facilities. These policies have been designed with the primary purpose of ensuring a safe and secure environment for all involved.\n8.2 The Contractor will provide a list of all personnel/employees who will be directly performing tasks associated with the Contract. Contractor\u2019s personnel/employees providing service in a secured detention facility, a Probation facility or a Sheriff\u2019s facility, will be expected to pass two (2) separate background checks performed by the Orange County Sheriff\u2019s Department and the Orange County Probation Department. No changes shall be authorized to the approved list without a request in writing submitted by the Contractor and approved by the County Site Coordinator. At no time will unauthorized Contractor employees perform any task associated with this Contract. If this occurs, the Contractor will be notified that they have not complied with the terms of this Contract and are subject to Contract termination. The list of all Personnel/Employees working on County projects shall be submitted prior to award of this Contract.\n8.2.1 Contractor shall prepare and submit a Security Clearance form to the County Site Coordinator for all persons who will be working on or who will need access to secured facilities.\n8.2.2 Security Clearance forms shall be submitted at least five (5) working days prior to the start of work or prior to the use of any person subsequent to the start of work.\n8.2.3 Said Security Clearance forms shall be thoroughly and accurately complete. Omissions or false statements, regardless of the nature or magnitude, may be grounds for denying clearance.\n8.2.4 No person shall be employed on this work who has not received prior clearance from the Probation Department, Sheriff\u2019s Department or \u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587 Airport (JWA).\n8.2.5 The County, JWA, the Probation Department and the Sheriff\u2019s Department are not under any obligation to give a reason clearance is denied.\n8.3 The Contractor shall be responsible to sign in with the County Site Coordinator or designee, as required. Upon arrival at any secure facility (e.g., JWA, Probation) the Contractor shall report to the Central Control Center (Control). Contractor personnel shall have no contact, either verbal or physical, with internees in secured detention facilities.", "size": 29, "snippet_links": [{"key": "secured-facilities", "type": "definition", "offset": [32, 50]}, {"key": "employees-who", "type": "clause", "offset": [146, 159]}, {"key": "perform-services", "type": "clause", "offset": [160, 176]}, {"key": "requirements-for", "type": "clause", "offset": [332, 348]}, {"key": "facilities-covered", "type": "definition", "offset": [357, 375]}, {"key": "under-this-contract", "type": "clause", "offset": [376, 395]}, {"key": "performance-of-the-work", "type": "clause", "offset": [404, 427]}, {"key": "detention-facilities", "type": "definition", "offset": [443, 463]}, {"key": "equipment-and-other-materials", "type": "clause", "offset": [506, 535]}, {"key": "at-all-times", "type": "definition", "offset": [536, 548]}, {"key": "no-contact", "type": "clause", "offset": [569, 579]}, {"key": "purpose-of", "type": "clause", "offset": [688, 698]}, {"key": "secure-environment", "type": "clause", "offset": [719, 737]}, {"key": "a-list", "type": "definition", "offset": [788, 794]}, {"key": "all-personnel", "type": "clause", "offset": [798, 811]}, {"key": "associated-with", "type": "definition", "offset": [860, 875]}, {"key": "providing-service", "type": "clause", "offset": [923, 940]}, {"key": "detention-facility", "type": "definition", "offset": [954, 972]}, {"key": "background-checks", "type": "clause", "offset": [1062, 1079]}, {"key": "performed-by", "type": "clause", "offset": [1080, 1092]}, {"key": "county-sheriff", "type": "definition", "offset": [1104, 1118]}, {"key": "probation-department", "type": "definition", "offset": [1154, 1174]}, {"key": "no-changes", "type": "clause", "offset": [1176, 1186]}, {"key": "approved-list", "type": "definition", "offset": [1214, 