Program Security Clause Samples

Program Security. A. It is the obligation of management to provide the opportunity for continuation and completion of any academic training program for which a member of this bargaining unit was accepted. The County will require that all programs follow ACGME notification requirements regarding program accreditation status. B. In the event of the termination of any residency program for any reason whatsoever, management shall follow all ACGME guidelines including "Program Closure/Reduction" and make every reasonable effort to place any affected residents in another accredited residency program, prioritizing placement in the appropriate specialty in accordance with ACGME guidelines. DHS shall make every reasonable effort to place any affected residents in the following order: at another DHS facility; at another accredited program within the Southern California area, or another accredited program within California.
Program Security. The System shall include equipment so that any pay-per-view programming can only be activated by the positive action of a Subscriber using, for example, a private identification number or other individual selection procedure.
Program Security. The Cable System shall include equipment so that any pay-per- view Programming can only be activated by the positive action of a Subscriber using, for example, a private identification number or other individual selection procedure.
Program Security a. The Authority shall notify each resident physician affected and CIR/SEIU: • With a minimum of ninety (90) days written notice to the Union, and upon written request of the Union, the Authority agrees to meet and confer over the effects of a decision to discontinue any Program for any reason. • Upon receipt from ACGME, or any other relevant accrediting body of any notification regarding non-accreditation or probation or similar change in the accreditation status of any Program, the Authority shall provide a minimum of 30 days written notice and, upon written request of the Union, agrees to meet and confer over the effects. • The Authority shall provide a minimum of 30 days written notice and, upon written request of the Union, agrees to meet and confer over the effects of a decision to merge, close, or change the number of beds that has a substantial impact on any Program. b. For resident physicians continuing in a Program for which accreditation is lost, KMC shall maintain levels of training, continue to provide rotations required for certification, and add ancillary and professional staff to cover losses in resident physician coverage. KMC shall take reasonable steps to try to gain full accreditation for the affected Program, to encourage resident physicians to remain in the Program, and to balance the service needs of KMC with the professional goals of the resident physicians involved.
Program Security. ‌ The Contractor shall develop a Program Protection Implementation Plan (CDRL A008) and implement and manage the security processes necessary to protect LDPE Program material per the SCG. If required by the classification of the program, or secondary payloads, hardware, or software, the contractor shall provide any required facilities and procedures for protecting, processing and handling Unclassified (including ITAR) up to TS/SCI items or data.
Program Security 

Related to Program Security

  • System Security (a) If any party hereto is given access to the other party’s computer systems or software (collectively, the “Systems”) in connection with the Services, the party given access (the “Availed Party”) shall comply with all of the other party’s system security policies, procedures and requirements that have been provided to the Availed Party in advance and in writing (collectively, “Security Regulations”), and shall not tamper with, compromise or circumvent any security or audit measures employed by such other party. The Availed Party shall access and use only those Systems of the other party for which it has been granted the right to access and use. (b) Each party hereto shall use commercially reasonable efforts to ensure that only those of its personnel who are specifically authorized to have access to the Systems of the other party gain such access, and use commercially reasonable efforts to prevent unauthorized access, use, destruction, alteration or loss of information contained therein, including notifying its personnel of the restrictions set forth in this Agreement and of the Security Regulations. (c) If, at any time, the Availed Party determines that any of its personnel has sought to circumvent, or has circumvented, the Security Regulations, that any unauthorized Availed Party personnel has accessed the Systems, or that any of its personnel has engaged in activities that may lead to the unauthorized access, use, destruction, alteration or loss of data, information or software of the other party hereto, the Availed Party shall promptly terminate any such person’s access to the Systems and immediately notify the other party hereto. In addition, such other party hereto shall have the right to deny personnel of the Availed Party access to its Systems upon notice to the Availed Party in the event that the other party hereto reasonably believes that such personnel have engaged in any of the activities set forth above in this Section 9.2(c) or otherwise pose a security concern. The Availed Party shall use commercially reasonable efforts to cooperate with the other party hereto in investigating any apparent unauthorized access to such other party’s Systems.

  • E7 Security The Authority shall be responsible for maintaining the security of the Authority premises in accordance with its standard security requirements. The Contractor shall comply with all security requirements of the Authority while on the Authority premises, and shall ensure that all Staff comply with such requirements.

  • Portfolio Security Portfolio Security will mean any security owned by the Fund.

  • Data Security The Provider agrees to utilize administrative, physical, and technical safeguards designed to protect Student Data from unauthorized access, disclosure, acquisition, destruction, use, or modification. The Provider shall adhere to any applicable law relating to data security. The provider shall implement an adequate Cybersecurity Framework based on one of the nationally recognized standards set forth set forth in Exhibit “F”. Exclusions, variations, or exemptions to the identified Cybersecurity Framework must be detailed in an attachment to Exhibit “H”. Additionally, Provider may choose to further detail its security programs and measures that augment or are in addition to the Cybersecurity Framework in Exhibit “F”. Provider shall provide, in the Standard Schedule to the DPA, contact information of an employee who ▇▇▇ may contact if there are any data security concerns or questions.

  • Network Security The AWS Network will be electronically accessible to employees, contractors and any other person as necessary to provide the Services. AWS will maintain access controls and policies to manage what access is allowed to the AWS Network from each network connection and user, including the use of firewalls or functionally equivalent technology and authentication controls. AWS will maintain corrective action and incident response plans to respond to potential security threats.