Measures SAP protects its assets and facilities using the appropriate means based on the SAP Security Policy • In general, buildings are secured through access control systems (e.g., smart card access system). • As a minimum requirement, the outermost entrance points of the building must be fitted with a certified key system including modern, active key management. • Depending on the security classification, buildings, individual areas and surrounding premises may be further protected by additional measures. These include specific access profiles, video surveillance, intruder alarm systems and biometric access control systems. • Access rights are granted to authorized persons on an individual basis according to the System and Data Access Control measures (see Section 1.2 and 1.3 below). This also applies to visitor access. Guests and visitors to SAP buildings must register their names at reception and must be accompanied by authorized SAP personnel. • SAP employees and external personnel must wear their ID cards at all SAP locations.
Safeguards Business Associate, its Agent(s) and Subcontractor(s) shall implement and use appropriate safeguards to prevent the use or disclosure of PHI other than as provided for by this Agreement. With respect to any PHI that is maintained in or transmitted by electronic media, Business Associate or its Subcontractor(s) shall comply with 45 CFR sections 164.308 (administrative safeguards), 164.310 (physical safeguards), 164.312 (technical safeguards) and 164.316 (policies and procedures and documentation requirements). Business Associate or its Agent(s) and Subcontractor(s) shall identify in writing upon request from Covered Entity all of the safeguards that it uses to prevent impermissible uses or disclosures of PHI.
Safety Where an employee is prevented from working at the employee’s particular function as a result of unsafe conditions caused by the inclement weather, the employee may be transferred to other work in the employee’s classification on site, until the unsafe conditions are rectified. Where such alternative is not available and until the unsafe conditions are rectified, the employee shall remain on site. The employee shall be paid for such time without reduction of the employees’ inclement weather entitlement.
Quality Control A. Controlled Affiliate agrees to use the Licensed Marks and Name only in connection with the licensed services and further agrees to be bound by the conditions regarding quality control shown in attached Exhibit A as they may be amended by BCBSA from time-to-time.
Stability 14.01 Maintain a documented, ongoing stability program to monitor the stability of the Product using stability indicating procedures. X 14.02 Data analysis and trending reporting will be performed. X
Mitigation Measures Company shall take commercially reasonable measures (except measures causing it to incur out-of-pocket expenses which BNYM does not agree in advance to reimburse) to mitigate losses or potential losses to BNYM, including taking verification, validation and reconciliation measures that are commercially reasonable or standard practice in the Company’s business.
Quality All products will be new and unused. All products provided by the Contractor must meet all federal, state, and local standards for quality and safety requirements. Products not meeting the requirements of this section will be deemed unacceptable and returned to the Contractor for credit at no charge to the State.
Procurement All goods, works and services required for the Project and to be financed out of the proceeds of the Financing shall be procured in accordance with the provisions of Section III of Schedule 2 to the Financing Agreement.
Animals The Hirer shall ensure that no animals (including birds) except guide dogs are brought into the premises, other than for a special event agreed to by the Village Hall. No animals whatsoever are to enter the kitchen at any time.
Virus Management Transfer Agent shall maintain a malware protection program designed to deter malware infections, detect the presence of malware within the Transfer Agent environment.