Protection of Critical Energy Infrastructure Information Sample Clauses

Protection of Critical Energy Infrastructure Information. If a Party designates information as “Critical Energy Infrastructure Information” as of the time of its furnishing, ColumbiaGrid shall not post such information on the public portion of its Website. If any Party, or other Person, seeks information so designated as CEII, ColumbiaGrid shall immediately notify the disclosing Party to seek its consent to release such information. If the disclosing Party does not consent, ColumbiaGrid shall not release the CEII and shall inform the requesting Party of the disclosing Party’s decision. Further, if information designated by a Party as CEII is made part of a filing submitted by ColumbiaGrid with the Commission, ColumbiaGrid shall take reasonable steps to ensure the protection of such information pursuant to the 18 C.F.R. § 388.112(b).
AutoNDA by SimpleDocs
Protection of Critical Energy Infrastructure Information. If a CIP-014 Transmission Owner designates information as “Critical Energy Infrastructure Information” as of the time of its furnishing, ColumbiaGrid shall not post such information on the public portion of its Website. If any CIP-014 Transmission Owner, or other Person, seeks information so designated as CEII, ColumbiaGrid shall immediately notify the disclosing CIP-014 Transmission Owner to seek its consent to release such information. If the disclosing CIP-014 Transmission Owner does not consent, ColumbiaGrid shall not release the CEII and shall inform the requesting CIP-014 Transmission Owner of the disclosing CIP-014 Transmission Owner’s decision. Further, if information designated by a CIP-014 Transmission Owner as CEII is made part of a filing submitted by ColumbiaGrid with the Commission, ColumbiaGrid shall take reasonable steps to ensure the protection of such information pursuant to the 18 C.F.R. § 388.112(b).
Protection of Critical Energy Infrastructure Information. If a VTL Party designates information as “Critical Energy Infrastructure Information” as of the time of its furnishing, ColumbiaGrid shall not post such information on the public portion of its Website. If any VTL Party, or other Person, seeks information so designated as CEII, ColumbiaGrid shall immediately notify the disclosing VTL Party to seek its consent to release such information. If the disclosing VTL Party does not consent, ColumbiaGrid shall not release the CEII and shall inform the requesting VTL Party of the disclosing VTL Party’s decision. Further, if information designated by a VTL Party as CEII is made part of a filing submitted by ColumbiaGrid with the Commission, ColumbiaGrid shall take reasonable steps to ensure the protection of such information pursuant to the 18 C.F.R. § 388.112(b).

Related to Protection of Critical Energy Infrastructure Information

  • Fire, Life Safety, and Accessibility Codes The following codes, in the versions approved by the Georgia State Fire Marshal/Fire Safety Commissioner and Department of Human Resources, shall be used. The Design Professional will designate any additional codes or special modifications in the Supplementary General Conditions.

  • Infrastructure (a) The Borrower has and will maintain a sufficient infrastructure to conduct its business as presently conducted and as contemplated to be conducted following its execution of this Agreement.

  • Accessibility of Web-Based Information and Applications For State Agency Authorized User Acquisitions: Any web-based information and applications development, or programming delivered pursuant to the contract or procurement, will comply with New York State Enterprise IT Policy NYS-P08-005, Accessibility of Web-Based Information and Applications as follows: Any web-based information and applications development, or programming delivered pursuant to the contract or procurement, will comply with New York State Enterprise IT Policy NYS-P08- 005, Accessibility of Web-Based Information and Applications as such policy may be amended, modified or superseded, which requires that state agency web-based information and applications are accessible to persons with disabilities. Web-based information and applications must conform to New York State Enterprise IT Policy NYS-P08-005 as determined by quality assurance testing. Such quality assurance testing will be conducted by the State Agency Authorized User and the results of such testing must be satisfactory to the Authorized User before web-based information and applications will be considered a qualified deliverable under the contract or procurement.

  • Electronic and Information Resources Accessibility and Security Standards a. Applicability: The following Electronic and Information Resources (“EIR”) requirements apply to the Contract because the Grantee performs services that include EIR that the System Agency's employees are required or permitted to access or members of the public are required or permitted to access. This Section does not apply to incidental uses of EIR in the performance of the Agreement, unless the Parties agree that the EIR will become property of the State of Texas or will be used by HHSC’s clients or recipients after completion of the Agreement. Nothing in this section is intended to prescribe the use of particular designs or technologies or to prevent the use of alternative technologies, provided they result in substantially equivalent or greater access to and use of a Product.

  • Foreign-Owned Companies in Connection with Critical Infrastructure If Texas Government Code, Section 2274.0102(a)(1) (relating to prohibition on contracts with certain foreign-owned companies in connection with critical infrastructure) is applicable to this Contract, pursuant to Government Code Section 2274.0102, Contractor certifies that neither it nor its parent company, nor any affiliate of Contractor or its parent company, is: (1) majority owned or controlled by citizens or governmental entities of China, Iran, North Korea, Russia, or any other country designated by the Governor under Government Code Section 2274.0103, or (2) headquartered in any of those countries.

  • Enterprise Information Management Standards Grantee shall conform to HHS standards for data management as described by the policies of the HHS Office of Data, Analytics, and Performance. These include, but are not limited to, standards for documentation and communication of data models, metadata, and other data definition methods that are required by HHS for ongoing data governance, strategic portfolio analysis, interoperability planning, and valuation of HHS System data assets.

  • Information Technology Accessibility Standards Any information technology related products or services purchased, used or maintained through this Grant must be compatible with the principles and goals contained in the Electronic and Information Technology Accessibility Standards adopted by the Architectural and Transportation Barriers Compliance Board under Section 508 of the federal Rehabilitation Act of 1973 (29 U.S.C. §794d), as amended. The federal Electronic and Information Technology Accessibility Standards can be found at: xxxx://xxx.xxxxxx-xxxxx.xxx/508.htm.

  • Access to Information Systems Access, if any, to DXC’s Information Systems is granted solely to perform the Services under this Order, and is limited to those specific DXC Information Systems, time periods and personnel as are separately agreed to by DXC and Supplier from time to time. DXC may require Supplier’s employees, subcontractors or agents to sign individual agreements prior to access to DXC’s Information Systems. Use of DXC Information Systems during other time periods or by individuals not authorized by DXC is expressly prohibited. Access is subject to DXC business control and information protection policies, standards and guidelines as may be modified from time to time. Use of any other DXC Information Systems is expressly prohibited. This prohibition applies even when an DXC Information System that Supplier is authorized to access, serves as a gateway to other Information Systems outside Supplier’s scope of authorization. Supplier agrees to access Information Systems only from specific locations approved for access by DXC. For access outside of DXC premises, DXC will designate the specific network connections to be used to access Information Systems.

  • Secure Information Handling and Transfers 7.1 Physical and electronic handling, processing and transferring of DWP Data, including secure access to systems and the use of encryption where appropriate.

  • Infrastructure Vulnerability Scanning Supplier will scan its internal environments (e.g., servers, network devices, etc.) related to Deliverables monthly and external environments related to Deliverables weekly. Supplier will have a defined process to address any findings but will ensure that any high-risk vulnerabilities are addressed within 30 days.

Time is Money Join Law Insider Premium to draft better contracts faster.