Project Risk Log Sample Clauses

Project Risk Log. A Project Risk Log will be maintained throughout the Project Monitoring Period in a format satisfactory to the Authority. The baseline position is captured within the approved Business Case appendices. In accordance with clause 12, the Recipient is to comply with, and shall ensure that any sub- contractors comply with, the publicity requirements and use of the logos included in the South Yorkshire Mayoral Combined Authority and the funders brand guidelines. The Recipient is to liaise with the Grant Manager in the first instance on all matters related to the suitability of proposed acknowledgement, brand application and publicity in media. The Grant Manager will work with the SYMCA marketing team for publicity approvals, brand application and marketing suggestions.
Project Risk Log. The Recipient will maintain a Project Risk Log throughout the Project Monitoring Period in a format satisfactory to the Authority. An up to date Project Risk Log is to be submitted to the Authority in accordance with the reporting provisions within Schedule 5.

Related to Project Risk Log

  • Critical Infrastructure Subcontracts For purposes of this Paragraph, the designated countries are China, Iran, North Korea, Russia, and any countries lawfully designated by the Governor as a threat to critical infrastructure. Pursuant to Section 113.002 of the Business and Commerce Code, Contractor shall not enter into a subcontract that will provide direct or remote access to or control of critical infrastructure, as defined by Section 113.001 of the Texas Business and Commerce Code, in this state, other than access specifically allowed for product warranty and support purposes to any subcontractor unless (i) neither the subcontractor nor its parent company, nor any affiliate of the subcontractor or its parent company, is majority owned or controlled by citizens or governmental entities of a designated country; and (ii) neither the subcontractor nor its parent company, nor any affiliate of the subcontractor or its parent company, is headquartered in a designated country. Contractor will notify the System Agency before entering into any subcontract that will provide direct or remote access to or control of critical infrastructure, as defined by Section 113.001 of the Texas Business & Commerce Code, in this state.

  • Infrastructure Vulnerability Scanning Supplier will scan its internal environments (e.g., servers, network devices, etc.) related to Deliverables monthly and external environments related to Deliverables weekly. Supplier will have a defined process to address any findings but will ensure that any high-risk vulnerabilities are addressed within 30 days.