Security Administrator and Authorized Users Sample Clauses

Security Administrator and Authorized Users. Grantee shall:
AutoNDA by SimpleDocs
Security Administrator and Authorized Users. Grantee shall: ATTACHMENT E (REVISED AUGUST 2021)
Security Administrator and Authorized Users. Grantee shall: 1. Designate a Security Administrator and a back-up Security Administrator. The Security Administrator is required to implement and maintain a system for management of user accounts/user roles to ensure that all the CMBHS user accounts are current. 2. Have a security policy that ensures adequate system security and protection of confidential information. 3. Notify the CMBHS Help-desk within ten (10) business days of any change to the designated Security Administrator or the back-up Security Administrator. Grantee will: i. Ensure that access to CMBHS is restricted to only currently authorized users. ii. Within 24 hours, remove access to users who are no longer authorized to have access to secure data in CMBHS. iii. Maintain the CMBHS Authorized Users List which includes former and current Grantee’s employees, contracted labor, subcontractors or any other users authorized to have access to secure data in CMBHS. The CMBHS Authorized Users List shall document whose authority has been added and terminated; and the date the authority was added and terminated. 4. Submit the CMBHS Security Attestation Form and the CMBHS Authorized Users List as stated in Attachment A, to the following e-mail address: XxxxxxxxxXxxxx.Xxxxxxxxx@xxxx.xxxxx.xx.
Security Administrator and Authorized Users. Contractor shall designate a Security Administrator and a back-up Security Administrator. The Security Administrator is required to implement and maintain a system for management of user accounts/user roles to ensure that all the CMBHS user accounts are current. Contractor shall have a security policy that ensures adequate system security and protection of confidential information. Contractor shall notify the CMBHS Help-desk within ten (10) business days of any change to the designated Security Administrator or the back-up Security Administrator.
Security Administrator and Authorized Users. Performing Agency shall:

Related to Security Administrator and Authorized Users

  • Cloud Computing State Risk and Authorization Management Program In accordance with Senate Bill 475, Acts 2021, 87th Leg., R.S., pursuant to Texas Government Code, Section 2054.0593, Contractor acknowledges and agrees that, if providing cloud computing services for System Agency, Contractor must comply with the requirements of the state risk and authorization management program and that System Agency may not enter or renew a contract with Contractor to purchase cloud computing services for the agency that are subject to the state risk and authorization management program unless Contractor demonstrates compliance with program requirements. If providing cloud computing services for System Agency that are subject to the state risk and authorization management program, Contractor certifies it will maintain program compliance and certification throughout the term of the Contract.

  • Title VI List of Pertinent Nondiscrimination Acts and Authorities During the performance of this contract, the Consultant, for itself, its assignees, and successors in interest (hereinafter referred to as the “Consultant”) agrees to comply with the following non-discrimination statutes and authorities; including but not limited to: • Title VI of the Civil Rights Act of 1964 (42 U.S.C. § 2000d et seq., 78 stat. 252), (prohibits discrimination on the basis of race, color, national origin); • 49 CFR part 21 (Non-discrimination In Federally-Assisted Programs of The Department of Transportation—Effectuation of Title VI of The Civil Rights Act of 1964); • The Uniform Relocation Assistance and Real Property Acquisition Policies Act of 1970, (42 U.S.C. § 4601), (prohibits unfair treatment of persons displaced or whose property has been acquired because of Federal or Federal-aid programs and projects); • Section 504 of the Rehabilitation Act of 1973, (29 U.S.C. § 794 et seq.), as amended, (prohibits discrimination on the basis of disability); and 49 CFR part 27; • The Age Discrimination Act of 1975, as amended, (42 U.S.C. § 6101 et seq.), (prohibits discrimination on the basis of age); • Airport and Airway Improvement Act of 1982, (49 USC § 471, Section 47123), as amended, (prohibits discrimination based on race, creed, color, national origin, or sex); • The Civil Rights Restoration Act of 1987, (PL 100-209), (Broadened the scope, coverage and applicability of Title VI of the Civil Rights Act of 1964, The Age Discrimination Act of 1975 and Section 504 of the Rehabilitation Act of 1973, by expanding the definition of the terms “programs or activities” to include all of the programs or activities of the Federal-aid recipients, sub-recipients and contractors, whether such programs or activities are Federally funded or not); • Titles II and III of the Americans with Disabilities Act of 1990, which prohibit discrimination on the basis of disability in the operation of public entities, public and private transportation systems, places of public accommodation, and certain testing entities (42 U.S.C. §§ 12131 – 12189) as implemented by Department of Transportation regulations at 49 CFR parts 37 and 38; • The Federal Aviation Administration’s Non-discrimination statute (49 U.S.C. § 47123) (prohibits discrimination on the basis of race, color, national origin, and sex); • Executive Order 12898, Federal Actions to Address Environmental Justice in Minority Populations and Low-Income Populations, which ensures non-discrimination against minority populations by discouraging programs, policies, and activities with disproportionately high and adverse human health or environmental effects on minority and low-income populations; • Executive Order 13166, Improving Access to Services for Persons with Limited English Proficiency, and resulting agency guidance, national origin discrimination includes discrimination because of limited English proficiency (LEP). To ensure compliance with Title VI, you must take reasonable steps to ensure that LEP persons have meaningful access to your programs (70 Fed. Reg. at 74087 to 74100); • Title IX of the Education Amendments of 1972, as amended, which prohibits you from discriminating because of sex in education programs or activities (20 U.S.C. 1681 et seq).

  • T1 IDENTIFICATION PROCEDURES During the restoration of service after a disaster, BellSouth may be forced to aggregate traffic for delivery to a CLEC. During this process, T1 traffic may be consolidated onto DS3s and may become unidentifiable to the Carrier. Because resources will be limited, BellSouth may be forced to "package" this traffic entirely differently then normally received by the CLECs. Therefore, a method for identifying the T1 traffic on the DS3s and providing the information to the Carriers is required.

  • Data Ownership and Authorized Access 1. Student Data Property of LEA. All Student Data transmitted to the Provider pursuant to the Service Agreement is and will continue to be the property of and under the control of the LEA. The Provider further acknowledges and agrees that all copies of such Student Data transmitted to the Provider, including any modifications or additions or any portion thereof from any source, are subject to the provisions of this DPA in the same manner as the original Student Data. The Parties agree that as between them, all rights, including all intellectual property rights in and to Student Data contemplated per the Service Agreement, shall remain the exclusive property of the LEA. For the purposes of FERPA, the Provider shall be considered a School Official, under the control and direction of the LEA as it pertains to the use of Student Data, notwithstanding the above.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!