Security Risk Management Plan Sample Clauses

Security Risk Management Plan. Contractor shall ensure the level of security and privacy protection required in accordance with this Contract is documented in a security risk management plan. Contractor shall make its security risk management plan available to the State for review upon request.
AutoNDA by SimpleDocs
Security Risk Management Plan. County shall ensure the level of security and privacy protection required in accordance with this Privacy and Security Agreement is documented in a security risk management plan. County shall make its security risk management plan available to ODHS for review upon request.
Security Risk Management Plan. GOV2 shall ensure the level of security and privacy protection required in accordance with this Agreement is documented in a security risk management plan. GOV2 shall make its security risk management plan available to DHS for review upon request.
Security Risk Management Plan. Subrecipient shall ensure the level of security and privacy protection required in accordance with this Privacy and Security Agreement is documented in a security risk management plan. Subrecipient shall make its security risk management plan available to ODHS for review upon request.

Related to Security Risk Management Plan

  • Risk Management Except as required by applicable law or regulation, (i) implement or adopt any material change in its interest rate and other risk management policies, procedures or practices; (ii) fail to follow its existing policies or practices with respect to managing its exposure to interest rate and other risk; or (iii) fail to use commercially reasonable means to avoid any material increase in its aggregate exposure to interest rate risk.

  • Liquidity Risk Measurement Services Not Applicable.

  • Patch Management All workstations, laptops and other systems that process and/or 20 store PHI COUNTY discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or 21 transmits on behalf of COUNTY must have critical security patches applied, with system reboot if 22 necessary. There must be a documented patch management process which determines installation 23 timeframe based on risk assessment and vendor recommendations. At a maximum, all applicable 24 patches must be installed within thirty (30) calendar or business days of vendor release. Applications 25 and systems that cannot be patched due to operational reasons must have compensatory controls 26 implemented to minimize risk, where possible.

  • Administration and Risk Management Employees of Federated Advisory Services Company provide support to portfolio managers and other employees of affiliated advisers. Such services may include development of risk management programs, production of portfolio and compliance reports for clients and/or fund Boards, coordination of client portfolios and related fixed income trade execution implementation and administration, completion of required broker and custody documentation, development and documentation of operational procedures, coordination of proxy voting activities, on-site support of hardware and software, etc.”

  • PROCUREMENT CARD The State has entered into an agreement for purchasing card services. The Purchasing Card enables Authorized Users to make authorized purchases directly from a Contractor without processing Purchase Orders or Purchase Authorizations. Purchasing Cards are issued to selected employees authorized to purchase for the Authorized User and having direct contact with Contractors. Cardholders can make purchases directly from any Contractor that accepts the Purchasing Card. The Contractor shall not process a transaction for payment through the credit card clearinghouse until the purchased Products have been shipped or services performed. Unless the cardholder requests correction or replacement of a defective or faulty Product in accordance with other Contract requirements, the Contractor shall immediately credit a cardholder’s account for Products returned as defective or faulty.

  • Liquidity risk The Exchange requires all structured product issuers to appoint a liquidity provider for each individual issue. The role of liquidity providers is to provide two way quotes to facilitate trading of their products. In the event that a liquidity provider defaults or ceases to fulfill its role, investors may not be able to buy or sell the product until a new liquidity provider has been assigned.

  • Interest Rate Risk Management Instruments (a) All interest rate swaps, caps, floors and option agreements and other interest rate risk management arrangements to which the Company or any of its Subsidiaries is a party or by which any of their properties or assets may be bound were entered into in the Ordinary Course of Business and in accordance with prudent banking practice and applicable rules, regulations and policies of Company Regulatory Agencies and with counterparties believed to be financially responsible at the time, and are legal, valid and binding obligations enforceable in accordance with their terms (except as may be limited by general principles of equity, whether applied in a court of law or a court of equity, and by bankruptcy, insolvency and similar Laws affecting creditors’ rights and remedies generally), and are in full force and effect. The Company and each of its Subsidiaries has duly performed in all material respects all of its obligations thereunder to the extent that such obligations to perform have accrued; and, to the Knowledge of the Company, there are no breaches, violations or defaults or allegations or assertions of such by any party thereunder.

  • Cash Management Systems On or prior to the Closing Date, Borrowers will establish and will maintain until the Termination Date, the cash management systems described in Annex C (the “Cash Management Systems”).

  • Security Management The Contractor shall comply with the requirements of the DOD 5200.1-M and the DD Form 254. Security of the Contractor’s electronic media shall be in accordance with the above documents. Effective Program Security shall require the Contractor to address Information Security and Operations Security enabled by the Security Classification Guides. The Contractor’s facility must be able to handle and store material up to the Classification Level as referenced in Attachment J-01, DD Form 254.

  • Financial Management System Subrecipient shall establish and maintain a sound financial management system, based upon generally accepted accounting principles. Contractor’s system shall provide fiscal control and accounting procedures that will include the following: i. Information pertaining to tuition rates, payments, and educational assistance payments; and

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!