1227]}, {"key": "request-in-writing", "type": "clause", "offset": [1238, 1256]}, {"key": "by-the-contractor", "type": "clause", "offset": [1267, 1284]}, {"key": "by-the-county", "type": "clause", "offset": [1298, 1311]}, {"key": "site-coordinator", "type": "definition", "offset": [1312, 1328]}, {"key": "contractor-employees", "type": "clause", "offset": [1359, 1379]}, {"key": "terms-of-this-contract", "type": "clause", "offset": [1513, 1535]}, {"key": "contract-termination", "type": "clause", "offset": [1555, 1575]}, {"key": "employees-working", "type": "clause", "offset": [1603, 1620]}, {"key": "clearance-form", "type": "definition", "offset": [1745, 1759]}, {"key": "to-the-county", "type": "definition", "offset": [1760, 1773]}, {"key": "access-to", "type": "clause", "offset": [1847, 1856]}, {"key": "prior-to-the", "type": "clause", "offset": [1958, 1970]}, {"key": "start-of-work", "type": "definition", "offset": [1971, 1984]}, {"key": "any-person", "type": "clause", "offset": [2008, 2018]}, {"key": "subsequent-to-the", "type": "clause", "offset": [2019, 2036]}, {"key": "false-statements", "type": "clause", "offset": [2146, 2162]}, {"key": "the-nature", "type": "clause", "offset": [2178, 2188]}, {"key": "no-person-shall", "type": "clause", "offset": [2247, 2262]}, {"key": "department-or", "type": "definition", "offset": [2366, 2379]}, {"key": "obligation-to", "type": "clause", "offset": [2501, 2514]}, {"key": "the-contractor-shall", "type": "clause", "offset": [2554, 2574]}, {"key": "responsible-to", "type": "clause", "offset": [2578, 2592]}, {"key": "as-required", "type": "clause", "offset": [2647, 2658]}, {"key": "upon-arrival", "type": "clause", "offset": [2660, 2672]}, {"key": "secure-facility", "type": "definition", "offset": [2680, 2695]}, {"key": "report-to", "type": "clause", "offset": [2740, 2749]}, {"key": "central-control-center", "type": "clause", "offset": [2754, 2776]}, {"key": "contractor-personnel", "type": "definition", "offset": [2788, 2808]}], "samples": [{"hash": "2i0P9qXsvKk", "uri": "/contracts/2i0P9qXsvKk#security-requirements", "label": "Security Services Agreement", "score": 28.2759227753, "published": true}, {"hash": "26IlwZvhcPw", "uri": "/contracts/26IlwZvhcPw#security-requirements", "label": "Security Services Agreement", "score": 27.2986831665, "published": true}, {"hash": "3S8EK2X1yk3", "uri": "/contracts/3S8EK2X1yk3#security-requirements", "label": "Agreement Ma 027 15011568", "score": 27.2849960327, "published": true}], "hash": "d1e54329daaef3986cfdbb75b7bb92a1", "id": 10}, {"snippet": "The Contractor must maintain the most up-to-date anti-virus programs, industry-accepted firewalls and other protections on its systems and networking equipment. The Contractor certifies that all systems and networking equipment that support, interact with or store County Information meet the above standards and industry best practices for physical, network and system security requirements. Devices (laptops, mobile phones, printers, copiers, fax machines, or similar) that store County Data utilize encryption. The County\u2019s Chief Information Security Officer or designee must approve any deviation from these standards. The downloading of County information onto devices, other portable storage media or services such as personal e-mail, Dropbox etc. is prohibited without the written authorization of the County\u2019s Chief Information Security Officer or designee.", "size": 35, "snippet_links": [{"key": "the-contractor-must", "type": "clause", "offset": [0, 19]}, {"key": "other-protections", "type": "clause", "offset": [102, 119]}, {"key": "county-information", "type": "clause", "offset": [265, 283]}, {"key": "industry-best-practices", "type": "clause", "offset": [313, 336]}, {"key": "system-security-requirements", "type": "clause", "offset": [363, 391]}, {"key": "mobile-phones", "type": "clause", "offset": [411, 424]}, {"key": "fax-machines", "type": "clause", "offset": [445, 457]}, {"key": "county-data", "type": "definition", "offset": [482, 493]}, {"key": "the-county", "type": "definition", "offset": [514, 