Special Access Programs (SAP) Sample Clauses

Special Access Programs (SAP). (1) The lead OTA will identify all SAP requirements associated with the conduct of a MOT&E program. The identified SAP access requirements will be provided to all supporting OTAs through coordination with each OTA Security Assistance Policy Coordinating Office. If an OTA desires to use a Service SAP capability or resource in the conduct of a MOT&E program, it is the responsibility of the sponsoring Service to access all other test team members to the capability.
AutoNDA by SimpleDocs
Special Access Programs (SAP). (1) The lead OTA will identify all SAP requirements associated with the conduct of a MOT&E program. The identified SAP access requirements will be provided to all participating OTAs through coordination with each OTA Security Assistance Policy Coordinating Office. If an OTA desires to use a Service SAP capability or resource in the conduct of a MOT&E program, it is the responsibility of the sponsoring Service to verify test team members can have access to the capability. (2) Every effort will be made to implement reciprocity of adjudications, at the same sensitivity level, to include supporting SAPs. Reciprocity of access between OTA personnel will be requested when the Program Access Request (PAR) includes a statement certifying access was satisfactorily completed by a Security Officer or Government SAP Security Officer (GSSO) and that the clearance and investigation are current within 5 years. (3) Specific relationships and procedures for test team members accessing Service specific SAPs will be formalized in a written Memorandum of Agreement /Understanding as outlined in the DoDM 5205.07 Volumes 1-4.
Special Access Programs (SAP). Approximately 10% of the employees shall support SAP. The contractor shall ensure that investigative requirements for personnel supporting SAPs are submitted IAW paragraph 5-4, AR 380-381, Special Access Programs. Personnel supporting SAPs shall be subject to random counterintelligence polygraph examinations. Employees who refuse to sign an agreement to undergo a polygraph examination cannot access SAP information.

Related to Special Access Programs (SAP)

  • First Source Hiring Program Contractor must comply with all of the provisions of the First Source Hiring Program, Chapter 83 of the San Francisco Administrative Code, that apply to this Agreement, and Contractor is subject to the enforcement and penalty provisions in Chapter 83.

  • Wellness Program Nothing in this Agreement shall prevent a department or agency from recommending experimental “fitness” type programs and reward programs involving wellness promotion activities. Any such activities shall be funded from the department’s separate appropriation, after review by the Benefits Advisory Committee and approval by the Secretary of Administration, or designee.

  • E-Verify Program Grantee certifies that it utilizes and will continue to utilize the U.S. Department of Homeland Security's E-Verify system to determine the eligibility of: A. all persons employed to perform duties within Texas during the term of the Grant Agreement; and B. all persons, (including subcontractors) assigned by the Grantee to perform work pursuant to the Grant Agreement within the United States of America.

  • Site Access Dell requires the right to access the APEX System in a timely way and as provided in the Service Offering Description to provide the Support Services. Failure to ensure that Customer provides Dell with timely access to a Site will relieve Dell of the Support Services obligations and Dell may also, at Dell’s discretion, suspend the APEX Service.

  • User Access Transfer Agent shall have a process to promptly disable access to Fund Data by any Transfer Agent personnel who no longer requires such access. Transfer Agent will also promptly remove access of Fund personnel upon receipt of notification from Fund.

  • REMOTE ACCESS SERVICES ADDENDUM The Custodian and each Fund agree to be bound by the terms of the Remote Access Services Addendum hereto.

  • Data Access Control Persons entitled to use data processing systems gain access only to the Personal Data that they have a right to access, and Personal Data must not be read, copied, modified or removed without authorization in the course of processing, use and storage.

  • Exceptional Access to Thick Registration Data In case of a registrar failure, deaccreditation, court order, etc. that prompts the temporary or definitive transfer of its domain names to another registrar, at the request of ICANN, Registry Operator will provide ICANN with up-­‐to-­‐date data for the domain names of the losing registrar. The data will be provided in the format specified in Specification 2 for Data Escrow. The file will only contain data related to the domain names of the losing registrar. Registry Operator will provide the data as soon as commercially practicable, but in no event later than five (5) calendar days following ICANN’s request. Unless otherwise agreed by Registry Operator and ICANN, the file will be made available for download by ICANN in the same manner as the data specified in Section 3.1 of this Specification.

  • Data Access Access to Contract and State Data The Contractor shall provide to the Client Agency access to any data, as defined in Conn. Gen Stat. Sec. 4e-1, concerning the Contract and the Client Agency that are in the possession or control of the Contractor upon demand and shall provide the data to the Client Agency in a format prescribed by the Client Agency and the State Auditors of Public Accounts at no additional cost.

  • Training Programs All employees shall successfully complete all necessary training prior to being assigned work (e.g., all employees will complete health and safety training prior to being assigned to task). Nothing in this Article or provision shall constitute a waiver of either party’s bargaining obligations or defenses. The Employer still has an obligation to notify and bargain changes in terms and conditions of employment with the exclusive representative.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!