Vertical Reporting of TEFCA Security Incident(s) Sample Clauses

Vertical Reporting of TEFCA Security Incident(s). Signatory shall require that each Participant with which it has entered into a Participant-QHIN Agreement:
AutoNDA by SimpleDocs
Vertical Reporting of TEFCA Security Incident(s). Signatory shall report a TEFCA Security Incident to its Participants and Subparticipants as required by an applicable SOP.

Related to Vertical Reporting of TEFCA Security Incident(s)

  • MEDICAL REPORT The Agency/Department Head as a condition of granting sick leave with pay, may require medical evidence of sickness or injury acceptable to the Agency/Department. The acceptable medical evidence must be obtained from a medical practitioner currently treating the employee or the employee’s family member.

  • Medical Reports The following applies to all employees: The Employer agrees to pay the fee for medical reports required by the Employer for Sick Leave or Weekly Indemnity provisions to a maximum of fifty dollars ($50.00).

  • Technical Reports deliver to the Agent, and shall procure that the Manager shall deliver to the Agent, on request copies of the latest complete technical reports in respect of the Vessels.

  • Project Monitoring Reporting Evaluation A. The Project Implementing Entity shall monitor and evaluate the progress of its activities under the Project and prepare Project Reports in accordance with the provisions of Section 5.08(b) of the General Conditions and on the basis of indicators agreed with the Bank. Each such report shall cover the period of one

  • Electronic and Information Resources Accessibility and Security Standards a. Applicability: The following Electronic and Information Resources (“EIR”) requirements apply to the Contract because the Grantee performs services that include EIR that the System Agency's employees are required or permitted to access or members of the public are required or permitted to access. This Section does not apply to incidental uses of EIR in the performance of the Agreement, unless the Parties agree that the EIR will become property of the State of Texas or will be used by HHSC’s clients or recipients after completion of the Agreement. Nothing in this section is intended to prescribe the use of particular designs or technologies or to prevent the use of alternative technologies, provided they result in substantially equivalent or greater access to and use of a Product.

  • Reporting Security Incidents The Business Associate will report to the County any Incident of which the Business Associate becomes aware that is:

  • Security Controls for State Agency Data In accordance with Senate Bill 475, Acts 2021, 87th Leg., R.S., pursuant to Texas Government Code, Section 2054.138, Contractor understands, acknowledges, and agrees that if, pursuant to this Contract, Contractor is or will be authorized to access, transmit, use, or store data for System Agency, Contractor is required to meet the security controls the System Agency determines are proportionate with System Agency’s risk under the Contract based on the sensitivity of System Agency’s data and that Contractor must periodically provide to System Agency evidence that Contractor meets the security controls required under the Contract.

  • Project Monitoring Reporting and Evaluation The Recipient shall furnish to the Association each Project Report not later than forty-five (45) days after the end of each calendar semester, covering the calendar semester.

  • Financial Management; Financial Reports; Audits 1. The Recipient shall ensure that a financial management system is maintained in accordance with the provisions of Section 2.07 of the Standard Conditions.

  • Reporting Unsuccessful Security Incidents Business Associate shall provide Covered Entity upon written request a Report that: (a) identifies the categories of Unsuccessful Security Incidents; (b) indicates whether Business Associate believes its current defensive security measures are adequate to address all Unsuccessful Security Incidents, given the scope and nature of such attempts; and (c) if the security measures are not adequate, the measures Business Associate will implement to address the security inadequacies.

Time is Money Join Law Insider Premium to draft better contracts faster.