524]}, {"key": "chief-information-security-officer", "type": "definition", "offset": [527, 561]}, {"key": "of-county", "type": "clause", "offset": [639, 648]}, {"key": "storage-media", "type": "definition", "offset": [690, 703]}, {"key": "written-authorization", "type": "definition", "offset": [780, 801]}], "samples": [{"hash": "iHVH7jiTSBS", "uri": "/contracts/iHVH7jiTSBS#security-requirements", "label": "Contract Agreement", "score": 33.1758422852, "published": true}, {"hash": "afFDhgTprKs", "uri": "/contracts/afFDhgTprKs#security-requirements", "label": "Contract Agreement", "score": 31.523147583, "published": true}, {"hash": "iO0kLUhgI95", "uri": "/contracts/iO0kLUhgI95#security-requirements", "label": "Contract Agreement", "score": 31.4614448547, "published": true}], "hash": "3a95e0565d0dea856d91381b1d561a65", "id": 4}, {"snippet": "11.1 The Supplier shall comply, and shall procure the compliance of the Suppliers Personnel, with the Security Policy and the Security Plan and the Supplier shall ensure that the Security Plan produced by the Supplier fully complies with the Security Policy.\n11.2 DFID\u2019s Security Policy can be accessed on the DFID website at \u2587\u2587\u2587\u2587://\u2587\u2587\u2587.\u2587\u2587\u2587\u2587.\u2587\u2587\u2587.\u2587\u2587/work- with-us/procurement/dfid-information-security-policy-for-contractorsconsultants/ or as notified to the Supplier from time to time. The Supplier shall ensure that they keep up to date with the latest version of the Security Policy on this website.\n11.3 If the Supplier believes that a change to the Security Policy will have a material and unavoidable cost implication to the Services it may submit a Change Request. In doing so, the Supplier must support its request by providing evidence of the cause of any increased costs and the steps that it has taken to mitigate those costs. Any change to the Charges shall then be agreed in discussion with the Contract Officer.", "size": 60, "snippet_links": [{"key": "the-supplier-shall", "type": "clause", "offset": [5, 23]}, {"key": "security-policy", "type": "definition", "offset": [102, 117]}, {"key": "security-plan", "type": "clause", "offset": [126, 139]}, {"key": "to-the-supplier", "type": "clause", "offset": [451, 466]}, {"key": "from-time-to-time", "type": "clause", "offset": [467, 484]}, {"key": "up-to-date", "type": "definition", "offset": [527, 537]}, {"key": "if-the-supplier", "type": "clause", "offset": [607, 622]}, {"key": "change-to", "type": "definition", "offset": [639, 648]}, {"key": "to-the-services", "type": "clause", "offset": [723, 738]}, {"key": "change-request", "type": "definition", "offset": [755, 769]}, {"key": "the-supplier-must", "type": "clause", "offset": [784, 801]}, {"key": "evidence-of", "type": "clause", "offset": [835, 846]}, {"key": "increased-costs", "type": "clause", "offset": [864, 879]}, {"key": "to-mitigate", "type": "definition", "offset": [912, 923]}, {"key": "any-change", "type": "definition", "offset": [937, 947]}, {"key": "the-charges", "type": "clause", "offset": [951, 962]}, {"key": "contract-officer", "type": "clause", "offset": [1007, 1023]}], "samples": [{"hash": "3kyRLqGuwNG", "uri": "/contracts/3kyRLqGuwNG#security-requirements", "label": "Contract for Providing Technical Assistance Support", "score": 23.5585212708, "published": true}, {"hash": "g0ciIAwKwiU", "uri": "/contracts/g0ciIAwKwiU#security-requirements", "label": "Contract for Services", "score": 23.4284744263, "published": true}, {"hash": "8SZuCRSVJ02", "uri": "/contracts/8SZuCRSVJ02#security-requirements", "label": "Supplier Services Agreement", "score": 23.4284744263, "published": true}], "hash": "3c8e0c286f0557fb22336fa9e453467e", "id": 3}, {"snippet": "A. Seller shall ensure that it is in compliance with all Federal and state employment laws and regulations governing verification of eligibility of employment for individuals hired by Seller or Seller Representatives prior to permitting such persons to perform Services.