Security Sensitive Work Sample Clauses

Security Sensitive Work. “Security Sensitive Work” means any of the Services that requires (i) unescorted access of Supplier Personnel to any Company location, facility, or worksite; (ii) deploying any Supplier Personnel to perform Services at any Company customer location, facility, or worksite; or (iii) granting access to Company networks (i.e., having a GE-issued single sign-on account) to Supplier Personnel. To the extent permissible by applicable law, prior to Supplier or Supplier’s Personnel engaging in any Security Sensitive Work, Supplier shall, after securing written authorization from Supplier’s Personnel and at Supplier’s expense, perform background screening consistent with Company’s “Requirements for Supplier Personnel Screening” attached hereto as Schedule C. This screening shall include the prior seven (7) year period covering all locations in which Supplier’s Personnel resided and will verify employment details during this period. Supplier shall retain a copy of this screening report for Company’s inspection for at least three (3) years following the performance of such Security Sensitive Work by Supplier’s Personnel. Company reserves the right to determine, in its sole discretion, the type of work that will be designated as “security sensitive” under this Agreement.
Security Sensitive Work. The Independent Certifier will ensure that each of its partners, directors, officers, employees, servants and agents engaged in the performance of Security Sensitive Work, has, not more than 30 days prior to first performing Security Sensitive Work, successfully completed a Canadian Police Information Centre (CPIC) check. For the purpose of this Section 11.10 [Security Sensitive Work], successful completion of a CIPIC check means that in respect of an individual the search returns no criminal conviction history or returns a history of criminal convictions which the Authority, in its discretion, determines do not pose a material risk to the Project. The Independent Certifier will not permit any individual to perform any Security Sensitive Work unless such individual has successfully completed a CPIC check. Throughout the term of this IC Agreement, the Independent Certifier shall ensure that a CPIC check is repeated for each individual engaged by the Independent Certifier in the performance of Security Sensitive Work from time to time so as to ensure that the results obtained in respect of any such individual are not more than 1 year old at any given time or if any information is received by the Independent Certifier that suggests that the risk in respect of any individual has materially changed. The Independent Certifier will prevent any individual from performing any Security Sensitive Work who does not successfully complete the annual CPIC check. The Independent Certifier will not permit any individual who has previously failed a CPIC check under this IC Agreement to perform Security Sensitive Work, without the prior written consent of the Authority. All CPIC checks during the Construction Period will be administered and performed by the Authority at no cost to the Independent Certifier. In order to obtain a CPIC check in respect of an individual, the Independent Certifier shall: (a) provide the following information to the Contact Person at least 10 Business Days before the date on which the applicable CPIC check is required: (1) the name(s) of the individual(s) to be screened; (2) all consents required in relation to the performance of CPIC checks in accordance with Section 11.9 [Personal Information]; (3) the Authority’s form ofCriminal History Consent Form for Security Clearance of Contractors and Volunteers at Provincial Correctional Centers”, completed and signed by each individual to be screened; and (4) a legible colour copy of a piece of govern...
Security Sensitive Work. Project Co will comply with the provisions of Schedule 21 [Security Protocols].
Security Sensitive Work. Project Co shall comply with the requirements regarding Security Sensitive Work set out in Section 11 [Security Sensitive Work] of Schedule 12 [Safety and Security].

Related to Security Sensitive Work

  • Creative Work The Executive agrees that all creative work and work product, including but not limited to all technology, business management tools, processes, software, patents, trademarks, and copyrights developed by the Executive during the term of this Agreement, regardless of when or where such work or work product was produced, constitutes work made for hire, all rights of which are owned by the Employer. The Executive hereby assigns to the Employer all rights, title, and interest, whether by way of copyrights, trade secret, trademark, patent, or otherwise, in all such work or work product, regardless of whether the same is subject to protection by patent, trademark, or copyright laws.

  • Joint Work Product This Agreement is the joint work product of H-GAC and the Contractor. This Agreement has been negotiated by H-GAC and the Contractor and their respective counsel and shall be fairly interpreted in accordance with its terms and, in the event of any ambiguities, no inferences shall be drawn against any party.

  • Defective Work Work that, for any reason, is not in compliance with the Contract Documents. Defective Work is usually identified in a Notice of Non-Compliant Work.

