xxx/OpenGovernment/LobbingAtOrangeCounty aspx A lobbying blackout period shall commence upon issuance of the solicitation until the Board selects the Contractor. For procurements that do not require Board approval, the blackout period commences upon solicitation issuance and concludes upon contract award. The County may void any contract where the County Mayor, one or more County Commissioners, or a County staff person has been lobbied in violation of the black-out period restrictions of Ordinance No. 2002-15. • Orange County Protest Procedures xxxx://xxx.xxxxxxxxxxxxxx.xxx/VendorServices/XxxxxxXxxxxxxXxxxxxxxxx.xx px Failure to file a protest with the Manager, Procurement Division by 5:00 PM on the fifth full business day after posting, shall constitute a waiver of bid protest proceedings.
Asset Management Supplier will: i) maintain an asset inventory of all media and equipment where Accenture Data is stored. Access to such media and equipment will be restricted to authorized Personnel; ii) classify Accenture Data so that it is properly identified and access to it is appropriately restricted; iii) maintain an acceptable use policy with restrictions on printing Accenture Data and procedures for appropriately disposing of printed materials that contain Accenture Data when such data is no longer needed under the Agreement; iv) maintain an appropriate approval process whereby Supplier’s approval is required prior to its Personnel storing Accenture Data on portable devices, remotely accessing Accenture Data, or processing such data outside of Supplier facilities. If remote access is approved, Personnel will use multi-factor authentication, which may include the use of smart cards with certificates, One Time Password (OTP) tokens, and biometrics.
Contract Management To ensure full performance of the Contract and compliance with applicable law, the System Agency may take actions including:
Network Management 60.1 CLEC and CenturyLink will exchange appropriate information (e.g., network information, maintenance contact numbers, escalation procedures, and information required to comply with requirements of law enforcement and national security agencies) for network management purposes. In addition, the Parties will apply sound network management principles to alleviate or to prevent traffic congestion and to minimize fraud associated with third number billed calls, calling card calls, and other services related to this Agreement.
Virus Management Transfer Agent shall maintain a malware protection program designed to deter malware infections, detect the presence of malware within the Transfer Agent environment.
Investment Management If and to the extent requested by the Advisor, the Sub-Advisor shall, subject to the supervision of the Advisor, manage all or a portion of the investments of the Portfolio in accordance with the investment objective, policies and limitations provided in the Portfolio's Prospectus or other governing instruments, as amended from time to time, the Investment Company Act of 1940 (the "1940 Act") and rules thereunder, as amended from time to time, and such other limitations as the Trust or Advisor may impose with respect to the Portfolio by notice to the Sub-Advisor. With respect to the portion of the investments of the Portfolio under its management, the Sub-Advisor is authorized to make investment decisions on behalf of the Portfolio with regard to any stock, bond, other security or investment instrument, and to place orders for the purchase and sale of such securities through such broker-dealers as the Sub-Advisor may select. The Sub-Advisor may also be authorized, but only to the extent such duties are delegated in writing by the Advisor, to provide additional investment management services to the Portfolio, including but not limited to services such as managing foreign currency investments, purchasing and selling or writing futures and options contracts, borrowing money or lending securities on behalf of the Portfolio. All investment management and any other activities of the Sub-Advisor shall at all times be subject to the control and direction of the Advisor and the Trust's Board of Trustees.