\nB. Seller and Seller Representatives will enter and exit Tri-State's facilities through security access areas, if any. In instances where Seller or Seller Representatives require access to highly secure areas of Tri- State's facilities and systems, at Tri-State security's discretion, Seller or Seller Representatives may be required to: (i) undergo a background check, (ii) respond to security questionnaires, (iii) verify social security numbers, and (iv) complete any other training required by Tri-State. Tri-State may deny access to certain areas based on information obtained through this additional screening process and may contact appropriate authorities if the situation warrants.\nC. Seller Representatives shall be required to show a valid US Government photo ID (state or Federal), such as a driver's license, law enforcement ID, U.S. military ID, U.S. passport, or current INS card, prior to obtaining a badge and entering the worksite. Individuals without valid photo ID will not be permitted to enter the worksite or receive a badge.\nD. Prior to commencing the Services at a worksite, Seller shall deliver a detailed list to Tri-State of all Seller Representatives who will perform the Services at the worksite. The list shall include each person's name, type of valid photo ID and its unique ID number. This list shall be updated weekly and delivered to Tri- State's security staff for purposes of checking individuals into and out of a worksite.\nE. Specific badging instructions unique to any of Tri-State's facilities shall be covered at pre-work or pre- outage safety briefings. Badging procedures may vary depending on, among other things, the particular services, the number of workers, or the time required to perform the Services. Badges issued by Tri- State shall be visibly displayed at all times while on the worksite. Failure to do so will result in removal from the worksite by Tri-State's security personnel.\nF. If a Seller Representative quits or is terminated, Seller shall promptly return any ID badge issued by Tri- State on behalf of such individual. If an ID badge is lost or stolen, Seller shall immediately notify Tri-State and provide written documentation describing the particular event. Any Tri-State related costs for replacement of missing badges shall be charged to Seller's account.\nG. No weapons of any type, including, but not limited to, firearms, archery equipment, explosive or incendiary devices, drugs (unless prescription drugs authorized by a doctor), alcohol or pets are allowed on Tri-State's facilities. Any person observed with any such prohibited item may be immediately removed from the worksite and detained for local law enforcement authorities.\nH. Tri-State's security staff may examine or search any items brought on or removed from the worksite and may examine or search at any time, in the presence of Seller or a Seller Representative, any enclosure on the worksite, including but not limited to, storage bins, tool cribs, boxes, vehicles, construction equipment, office trailers, tool trailers, and lunch boxes. Items belonging to Seller or a Seller Representative shall also be subject to search, with or without the presence of Seller or a Seller Representative.\nI. On request, Seller shall provide Tri-State with a list of worksite equipment, tools, parts and materials, which list may be used to conduct inventory inspections.\nJ. Seller is responsible for transporting Seller Representatives to the worksite and responsible for securing its worksite at Tri-State's facility, including, but not limited to: fencing of laydown areas, locks and keys, fabrication, electrical power connections, coverings for equipment or materials, warehousing, lighting, etc.\nK. To the extent Seller is providing control or monitoring systems that will interface with Tri-State's control systems via transmission control protocol/internet protocol (TCP/IP), Seller shall promptly provide, upon request and at no additional cost, information related to each cyber system as Tri-State may request including operating and application system information and ports.