E-Verify The Contractor must use the U.S. Department of Homeland Security’s E-Verify system to verify the employment eligibility of all new employees hired during the term of the Contract for the services specified in the Contract. The Contractor must also include a requirement in subcontracts that the subcontractor must utilize the E-Verify system to verify the employment eligibility of all new employees hired by the subcontractor during the Contract term. In order to implement this provision, the Contractor must provide a copy of its DHS Memorandum of Understanding (MOU) to the Contract Manager within five (5) calendar days of Contract execution. If the Contractor is not enrolled in DHS E- Verify System, it will do so within five (5) calendar days of notice of Contract award and provide the Contract Manager a copy of its MOU within five (5) calendar days of Contract execution. The link to E-Verify is xxxxx://xxx.xxxxx.xxx/e-verify. Upon each Contractor or subcontractor new hire, the Contractor must provide a statement within five (5) calendar days to the Contract Manager identifying the new hire with its E-Verify case number.
Identity Verification In the case that the Subscriber provides telecommunication services to any Subscriber’s Customers pursuant to Section 8.1, the Subscriber is responsible for performing and shall perform personal identification of Subscriber’s Customer. SORACOM shall not bear any responsibility in relation to dealing with such matters.
Searchability Offering searchability capabilities on the Directory Services is optional but if offered by the Registry Operator it shall comply with the specification described in this section. 1.10.1 Registry Operator will offer searchability on the web-‐based Directory Service. 1.10.2 Registry Operator will offer partial match capabilities, at least, on the following fields: domain name, contacts and registrant’s name, and contact and registrant’s postal address, including all the sub-‐fields described in EPP (e.g., street, city, state or province, etc.). 1.10.3 Registry Operator will offer exact-‐match capabilities, at least, on the following fields: registrar id, name server name, and name server’s IP address (only applies to IP addresses stored by the registry, i.e., glue records). 1.10.4 Registry Operator will offer Boolean search capabilities supporting, at least, the following logical operators to join a set of search criteria: AND, OR, NOT. 1.10.5 Search results will include domain names matching the search criteria. 1.10.6 Registry Operator will: 1) implement appropriate measures to avoid abuse of this feature (e.g., permitting access only to legitimate authorized users); and 2) ensure the feature is in compliance with any applicable privacy laws or policies.
Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.
E-Verify Program Grantee certifies that it utilizes and will continue to utilize the U.S. Department of Homeland Security's E-Verify system to determine the eligibility of: A. all persons employed to perform duties within Texas during the term of the Grant Agreement; and B. all persons, (including subcontractors) assigned by the Grantee to perform work pursuant to the Grant Agreement within the United States of America.
Screening After you sign and date the consent document, you will begin screening. The purpose of the screening is to find out if you meet all of the requirements to take part in the study. Procedures that will be completed during the study (including screening) are described below. If you do not meet the requirements, you will not be able to take part in the study. The study investigator or study staff will explain why. As part of screening, you must complete all of the items listed below: • Give your race, age, gender, and ethnicity • Give your medical history o You must review and confirm the information in your medical history questionnaire • Give your drug, alcohol, and tobacco use history • Give your past and current medication and treatment history. This includes any over-the-counter or prescription drugs, such as vitamins, dietary supplements, or herbal supplements, taken in the past 28 days • Height and weight will be measured • Physical exam will be done • Electrocardiogram (ECG) will be collected. An ECG measures the electrical activity of the heart • You may be tested for COVID-19 o Blood tests for human immunodeficiency virus (HIV), hepatitis B, and hepatitis C o Blood tests to see how your blood clots ▪ Fibrinogen ▪ PT/INR/aPTT o Blood tests for amylase and lipase (enzymes that help with digestion, Part B only) o Blood tests for a lipid (fats) panel (Part B only) ▪ Total cholesterol ▪ Triglycerides ▪ HDL ▪ Direct HDL o Blood tests to check your thyroid function (Part B and Part C only) ▪ TSH ▪ Free T4 o Urine to test for drugs of abuse (illegal and prescription) o Urine tests to check your albumin/ creatinine ratio o Females who have not had a period for at least 12 months in a row will have a blood hormone test to confirm they cannot have children • The study investigator may decide to do an alcohol breath test • The use of proper birth control will be reviewed (males only) • You will be asked “How do you feel?” HIV, hepatitis B, and hepatitis C will be tested at screening. If anyone is exposed to your blood during the study, you will have these tests done again. If you have a positive test, you cannot be in or remain in the study. HIV is the virus that causes acquired immunodeficiency syndrome (AIDS). If your HIV test is positive, you will be told about the results. It may take weeks or months after being infected with HIV for the test to be positive. The HIV test is not always right. Having certain infections or positive test results may have to be reported to the State Department of Health. This includes results for HIV, hepatitis, and other infections. If you have any questions about what information is required to be reported, please ask the study investigator or study staff. Although this testing is meant to be private, complete privacy cannot be guaranteed. For example, it is possible for a court of law to get health or study records without your permission.
Message Screening 7.4.4.4.1 BellSouth shall set message screening parameters so as to accept valid messages from MRC local or tandem switching systems destined to any signaling point within BellSouth’s SS7 network where the MRC switching system has a valid signaling relationship. 7.4.4.4.2 BellSouth shall set message screening parameters so as to pass valid messages from MRC local or tandem switching systems destined to any signaling point or network accessed through BellSouth’s SS7 network where the MRC switching system has a valid signaling relationship. 7.4.4.4.3 BellSouth shall set message screening parameters so as to accept and pass/send valid messages destined to and from MRC from any signaling point or network interconnected through BellSouth’s SS7 network where the MRC SCP has a valid signaling relationship.
Medical Verification The Town may require medical verification of an employee’s absence if the Town perceives the employee is abusing sick leave or has used an excessive amount of sick leave. The Town may require medical verification of an employee’s absence to verify that the employee is able to return to work with or without restrictions.
Medical Records Medical records relating to Trial Subjects that are not submitted to Sponsor may include some of the same information as is included in Trial Data; however, Sponsor makes no claim of ownership to those documents or the information they contain.
Searchable Whois Notwithstanding anything else in this Agreement, Registry Operator must offer a searchable Whois service compliant with the requirements described in Section 1.10 of Specification 4 of this Agreement. Registry Operator must make available the services only to authenticated users after they logged in by supplying proper credentials (i.e., user name and password). Registry Operator must issue such credentials exclusively to eligible users and institutions that supply sufficient proof of their legitimate interest in this feature (e.g., law enforcement agencies).