COMPETENT SUPERVISORY AUTHORITY Identify the competent supervisory authority/ies in accordance with Clause 13 … ANNEX II - TECHNICAL AND ORGANISATIONAL MEASURES INCLUDING TECHNICAL AND ORGANISATIONAL MEASURES TO ENSURE THE SECURITY OF THE DATA EXPLANATORY NOTE: The technical and organisational measures must be described in specific (and not generic) terms. See also the general comment on the first page of the Appendix, in particular on the need to clearly indicate which measures apply to each transfer/set of transfers. Description of the technical and organisational measures implemented by the data importer(s) (including any relevant certifications) to ensure an appropriate level of security, taking into account the nature, scope, context and purpose of the processing, and the risks for the rights and freedoms of natural persons. [Examples of possible measures: • Measures of pseudonymisation and encryption of personal data • Measures for ensuring ongoing confidentiality, integrity, availability and resilience of processing systems and services • Measures for ensuring the ability to restore the availability and access to personal data in a timely manner in the event of a physical or technical incident • Processes for regularly testing, assessing and evaluating the effectiveness of technical and organisational measures in order to ensure the security of the processing • Measures for user identification and authorisation • Measures for the protection of data during transmission • Measures for the protection of data during storage • Measures for ensuring physical security of locations at which personal data are processed • Measures for ensuring events logging • Measures for ensuring system configuration, including default configuration • Measures for internal IT and IT security governance and management • Measures for certification/assurance of processes and products • Measures for ensuring data minimisation • Measures for ensuring data quality • Measures for ensuring limited data retention • Measures for ensuring accountability • Measures for allowing data portability and ensuring erasure]
Management Grievance The Employer may initiate a grievance at Step 3 of the grievance procedure by the Employer or designate presenting the grievance to the President of the Union or designate. Time limits and process are identical to a union grievance.
Certificate of Operating Authority A certification by the State Commission that CLEC has been authorized to operate within the State as a provider of local Telephone Exchange Services within CenturyLink’s local service area; in many states this certification is known as a Certificate of Public Convenience and Necessity. CIC: An acronym for Carrier Identification Code. CLASS: An acronym for Custom Local Area Signaling Services. CLASS is based on the availability of Common Channel Signaling (CCS). CLASS consists of number- translation services such as call-forwarding and caller identification, available within a local exchange. CLASS is a service mark of Bellcore, now Telcordia. CLEC Profile: A CenturyLink form required to be completed and submitted to CenturyLink by any Telecommunications Carrier requesting to interconnect or exchange traffic with CenturyLink’s network, requesting unbundled access to CenturyLink’s Network Elements, or the ability to initiate any order submission to CenturyLink. Among other things, a Telecommunication Carrier is required to provide CenturyLink, on the CLEC Profile, the following: its Operating Company Number (OCN), Company Code (CC), and Access Carrier Name Abbreviation (ACNA). CLLI Codes: Common Language Location Identifier Codes. Collocation: An arrangement whereby a requesting Telecommunications Carrier may locate equipment necessary for Interconnection or access to Unbundled Network Elements at CenturyLink Central Offices for the purposes of interconnecting with CenturyLink’s network or for accessing CenturyLink’s Unbundled Network Elements pursuant to the Interconnection obligations under the Act as codified in 47 C.F.R. §51. Commingle: The act of Commingling. Commingling: The connecting, attaching, or otherwise linking of an unbundled Network Element, or a combination of unbundled Network Elements, to one or more facilities or services that CLEC has obtained at wholesale from CenturyLink or the combining of an unbundled Network Element, or a combination of unbundled Network Elements with one or more such facilities or services. Commission: The State Public Service or Public Utility Commission, as applicable. Common Channel Signaling (CCS): A high-speed, specialized, packet-switched communications network that is separate (out-of-band) from the public packet-switched and message networks. CCS carries addressed signaling messages for individual trunk circuits and/or database-related services between Signaling Points in the CCS network using SS7 signaling protocol. Common Transport: An interoffice transmission path between End Office Switches, between End Office Switches and Tandem Switches and between Tandem Switches in CenturyLink’s network. Common Transport paths/Common Tandem Trunks are shared between multiple customers and are required to be switched at the Tandem Switch. Company Identifier or Company ID: A three to five (3 to 5) character identifier that distinguishes the entity providing voice service (e.g. wireline, wireless, VoIP, etc.) to the End User. The Company Identifier registry is maintained by NENA in a nationally accessible database. Competitive Local Exchange Carrier (CLEC): As defined in 47 U.S.C. §153, authorized to provide Telephone Exchange Services or Exchange Access Services in competition with an ILEC.
Records Management Records the Provider must keep