\nL. Seller shall confine Seller Representatives to that portion of Tri-State's facilities where the Services are performed or to roads or areas leading to and from such worksites and to any other area which Tri-State has expressly permitted Seller and Seller Representatives to use.\nM. Harassment of any type, threats of violence, or actual violence, will not be tolerated. Allegations of any of the above will be investigated and if substantiated, the perpetrator will be removed from the worksite and not allowed to return. If necessary, the perpetrator may be detained by security personnel until local law enforcement authorities arrive.\nN. Seller Representatives performing work at Tri-State facilities shall immediately notify Tri-State after becoming aware that they have a communicable disease. The Seller Representative shall cease performing work at Tri-State facilities until the communicable disease is no longer transmissible.\nO. Tri-State may deny access, or remove and ban from its facilities, anyone who violates the foregoing security provisions, has a questionable background, behaves erratically or suspiciously, or jeopardizes Tri-State's security measures, equipment, facilities, or personnel. Physical force may be authorized to prevent security incidents and law enforcement may be notified. Tri-State may change its security procedures at any time without explanation. Changes in security procedures may result in complete lockdown of worksites, increased searches, denial of access to worksites, or other measures.\nP. To the extent Seller will be deploying or connecting any cyber asset (such as a laptop, cell phone, and tablet) or removable media device (such as a compact disk, USB flash drive, and external hard drive) to Tri-State\u2019s distributed control system(s), prior to such deployment or connection, Seller shall comply with any request by Tri-State for Tri-State to scan such device for malicious code.", "size": 30, "snippet_links": [{"key": "seller-shall", "type": "clause", "offset": [3, 15]}, {"key": "in-compliance-with", "type": "definition", "offset": [34, 52]}, {"key": "laws-and-regulations", "type": "definition", "offset": [86, 106]}, {"key": "eligibility-of-employment", "type": "clause", "offset": [133, 158]}, {"key": "for-individuals", "type": "definition", "offset": [159, 174]}, {"key": "by-seller", "type": "clause", "offset": [181, 190]}, {"key": "seller-representatives", "type": "clause", "offset": [194, 216]}, {"key": "prior-to", "type": "clause", "offset": [217, 225]}, {"key": "perform-services", "type": "clause", "offset": [253, 269]}, {"key": "seller-and-seller", "type": "clause", "offset": [274, 291]}, {"key": "access-areas", "type": "clause", "offset": [368, 380]}, {"key": "where-seller", "type": "clause", "offset": [403, 415]}, {"key": "secure-areas", "type": "definition", "offset": [467, 479]}, {"key": "facilities-and-systems", "type": "clause", "offset": [496, 518]}, {"key": "state-security", "type": "definition", "offset": [527, 541]}, {"key": "background-check", "type": "definition", "offset": [623, 639]}, {"key": "respond-to", "type": "clause", "offset": [646, 656]}, {"key": "security-questionnaires", "type": "clause", "offset": [657, 680]}, {"key": "social-security-numbers", "type": "clause", "offset": [695, 718]}, {"key": "required-by", "type": "definition", "offset": [757, 768]}, {"key": "certain-areas", "type": "clause", "offset": [809, 822]}, {"key": "based-on", "type": "definition", "offset": [823, 831]}, {"key": "screening-process", "type": "clause", "offset": [877, 894]}, {"key": "appropriate-authorities", "type": "definition", "offset": [911, 934]}, {"key": "the-situation", "type": "clause", "offset": [938, 951]}, {"key": "the-worksite", "type": "clause", "offset": [1207, 1219]}, {"key": "to-enter", "type": "definition", "offset": [1278, 1286]}, {"key": "the-services", "type": "definition", "offset": [1343, 1355]}, {"key": "state-of", "type": "definition", "offset": [1415, 1423]}, {"key": "each-person", "type": "clause", "offset": [1521, 1532]}, {"key": "type-of", "type": "definition", "offset": [1541, 