Core Security Standard Sample Clauses

Core Security Standard. Supported Library shall incorporate the "Core Security Standard" set forth in Appendix C in any third-party contract for services that can in any way interact with or impact the systems. Appendix C may be updated to reflect evolving security standards, without the need to amend this SLA. Examples of such third-party services include but are not limited to:  Basic information technology support  Equipment-specific servicesNetwork maintenance
AutoNDA by SimpleDocs

Related to Core Security Standard

  • SOFTWARE SECURITY If applicable, BA warrants that software security features will be compatible with the CE’s HIPAA compliance requirements. This HIPAA Business Associate Agreement-Addendum shall supersede any prior HIPAA Business Associate Agreements between CE and BA. EXHIBIT E

  • Future Services The Consultant acknowledges each of the following with regard to performing future services for the City: • The Consultant’s performance of Work in an Approved Service Order may create an actual or appearance of a conflict of interest with regard to the Consultant performing or participating in the performance of some related future services, particularly when the Work in an Approved Service Order comprises one element or aspect of a multi- phase process or project; • Such an actual or appearance of a conflict of interest would be a ground for the City to disqualify the Consultant from performing or participating in the performance of such future services; and • The Consultant is solely responsible for considering what potential conflicts of interest, if any, performing Work in an Approved Service Order might have on its ability to obtain contracts to perform future services.

  • Acupuncture Services Benefits will be provided for Medically Necessary acupuncture services when provided by a provider licensed to perform such services.

  • Signature Section For the CONTRACTOR Name (Please print) Title Signature Date For the MICHIGAN DEPARTMENT OF COMMUNITY HEALTH Xxxx Xxxx, Deputy Director, Operations Administration Date Part II General Provisions

  • CONFIDENTIALITY AND NON-DISCLOSURE; SECURITY BREACH REPORTING 2.1 For purposes of this Contract, confidential information will not include information or material which (a) enters the public domain (other than as a result of a breach of this Contract); (b) was in the receiving party’s possession prior to its receipt from the disclosing party; (c) is independently developed by the receiving party without the use of confidential information; (d) is obtained by the receiving party from a third party under no obligation of confidentiality to the disclosing party; or (e) is not exempt from disclosure under applicable State law.

  • Security Standards The Provider shall implement and maintain commercially reasonable security procedures and practices that otherwise meet or exceed industry standards designed to protect Student Data from unauthorized access, destruction, use, modification, or disclosure, including but not limited to the unauthorized acquisition of computerized data that compromises the security, confidentiality, or integrity of the Student Data (a "Security Breach"). For purposes of the DPA and this Exhibit G, "Security Breach" does not include the good faith acquisition of Student Data by an employee or agent of the Provider or LEA for a legitimate educational or administrative purpose of the Provider or LEA, so long as the Student Data is used solely for purposes permitted by SOPPA and other applicable law, and so long as the Student Data is restricted from further unauthorized disclosure.

  • Core Services The Company agrees to provide those Core Services to the Municipality as set forth in Schedule “A” and further agrees to the process contained in Schedule “A”.

  • Site Security While providing services at a DSHS location, the Contractor, its agents, employees, or Subcontractors shall conform in all respects with physical, fire, or other security regulations specific to the DSHS location.

  • Image Quality You are responsible for the image quality of any Image that you transmit. If an Image that we receive from you or for deposit to your Account is not of sufficient quality to satisfy our image quality standards as we may establish them from time to time, we may reject the Image without prior notice to you. Each Image must include the front and back of the Item and the following information must be clearly readable: amount, payee name, drawer signature, date, check number, account number, routing and transit number, MICR (Magnetic Ink Character Recognition) line, and any endorsement or other information written on the check.

  • Use; Quality Control a. Neither party may alter the other party’s trademarks from the form provided and must comply with removal requests as to specific uses of its trademarks or logos.

Time is Money Join Law Insider Premium to draft better contracts faster.