  • Security of All Software Components Supplier will inventory all software components (including open source software) used in Deliverables, and provide such inventory to Accenture upon request. Supplier will assess whether any such components have any security defects or vulnerabilities that could lead to a Security Incident. Supplier will perform such assessment prior to providing Accenture with access to such software components and on an on-going basis thereafter during the term of the Agreement. Supplier will promptly notify Accenture of any identified security defect or vulnerability and remediate same in a timely manner. Supplier will promptly notify Accenture of its remediation plan. If remediation is not feasible in a timely manner, Supplier will replace the subject software component with a component that is not affected by a security defect or vulnerability and that does not reduce the overall functionality of the Deliverable(s).

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If ECI chooses to subtend a Verizon access Tandem, ECI’s NPA/NXX must be assigned by ECI to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG. 9.2.2 ECI shall establish Access Toll Connecting Trunks pursuant to applicable access Tariffs by which it will provide Switched Exchange Access Services to Interexchange Carriers to enable such Interexchange Carriers to originate and terminate traffic to and from ECI’s Customers. 9.2.3 The Access Toll Connecting Trunks shall be two-way trunks. Such trunks shall connect the End Office ECI utilizes to provide Telephone Exchange Service and Switched Exchange Access to its Customers in a given LATA to the access Tandem(s) Verizon utilizes to provide Exchange Access in such LATA. 9.2.4 Access Toll Connecting Trunks shall be used solely for the transmission and routing of Exchange Access to allow ECI’s Customers to connect to or be connected to the interexchange trunks of any Interexchange Carrier which is connected to a Verizon access Tandem.

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes. 11.2 We may (i) compile statistical and other information related to the performance, operation and use of the Services, and (ii) use data from the Services in aggregated form for security and operations management, to create statistical analyses, and for research and development purposes (clauses i and ii are collectively referred to as “Service Analyses”). We may make Service Analyses publicly available; however, Service Analyses will not incorporate Your Content, Personal Data or Confidential Information in a form that could serve to identify You or any individual. We retain all intellectual property rights in Service Analyses. 11.3 We may provide You with the ability to obtain certain Oracle Software (as defined below) for use with the Services. If we provide Oracle Software to You and do not specify separate terms for such software, then such Oracle Software is provided as part of the Services and You have the non-exclusive, worldwide, limited right to use such Oracle Software, subject to the terms of this Agreement and Your order (except for separately licensed elements of the Oracle Software, which separately licensed elements are governed by the applicable separate terms), solely to facilitate Your use of the Services. You may allow Your Users to use the Oracle Software for this purpose, and You are responsible for their compliance with the license terms. Your right to use any Oracle Software will terminate upon the earlier of our notice (by web posting or otherwise) or the end of the Services associated with the Oracle Software. Notwithstanding the foregoing, if Oracle Software is licensed to You under separate terms, then Your use of such software is governed by the separate terms. Your right to use any part of the Oracle Software that is licensed under the separate terms is not restricted in any way by this Agreement.

  • Project Work Plan The Statement of Work is the formal document incorporated into the Grant. The Project Work Plan documents how the Grantee will achieve the performance measures outlined in the Grant. Changes to the Statement of Work require an amendment. Project Work Plans may be changed with written approval from PEI and the Grantee.

  • Technology Upgrades Notwithstanding any other provision of this Agreement, Verizon shall have the right to deploy, upgrade, migrate and maintain its network at its discretion. The Parties acknowledge that Verizon, at its election, may deploy fiber throughout its network and that such fiber deployment may inhibit or facilitate Ymax’s ability to provide service using certain technologies. Nothing in this Agreement shall limit Verizon's ability to modify its network through the incorporation of new equipment or software or otherwise. Ymax shall be solely responsible for the cost and activities associated with accommodating such changes in its own network.