1548]}, {"key": "security-staff", "type": "definition", "offset": [1654, 1668]}, {"key": "for-purposes-of", "type": "clause", "offset": [1669, 1684]}, {"key": "number-of", "type": "definition", "offset": [1960, 1969]}, {"key": "time-required", "type": "clause", "offset": [1986, 1999]}, {"key": "issued-by", "type": "clause", "offset": [2032, 2041]}, {"key": "visibly-displayed", "type": "definition", "offset": [2062, 2079]}, {"key": "at-all-times", "type": "definition", "offset": [2080, 2092]}, {"key": "failure-to", "type": "clause", "offset": [2116, 2126]}, {"key": "security-personnel", "type": "clause", "offset": [2189, 2207]}, {"key": "on-behalf-of", "type": "clause", "offset": [2326, 2338]}, {"key": "lost-or-stolen", "type": "clause", "offset": [2374, 2388]}, {"key": "written-documentation", "type": "definition", "offset": [2444, 2465]}, {"key": "related-costs", "type": "definition", "offset": [2513, 2526]}, {"key": "replacement-of", "type": "clause", "offset": [2531, 2545]}, {"key": "to-seller", "type": "definition", "offset": [2578, 2587]}, {"key": "no-weapons", "type": "clause", "offset": [2602, 2612]}, {"key": "not-limited", "type": "clause", "offset": [2641, 2652]}, {"key": "archery-equipment", "type": "definition", "offset": [2667, 2684]}, {"key": "incendiary-devices", "type": "definition", "offset": [2699, 2717]}, {"key": "prescription-drugs", "type": "clause", "offset": [2733, 2751]}, {"key": "authorized-by", "type": "clause", "offset": [2752, 2765]}, {"key": "pets-are-allowed", "type": "clause", "offset": [2788, 2804]}, {"key": "any-person", "type": "clause", "offset": [2832, 2842]}, {"key": "prohibited-item", "type": "definition", "offset": [2866, 2881]}, {"key": "law-enforcement-authorities", "type": "definition", "offset": [2950, 2977]}, {"key": "at-any-time", "type": "clause", "offset": [3107, 3118]}, {"key": "of-seller", "type": "clause", "offset": [3136, 3145]}, {"key": "construction-equipment", "type": "definition", "offset": [3278, 3300]}, {"key": "subject-to", "type": "definition", "offset": [3418, 3428]}, {"key": "a-list", "type": "definition", "offset": [3555, 3561]}, {"key": "parts-and-materials", "type": "clause", "offset": [3592, 3611]}, {"key": "responsible-for", "type": "clause", "offset": [3683, 3698]}, {"key": "laydown-areas", "type": "clause", "offset": [3860, 3873]}, {"key": "locks-and-keys", "type": "clause", "offset": [3875, 3889]}, {"key": "electrical-power", "type": "definition", "offset": [3904, 3920]}, {"key": "equipment-or-materials", "type": "clause", "offset": [3948, 3970]}, {"key": "to-the-extent", "type": "clause", "offset": [4003, 4016]}, {"key": "monitoring-systems", "type": "definition", "offset": [4048, 4066]}, {"key": "control-systems", "type": "definition", "offset": [4104, 4119]}, {"key": "transmission-control-protocol", "type": "definition", "offset": [4124, 4153]}, {"key": "internet-protocol", "type": "definition", "offset": [4154, 4171]}, {"key": "promptly-provide", "type": "clause", "offset": [4195, 4211]}, {"key": "upon-request", "type": "definition", "offset": [4213, 4225]}, {"key": "no-additional-cost", "type": "clause", "offset": [4233, 4251]}, {"key": "related-to", "type": "clause", "offset": [4265, 4275]}, {"key": "system-information", "type": "definition", "offset": [4355, 4373]}, {"key": "permitted-seller", "type": "definition", "offset": [4615, 4631]}, {"key": "threats-of-violence", "type": "clause", "offset": [4694, 4713]}, {"key": "not-allowed", "type": "definition", "offset": [4887, 4898]}, {"key": "performing-work", "type": "clause", "offset": [5052, 5067]}, {"key": "state-facilities", "type": "definition", "offset": [5075, 5091]}, {"key": "communicable-disease", "type": "definition", "offset": [5165, 5185]}, {"key": "the-seller-representative", "type": "clause", "offset": [5187, 5212]}, {"key": "the-foregoing", "type": "clause", "offset": [5413, 5426]}, {"key": "security-provisions", "type": "definition", "offset": [5427, 5446]}, {"key": "security-measures", "type": "definition", "offset": [5543, 5560]}, {"key": "or-personnel", "type": "definition", "offset": [5585, 