COMPLIANCE WITH INFOMATION SECURITY REQUIREMENTS Sample Clauses

COMPLIANCE WITH INFOMATION SECURITY REQUIREMENTS. Supplier shall comply with the Buyer’s latest applicable Information Security Requirements. The latest version is always to be found under our website - download area – “documents for suppliers” – under the name Information Security Requirements for Suppliers
AutoNDA by SimpleDocs

Related to COMPLIANCE WITH INFOMATION SECURITY REQUIREMENTS

  • Information Security Requirements In cases where the State is not permitted to manage/modify the automation equipment (server/computer/other) that controls testing or monitoring devices, the Contractor agrees to update and provide patches for the automation equipment and any installed operating systems or applications on a quarterly basis (at minimum). The Contractor will submit a report to the State of updates installed within 30 days of the installation as well as a Plan of Actions and Milestones (POA&M) to remediate any vulnerabilities ranging from Critical to Low. The contractor will provide an upgrade path or compensatory security controls for any operating systems and applications listed as beyond “end-of-life” or EOL, within 90 days of the EOL and complete the EOL system’s upgrade within 90 days of the approved plan.

  • Compliance with Accessibility Standards All parties to this Agreement shall ensure that the plans for and the construction of all projects subject to this Agreement are in compliance with standards issued or approved by the Texas Department of Licensing and Regulation (TDLR) as meeting or consistent with minimum accessibility requirements of the Americans with Disabilities Act (P.L. 101-336) (ADA).

  • Compliance with Obligations Buyer must have performed and complied with all its covenants and obligations required by this Agreement to be performed or complied with at or prior to Closing (singularly and in the aggregate) in all material respects.

  • Security Requirements 11.1 The Supplier shall comply, and shall procure the compliance of the Suppliers Personnel, with the Security Policy and the Security Plan and the Supplier shall ensure that the Security Plan produced by the Supplier fully complies with the Security Policy.

  • Data Security Requirements A. Data Transport. When transporting Confidential Information electronically, including via email, the data will be protected by:

  • Compliance with Privacy Code The parties acknowledge that the Warrant Agent may, in the course of providing services hereunder, collect or receive financial and other personal information about such parties and/or their representatives, as individuals, or about other individuals related to the subject matter hereof, and use such information for the following purposes:

  • Compliance with Procurement Laws This Contract is the result of compliance with applicable procurement laws of the State of Texas. DIR issued a solicitation on the Comptroller of Public Accounts’ Electronic State Business Daily, Request for Offer (RFO) DIR-TSO-TMP-225, on February 27, 2015, for Software, including Software as a Service, Products and Related Services. Upon execution of this Contract, a notice of award for RFO DIR-TSO-TMP-225 shall be posted by DIR on the Electronic State Business Daily.

  • Compliance with Federal Requirements Federal money will be used or may potentially be used to pay for all or part of the goods, construction or services under the Contract. The Contractor is responsible for compliance with all federal requirements imposed on the funds and accepts full financial responsibility for any requirements imposed by the Contractor’s failure to comply with federal requirements. Certification regarding Debarment, Suspension, Ineligibility, and Voluntary Exclusion. Federal money will be used or may potentially be used to pay for all or part of the work under the Contract, therefore Contractor certifies that it is in compliance with federal requirements on debarment, suspension, ineligibility and voluntary exclusion specified in the solicitation document implementing Executive Order 12549. Contractor’s certification is a material representation upon which the Contract award was based. Contingency Fees Prohibited.

  • Compliance with Privacy Laws NCPS represents and warrants that its collection, access, use, storage, disposal and disclosure of Personal Data does and will comply with all applicable federal and state privacy and data protection laws, as well as all other applicable regulations. Without limiting the foregoing, NCPS shall implement administrative, physical and technical safeguards to protect Personal Data that are no less rigorous than accepted industry, and shall ensure that all such safeguards, including the manner in which Personal Data is collected, accessed, used, stored, processed, disposed of and disclosed, comply with applicable data protection and privacy laws, as well as the terms and conditions of this Escrow Agreement. NCPS shall use and disclose Personal Data solely and exclusively for the purposes for which the Personal Data, or access to it, is provided pursuant to the terms and conditions of this Escrow Agreement, and not use, sell, rent, transfer, distribute, or otherwise disclose or make available Personal Data for NCPS’s own purposes or for the benefit of any party other than Issuer. For purposes of this section, “Personal Data” shall mean information provided to NCPS by or at the direction of the Issuer, or to which access was provided to NCPS by or at the direction of the Issuer, in the course of NCPS’s performance under this Escrow Agreement that: (i) identifies or can be used to identify an individual (also known as a “data subject”) (including, without limitation, names, signatures, addresses, telephone numbers, e-mail addresses and other unique identifiers); or (ii) can be used to authenticate an individual (including, without limitation, employee identification numbers, government-issued identification numbers, passwords or PINs, financial account numbers, credit report information, biometric or health data, answers to security questions and other personal identifiers), including the identifying information on individuals described in Section 12.

  • Compliance with Standards Although the standards for workmanship, material, and equipment have been selected in these specifications as a basis of reference, standards and specifications of the other bank member countries and recommendations of standards international organizations will be acceptable provided they are substantially equivalent to the designated standards and provided furthermore that the contractor submits for approval detailed specifications which he proposes to use. Reference to brand names or catalog numbers if any in these specifications have been made only for that equipment for which it has been determined that a degree of standardization is necessary to maintain certain essential features. And in certain cases such references have also been made for purposes of convenience to specify the requirements, in either case offers of alternative goods, which have similar characteristics and provide performance and quality at lease equal to those specified are acceptable. If the contractor offers materials, equipment, design calculations or tests, which conform to standards other than those specified, full details of the differences between the proposed standards and that specified in so far as they affect the design or purpose of the equipment, are to be supplied by the contractor if called upon to do so by the engineer, where required by the engineer for approval purposes, the contractor shall supply, without charge, duplicate copies of the proposed standards with English translations of the relevant portions. The contractor shall have available in his place of business (or in his supplier’s works) the relevant copies of standards or codes used for the use of the Engineer.

Time is Money Join Law Insider Premium to draft better contracts faster.