Security agenda Sample Clauses

Security agenda. 18. Security is a broad concept. It is not limited to protection against external armed threats, which is the responsibility of the army, or protection against threats to the public order and internal security, which is the responsibility of the National Civil Police. All the Guatemala peace agreements posit that a firm and lasting peace must be based on respect for human rights and for the multi-ethnic, multicultural and multilingual character of the Guatemalan nation; national economic development with social justice; social participation; the conciliation of interests; and democratic institution- building.
AutoNDA by SimpleDocs

Related to Security agenda

  • Security Audit Customer agrees that PROS’ Audit Report will be used to satisfy any audit or inspection requests by or on behalf of Customer, and PROS will make Audit Reports available to Customer upon request. PROS will promptly remediate any material weaknesses or significant control deficiencies identified in any Audit Reports. In the event that an audit opinion is qualified and the qualification has not been remediated by the date of the Audit Report, PROS shall (i) provide Customer with PROS remediation plan; and (ii) execute such plan in accordance with its terms.

  • Security Audits Each Contract Year, County may perform or have performed security reviews and testing based on an IT infrastructure review plan. Such testing shall ensure all pertinent County security standards as well as any customer agency requirements, such as federal tax requirements or HIPPA.

  • Financing Statements Subject to the Standard Qualifications, each Mortgage Loan or related security agreement establishes a valid security interest in, and a UCC-1 financing statement has been filed and/or recorded (or, in the case of fixtures, the Mortgage constitutes a fixture filing) in all places necessary at the time of the origination of the Mortgage Loan (or, if not filed and/or recorded, has submitted or caused to be submitted in proper form for filing and/or recording) to perfect a valid security interest in, the personal property (creation and perfection of which is governed by the UCC) owned by the Mortgagor and necessary to operate such Mortgaged Property in its current use other than (1) non-material personal property, (2) personal property subject to purchase money security interests and (3) personal property that is leased equipment. Each UCC-1 financing statement, if any, filed with respect to personal property constituting a part of the related Mortgaged Property and each UCC-3 assignment, if any, filed with respect to such financing statement was in suitable form for filing in the filing office in which such financing statement was filed. Notwithstanding anything herein to the contrary, no representation is made as to the perfection of any security interest in rents or other personal property to the extent that possession or control of such items or actions other than the filing of Uniform Commercial Code financing statements is required to effect such perfection.

  • Financing Statement To the extent permitted by applicable law, a carbon, photographic or other reproduction of this Agreement or any financing statement covering the Collateral shall be sufficient as a financing statement.

  • Security Protocols Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.

  • Security Badging Any Company employee, or any employee of its contractors or agents, that require unescorted access to the Security Identification Display Area (SIDA) to perform work under this Agreement will be badged with an Airport identification badge (hereinafter referred to as "Badge") provided by Authority’s ID Badging Department and will be subject to an FBI fingerprint-based criminal history records check (CHRC) and an annual Security Threat Assessment (STA). A new or renewed Badge will not be issued to an individual until the results of the CHRC and the STA are completed and indicate that the applicant has not been convicted of a disqualifying criminal offense. If the CHRC or STA discloses a disqualifying criminal offense, the individual’s new or renewed badge application will be rejected. The costs of the CHRC and the annual STA will be paid by Company. These costs are subject to change without notice, and Company will be responsible for paying any increase in the costs. All badged employees of Company and its contractors or agents will comply with Authority's regulations regarding the use and display of Badges. Company will be assessed a fine for each Badge that is lost, stolen, unaccounted for or not returned to Authority at the time of Badge expiration, employee termination, termination of the Agreement, or upon written request by Authority. This fine will be paid by Company within 15 days from the date of invoice. The fine is subject to change without notice, and Company will be responsible for paying any increase in the fine. If any Company employee is terminated or leaves Company’s employment, Authority must be notified immediately, and the Badge must be returned to Authority promptly.

  • SECURITY PROCESSES If requested by an Authorized User as part the Request for Quote process, Contractor shall complete a Consensus Assessment Initiative Questionnaire (CAIQ) including on an annual basis thereafter, if requested by the Authorized User. The CAIQ is available at Cloud Security Alliance (xxxxx://xxxxxxxxxxxxxxxxxxxxx.xxx/). The CAIQ may be used to assist the Authorized User in building the necessary assessment processes when engaging with Contractors. In addition to a request for a CAIQ, Contractor shall cooperate with all reasonable Authorized User requests for a Written description of Contractor’s physical/virtual security and/or internal control processes. The Authorized User shall have the right to reject any Contractor’s RFQ response or terminate an Authorized User Agreement when such a request has been denied. For example, Federal, State and local regulations and/or laws may require that Contractors operate within the Authorized User’s regulatory environment. In order to ensure that security is adequate and free of gaps in control coverage, the Authorized User may require information from the Contractor’s Service Organization Controls (SOC) audit report.

  • Security Arrangements Infrastructure security of electric system equipment and operations and control hardware and software is essential to ensure day-to-day reliability and operational security. FERC expects the NYISO, the Connecting Transmission Owner, Market Participants, and Interconnection Customers interconnected to electric systems to comply with the recommendations offered by the President’s Critical Infrastructure Protection Board and, eventually, best practice recommendations from the electric reliability authority. All public utilities are expected to meet basic standards for system infrastructure and operational security, including physical, operational, and cyber-security practices.

  • SECURITY POLICIES AND NOTIFICATIONS State Security Policies and Procedures The Contractor and its personnel shall review and be familiar with all State security policies, procedures and directives currently existing or implemented during the term of the Contract, including ITS Policy NYS-P03-002 Information Security Policy (or successor policy). Security Incidents Contractor shall address any Security Incidents in the manner prescribed in ITS Policy NYS-P03-002 Information Security Policy (or successor policy), including the New York State Cyber Incident Reporting Procedures incorporated therein or in such successor policy.

  • Special Instructions As used herein, the term "Special Instructions" shall mean Proper Instructions countersigned or confirmed in writing by the Treasurer or any Deputy or Assistant Treasurer of the applicable Fund or any other person designated by the Treasurer of such Fund in writing, which countersignature or confirmation shall be (i) included on the same instrument containing the Proper Instructions or on a separate instrument relating thereto, and (ii) delivered by hand, by facsimile transmission, or in such other manner as the applicable Fund and the Custodian agree in writing.

Time is Money Join Law Insider Premium to draft better contracts faster.