5597]}, {"key": "physical-force", "type": "clause", "offset": [5599, 5613]}, {"key": "security-incidents", "type": "clause", "offset": [5643, 5661]}, {"key": "security-procedures", "type": "definition", "offset": [5724, 5743]}, {"key": "changes-in", "type": "clause", "offset": [5777, 5787]}, {"key": "access-to-worksites", "type": "clause", "offset": [5884, 5903]}, {"key": "other-measures", "type": "clause", "offset": [5908, 5922]}, {"key": "seller-will", "type": "clause", "offset": [5941, 5952]}, {"key": "cyber-asset", "type": "definition", "offset": [5984, 5995]}, {"key": "cell-phone", "type": "definition", "offset": [6015, 6025]}, {"key": "removable-media", "type": "definition", "offset": [6042, 6057]}, {"key": "usb-flash-drive", "type": "definition", "offset": [6090, 6105]}, {"key": "hard-drive", "type": "definition", "offset": [6120, 6130]}, {"key": "comply-with", "type": "clause", "offset": [6231, 6242]}, {"key": "malicious-code", "type": "definition", "offset": [6306, 6320]}], "samples": [{"hash": "9DVnaoilIZL", "uri": "/contracts/9DVnaoilIZL#security-requirements", "label": "Services Agreement", "score": 27.1477375031, "published": true}, {"hash": "1hT37r1PYiB", "uri": "/contracts/1hT37r1PYiB#security-requirements", "label": "Services Agreement", "score": 27.1477375031, "published": true}, {"hash": "fUabeBLCGzM", "uri": "/contracts/fUabeBLCGzM#security-requirements", "label": "Services Agreement", "score": 21.9609851837, "published": true}], "hash": "e2d9f49e889deb2ba9e3fc88396b71c0", "id": 9}], "next_curs": "Cl4SWGoVc35sYXdpbnNpZGVyY29udHJhY3RzcjoLEhZDbGF1c2VTbmlwcGV0R3JvdXBfdjU2Ih5zZWN1cml0eS1yZXF1aXJlbWVudHMjMDAwMDAwMGEMogECZW4YACAA", "clause": {"children": [["", ""], ["until-and-or-unless-a-change-to-the-charges-is-agreed-by-dfid-pursuant-to-clause-11", "Until and/or unless a change to the Charges is agreed by DFID pursuant to clause 11"], ["compensation", "Compensation"], ["physical-security", "Physical Security"], ["fees-and-charges", "Fees and Charges"]], "title": "Security Requirements", "size": 2513, "parents": [["security", "Security"], ["data-security-and-protection", "DATA SECURITY AND PROTECTION"], ["expenditure-limit", "Expenditure Limit"], ["general", "General"], ["protection-of-information", "Protection of Information"]], "id": "security-requirements", "related": [["data-security-requirements", "Data Security Requirements", "Data <strong>Security Requirements</strong>"], ["facility-requirements", "Facility Requirements", "Facility Requirements"], ["city-requirements", "City Requirements", "City Requirements"], ["accessibility-requirements", "Accessibility Requirements", "Accessibility Requirements"], ["e-verify-requirements", "E-Verify Requirements", "E-Verify Requirements"]], "related_snippets": [], "updated": "2025-12-17T04:28:34+00:00", "also_ask": ["What minimum security standards should be mandated to ensure enforceability?", "How can the clause allocate liability for security breaches most effectively?", "What negotiation levers exist for limiting ongoing compliance obligations?", "How do these requirements compare to industry or statutory benchmarks?", "What are the most common pitfalls that render security clauses unenforceable in court?"], "drafting_tip": "Specify technical and organizational security measures to ensure clarity; reference relevant standards to promote compliance; require regular audits to verify ongoing effectiveness.", "explanation": "The Security Requirements clause sets out the obligations and standards that parties must follow to protect sensitive information and systems from unauthorized access, breaches, or other security threats. Typically, this clause details specific technical and organizational measures, such as encryption, access controls, regular security audits, and incident response protocols, that must be implemented. Its core practical function is to ensure that all parties maintain a consistent and adequate level of security, thereby reducing the risk of data breaches and safeguarding confidential or proprietary information."}, "json": true, "cursor": ""}}