Monitoring/Standard Settings Sample Clauses

Monitoring/Standard Settings. Agree relevant performance targets in respect of:- - Timing - Content of development proposals including standards - Management standards including consultation, rent levels, lettings etc. - Non-housing elements/links with regeneration strategies • Agree monitoring arrangements on these targets • Agree changes in the programme in light of monitoring Agree annual review of performance of parties within this agreement.
AutoNDA by SimpleDocs

Related to Monitoring/Standard Settings

  • Monitoring System In each case in which the Custodian has exercised delegated authority to place Assets with a Foreign Custodian, the Custodian shall establish a system, to re-assess or re-evaluate selected Foreign Custodians, at least annually in accordance with Rule 17f-5(c)(3).

  • Monitoring Services IDT staff shall, using methods that include face-to-face and other contacts with the member, monitor the services a member receives. This monitoring shall ensure that:

  • Configuration Management The Contractor shall maintain a configuration management program, which shall provide for the administrative and functional systems necessary for configuration identification, control, status accounting and reporting, to ensure configuration identity with the UCEU and associated cables produced by the Contractor. The Contractor shall maintain a Contractor approved Configuration Management Plan that complies with ANSI/EIA-649 2011. Notwithstanding ANSI/EIA-649 2011, the Contractor’s configuration management program shall comply with the VLS Configuration Management Plans, TL130-AD-PLN-010-VLS, and shall comply with the following:

  • Patch Management All workstations, laptops and other systems that process and/or 22 store PHI COUNTY discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or 23 transmits on behalf of COUNTY must have critical security patches applied, with system reboot if 24 necessary. There must be a documented patch management process which determines installation 25 timeframe based on risk assessment and vendor recommendations. At a maximum, all applicable 26 patches must be installed within thirty (30) calendar or business days of vendor release. Applications 27 and systems that cannot be patched due to operational reasons must have compensatory controls 28 implemented to minimize risk, where possible.

  • Security Management The Contractor shall comply with the requirements of the DOD 5200.1-M and the DD Form 254. Security of the Contractor’s electronic media shall be in accordance with the above documents. Effective Program Security shall require the Contractor to address Information Security and Operations Security enabled by the Security Classification Guides. The Contractor’s facility must be able to handle and store material up to the Classification Level as referenced in Attachment J-01, DD Form 254.

  • Measurement and Monitoring Tools Contractor shall implement measurement and monitoring tools and procedures reasonably designed to measure its performance of the Services and assess such performance against any applicable service levels. Contractor shall provide LAUSD with a monthly report of service level performance under any applicable Work Order. Upon LAUSD’s request, Contractor shall provide LAUSD with access to the measurement and monitoring tools described herein, and to any information that they generate.

  • Monitoring Arrangements 7.1 We will formally monitor the progress of the access agreement at least once a year through the Responsible Finance officer who will report annually to the Executive Group. Initial monitoring will be concerned with participation rates and the development of data on lower income and other under-represented groups, against which to monitor. When specific baselines, targets, and milestones are determined we will look to monitor against these.

  • Vulnerability Management BNY Mellon will maintain a documented process to identify and remediate security vulnerabilities affecting its systems used to provide the services. BNY Mellon will classify security vulnerabilities using industry recognized standards and conduct continuous monitoring and testing of its networks, hardware and software including regular penetration testing and ethical hack assessments. BNY Mellon will remediate identified security vulnerabilities in accordance with its process.

  • Reactivation To reactivate suspended Service, you must bring your account current through the month of reactivation by making payment in full of any outstanding balance, fees and other applicable charges. In addition, we may require a deposit before reactivating your Service. The amount of the deposit will not exceed one year of monthly fees. Any amounts deposited by you will appear on your statement as a credit, and service charges and other fees will be invoiced as described above. If you fail to pay any amount on a subsequent xxxx, the unpaid amount will be deducted each billing cycle from the credit amount. Credit amounts will not earn or accrue interest.

  • Financial Management System Subrecipient shall establish and maintain a sound financial management system, based upon generally accepted accounting principles. Contractor’s system shall provide fiscal control and accounting procedures that will include the following:

Time is Money Join Law Insider Premium to draft better contracts faster.