Certification Regarding Prohibition of Boycotting Israel (Tex Gov. Code 2271)
Campaign Contribution Restrictions For all State contracts as defined in C.G.S. § 9-612(g) the authorized signatory to this Contract expressly acknowledges receipt of the State Elections Enforcement Commission’s (“SEEC”) notice advising state contractors of state campaign contribution and solicitation prohibitions, and will inform its principles of the contents of the notice. See Form reproduced and inserted below.
THE ACADEMY The Academy is a Mainstream Academy as defined in clause 1.4 of the Master Agreement.
Green Economy/Carbon Footprint a) The Supplier/Service Provider has in its bid provided Transnet with an understanding of the Supplier’s/Service Provider’s position with regard to issues such as waste disposal, recycling and energy conservation.
Enterprise Information Management Standards Grantee shall conform to HHS standards for data management as described by the policies of the HHS Office of Data, Analytics, and Performance. These include, but are not limited to, standards for documentation and communication of data models, metadata, and other data definition methods that are required by HHS for ongoing data governance, strategic portfolio analysis, interoperability planning, and valuation of HHS System data assets.
New Hampshire Specific Data Security Requirements The Provider agrees to the following privacy and security standards from “the Minimum Standards for Privacy and Security of Student and Employee Data” from the New Hampshire Department of Education. Specifically, the Provider agrees to: (1) Limit system access to the types of transactions and functions that authorized users, such as students, parents, and LEA are permitted to execute; (2) Limit unsuccessful logon attempts; (3) Employ cryptographic mechanisms to protect the confidentiality of remote access sessions; (4) Authorize wireless access prior to allowing such connections; (5) Create and retain system audit logs and records to the extent needed to enable the monitoring, analysis, investigation, and reporting of unlawful or unauthorized system activity; (6) Ensure that the actions of individual system users can be uniquely traced to those users so they can be held accountable for their actions; (7) Establish and maintain baseline configurations and inventories of organizational systems (including hardware, software, firmware, and documentation) throughout the respective system development life cycles; (8) Restrict, disable, or prevent the use of nonessential programs, functions, ports, protocols, and services; (9) Enforce a minimum password complexity and change of characters when new passwords are created; (10) Perform maintenance on organizational systems; (11) Provide controls on the tools, techniques, mechanisms, and personnel used to conduct system maintenance; (12) Ensure equipment removed for off-site maintenance is sanitized of any Student Data in accordance with NIST SP 800-88 Revision 1; (13) Protect (i.e., physically control and securely store) system media containing Student Data, both paper and digital; (14) Sanitize or destroy system media containing Student Data in accordance with NIST SP 800-88 Revision 1 before disposal or release for reuse; (15) Control access to media containing Student Data and maintain accountability for media during transport outside of controlled areas; (16) Periodically assess the security controls in organizational systems to determine if the controls are effective in their application and develop and implement plans of action designed to correct deficiencies and reduce or eliminate vulnerabilities in organizational systems; (17) Monitor, control, and protect communications (i.e., information transmitted or received by organizational systems) at the external boundaries and key internal boundaries of organizational systems; (18) Deny network communications traffic by default and allow network communications traffic by exception (i.e., deny all, permit by exception); (19) Protect the confidentiality of Student Data at rest; (20) Identify, report, and correct system flaws in a timely manner; (21) Provide protection from malicious code (i.e. Antivirus and Antimalware) at designated locations within organizational systems; (22) Monitor system security alerts and advisories and take action in response; and (23) Update malicious code protection mechanisms when new releases are available.
Campaign Contribution Restriction For all State contracts as defined in Conn. Gen. Stat. § 9- 612(g)(1) having a value in a calendar year of $50,000 or more or a combination or series of such agreements or contracts having a value of $100,000 or more, the authorized signatory to this Contract expressly acknowledges receipt of the State Elections Enforcement Commission's notice advising state contractors of state campaign contribution and solicitation prohibitions, and will inform its principals of the contents of the notice, as set forth in “Notice to Executive Branch State Contractors and Prospective State Contractors of Campaign Contribution and Solicitation Limitations,” attached as Exhibit C.
FALSE STATEMENTS CONCERNING HIGHWAY PROJECTS T h i s p r o v i s i o n i s applicable to all Federal-aid construction contracts and to all related subcontracts. In order to assure high quality and durable construction in conformity with approved plans and specifications and a high degree of reliability on statements and representations made by engineers, contractors, suppliers, and workers on Federal- aid highway projects, it is essential that all persons concerned with the project perform their functions as carefully, thoroughly, and honestly as possible. Willful falsification, distortion, or misrepresentation with respect to any facts related to the project is a violation of Federal law. To prevent any misunderstanding regarding the seriousness of these and similar acts, Form FHWA-1022 shall be posted on each Federal-aid highway project (23 CFR 635) in one or more places where it is readily available to all persons concerned with the project: 18 U.S.C. 1020 reads as follows: "Whoever, being an officer, agent, or employee of the United States, or of any State or Territory, or whoever, whether a person, association, firm, or corporation, knowingly makes any false statement, false representation, or false report as to the character, quality, quantity, or cost of the material used or to be used, or the quantity or quality of the work performed or to be performed, or the cost thereof in connection with the submission of plans, maps, specifications, contracts, or costs of construction on any highway or related project submitted for approval to the Secretary of Transportation; or Whoever knowingly makes any false statement, false representation, false report or false claim with respect to the character, quality, quantity, or cost of any work performed or to be performed, or materials furnished or to be furnished, in connection with the construction of any highway or related project approved by the Secretary of Transportation; or Whoever knowingly makes any false statement or false representation as to material fact in any statement, certificate, or report submitted pursuant to provisions of the Federal-aid Roads Act approved July 1, 1916, (39 Stat. 355), as amended and supplemented; Shall be fined under this title or imprisoned not more than 5 years or both."
Federal Medicaid System Security Requirements Compliance Party shall provide a security plan, risk assessment, and security controls review document within three months of the start date of this Agreement (and update it annually thereafter) in order to support audit compliance with 45 CFR 95.621 subpart F, ADP System Security Requirements and Review Process.
Please see the current Washtenaw Community College catalog for up-to-date program requirements Conditions & Requirements