  • Data Access and Proprietary Information 6.1 The Fund acknowledges that the databases, computer programs, screen formats, report formats, interactive design techniques, and documentation manuals furnished to the Fund by the Transfer Agent as part of the Fund’s ability to access certain Fund Confidential Information maintained by the Transfer Agent on databases under the control and ownership of the Transfer Agent or other third party (“Data Access Services”) constitute copyrighted, trade secret, or other proprietary information of substantial value to the Transfer Agent or other third party (collectively, “Transfer Agent Proprietary Information”). In no event shall Transfer Agent Proprietary Information be deemed Fund Confidential Information. The Fund agrees to treat all Transfer Agent Proprietary Information as proprietary to the Transfer Agent and further agrees that it shall not divulge any Transfer Agent Proprietary Information to any person or organization except as may be provided hereunder. Without limiting the foregoing, the Fund agrees for itself and its employees and agents to: (a) Use such programs and databases (i) solely on the Fund’s computers or on computers of Federated Services Company or its affiliates (collectively, “Fund Computers”), or (ii) solely from equipment at the location agreed to between the Fund and the Transfer Agent and (iii) solely in accordance with the Transfer Agent’s applicable user documentation; (b) Refrain from copying or duplicating in any way (other than in the normal course of performing processing on the Fund Computers), the Transfer Agent Proprietary Information; (c) Refrain from obtaining unauthorized access to any portion of the Transfer Agent Proprietary Information, and if such access is inadvertently obtained, to inform Transfer Agent in a timely manner of such fact and dispose of such information in accordance with the Transfer Agent’s instructions; (d) Refrain from causing or allowing information transmitted from the Transfer Agent’s computer to the Fund’s terminal to be retransmitted to any other computer terminal or other device except as expressly permitted by the Transfer Agent (such permission not to be unreasonably withheld); (e) Allow the Fund to have access only to those authorized transactions as agreed to between the Fund and the Transfer Agent; and (f) Honor all reasonable written requests made by the Transfer Agent to protect at the Transfer Agent’s expense the rights of the Transfer Agent in the Transfer Agent Proprietary Information at common law, under federal copyright law and under other federal or state law. 6.2 The Fund shall take reasonable efforts to advise its employees of their obligations pursuant to this Section 6. The obligations of this Section shall survive any earlier termination of this Agreement. 6.3 If the Fund notifies the Transfer Agent that any of the Data Access Services do not operate in material compliance with the most recently issued user documentation for such services, the Transfer Agent shall use its best efforts in a timely manner to correct such failure. Organizations from which the Transfer Agent may obtain certain data included in the Data Access Services are solely responsible for the contents of such data and the Fund agrees to make no claim against the Transfer Agent arising out of the contents of such third-party data, including, but not limited to, the accuracy thereof; provided, however, that the Fund shall be entitled to insist that the Transfer Agent, and the Transfer Agent for the benefit of the Fund shall, enforce any and all rights under applicable contracts for the Data Access Services. SUBJECT TO THE FOREGOING OBLIGATIONS OF THE TRANSFER AGENT, DATA ACCESS SERVICES AND ALL COMPUTER PROGRAMS AND SOFTWARE SPECIFICATIONS USED IN CONNECTION THEREWITH ARE PROVIDED ON AN AS IS, AS AVAILABLE BASIS. EXCEPT AS OTHERWISE PROVIDED HEREIN TO THE CONTRARY, THE TRANSFER AGENT EXPRESSLY DISCLAIMS ALL WARRANTIES INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. 6.4 If the transactions available to the Fund include the ability to originate Proper Instructions through electronic instructions to the Transfer Agent in order to: (i) effect the transfer or movement of cash or Shares; or (ii) transmit Shareholder information or other information, then in such event the Transfer Agent shall be entitled to rely on the validity and authenticity of such Proper Instructions without undertaking any further inquiry as long as such Proper Instruction is undertaken in conformity with applicable security procedures.

  • Outside Work All work necessary to the assembling, installation, erection, operation, maintenance, repair, control, in- spection and supervision of all electrical apparatus, devices, wires, cables, supports, insulators, conduc- tors, ducts and raceways when part of distributing systems outside of buildings, railroads and outside the directly related railroad property and yards. In- stalling and maintaining the catenary and trolley work on railroad property, and bonding of rails. All underground ducts and cables when they are in- stalled by and are part of the system of a distrib- uting company, except in power stations during new construction, including ducts and cables to adjacent switch racks or substations. All outdoor substations and electrical connections up to and including the setting of transformers and the connecting of the secondary buses thereto. Outside work to include renewable electrical energy sources such as solar photovoltaic, geothermal, wind, biomass, wave, etc., and other distributed en- ergy installations such as fuel cells, microturbines, etc.