Information Security Requirements In cases where the State is not permitted to manage/modify the automation equipment (server/computer/other) that controls testing or monitoring devices, the Contractor agrees to update and provide patches for the automation equipment and any installed operating systems or applications on a quarterly basis (at minimum). The Contractor will submit a report to the State of updates installed within 30 days of the installation as well as a Plan of Actions and Milestones (POA&M) to remediate any vulnerabilities ranging from Critical to Low. The contractor will provide an upgrade path or compensatory security controls for any operating systems and applications listed as beyond “end-of-life” or EOL, within 90 days of the EOL and complete the EOL system’s upgrade within 90 days of the approved plan.
Data Security Requirements A. Data Transport. When transporting Confidential Information electronically, including via email, the data will be protected by:
Certain Requirements as to Furniture, Equipment and Fixtures If the Assuming Institution purchases owned Bank Premises or accepts an assignment of the lease (or enters into a sublease or a new lease in lieu thereof) for leased Bank Premises as provided in Section 4.6(a) or 4.6(b), or if the Assuming Institution does not exercise such option but within twelve (12) months following Bank Closing obtains the right to occupy such premises (whether by assignment, lease, sublease, purchase or otherwise), other than in accordance with Section 4.6(a) or (b), the Assuming Institution shall (i) effective as of the date of Bank Closing, purchase from the Receiver all Furniture and Equipment and Fixtures owned by the Failed Bank at Fair Market Value and located thereon as of Bank Closing, (ii) accept an assignment or a sublease of the leases or negotiate new leases for all Furniture and Equipment and Fixtures leased by the Failed Bank and located thereon, and (iii) if applicable, accept an assignment or a sublease of any ground lease or negotiate a new ground lease with respect to any land on which such Bank Premises are located; provided, that the Receiver shall not have disposed of such Furniture and Equipment and Fixtures or repudiated the leases specified in clause (ii) or (iii).
Security Requirements 11.1 The Supplier shall comply, and shall procure the compliance of the Suppliers Personnel, with the Security Policy and the Security Plan and the Supplier shall ensure that the Security Plan produced by the Supplier fully complies with the Security Policy.
Additional security requirements The following provisions apply in respect of any Additional Security provided:
Use of Facilities and Equipment The Association will be allowed to use school facilities for meetings upon request to and approval of the Superintendent. The Association will be allowed to use school equipment, including typewriters, computers, mimeograph machines, other duplicating equipment, calculating machines, and all types of audio-visual equipment when such equipment is not otherwise in use. The Association shall pay the cost of all materials and supplies incidental to such use and shall be responsible for proper operation of all such equipment.
Facility Requirements 1. Maintain wheelchair accessibility to program activities according to governing law, including the Americans With Disabilities Act (ADA), as applicable.
New Hampshire Specific Data Security Requirements The Provider agrees to the following privacy and security standards from “the Minimum Standards for Privacy and Security of Student and Employee Data” from the New Hampshire Department of Education. Specifically, the Provider agrees to:
Electronic PHI Security Rule Obligations 5.1 With respect to Electronic PHI, Business Associate shall:
Certification Regarding Prohibition of Certain Terrorist Organizations (Tex Gov. Code 2270) Vendor certifies that Vendor is not a company identified on the Texas Comptroller’s list of companies known to have contracts with, or provide supplies or services to, a foreign organization designated as a Foreign Terrorist Organization by the U.S. Secretary of State. Does Vendor certify? 3 Yes