SECURITY AND CONTROL PROCEDURES Sample Clauses

SECURITY AND CONTROL PROCEDURES. 3.2.1 Contractor shall develop Security and Control Procedures and shall submit a copy of such procedures for County review and acceptance upon contract award. Contractor’s procedure shall identify methods used by Contractor to ensure that County images are safeguarded at all times from unauthorized use and ensure that all information is safeguarded from improper disclosure in accordance with all applicable Federal, State, and local laws, rules and regulations and shall inform all of its officers, employees, and agents of Paragraph 7.7 (Confidentiality) in the body of the Agreement.. Contractor shall notify the County Project Manager(s) and Recorder Division Managers listed in Paragraph 3.1.14 above of any changes to the Security and Control Procedures within ten (10) days of making any changes.
AutoNDA by SimpleDocs
SECURITY AND CONTROL PROCEDURES. 1.6.1. BMI shall be responsible for safeguarding any and all County property in accordance with this Scope of Services.

Related to SECURITY AND CONTROL PROCEDURES

  • Security and Validation Procedures The Scheduling Coordinator shall apply to the Meter Data of the Scheduling Coordinator Metered Entities that it represents the security and validation procedures prescribed by the relevant Local Regulatory Authority. If the relevant Local Regulatory Authority has not prescribed any such procedures, the Scheduling Coordinator shall apply the procedures set forth in the CAISO Tariff. Meter Data submitted by a Scheduling Coordinator for Scheduling Coordinator Metered Entities shall conform to these standards unless the CAISO has, at its discretion, exempted the Scheduling Coordinator from these standards.

  • Security Procedures The Fund shall comply with data access operating standards and procedures and with user identification or other password control requirements and other security procedures as may be issued from time to time by State Street for use of the System on a remote basis and to access the Data Access Services. The Fund shall have access only to the Fund Data and authorized transactions agreed upon from time to time by State Street and, upon notice from State Street, the Fund shall discontinue remote use of the System and access to Data Access Services for any security reasons cited by State Street; provided, that, in such event, State Street shall, for a period not less than 180 days (or such other shorter period specified by the Fund) after such discontinuance, assume responsibility to provide accounting services under the terms of the Custodian Agreement.

  • System Security and Data Safeguards When SAP is given access to Licensee’s systems and data, SAP shall comply with Licensee’s reasonable administrative, technical, and physical safeguards to protect such data and guard against unauthorized access. In connection with such access, Licensee shall be responsible for providing Consultants with user authorizations and passwords to access its systems and revoking such authorizations and terminating such access, as Licensee deems appropriate from time to time. Licensee shall not grant SAP access to Licensee systems or personal information (of Licensee or any third party) unless such access is essential for the performance of Services under the Agreement. The parties agree that no breach of this provision shall be deemed to have occurred in the event of SAP non-conformance with the aforementioned safeguard but where no personal information has been compromised.

  • AML/KYC Procedures “AML/KYC Procedures” means the customer due diligence (CDD) procedures of a Reporting Financial Institution pursuant to the anti-money laundering or similar requirements of the jurisdiction concerned to which such Reporting Financial Institution is subject.

  • Safety and Security Procedures Contractor shall maintain and enforce, at the Contractor Work Locations, industry-standard safety and physical security policies and procedures. While at each Court Work Location, Contractor shall comply with the safety and security policies and procedures in effect at such Court Work Location.

  • T1 IDENTIFICATION PROCEDURES During the restoration of service after a disaster, BellSouth may be forced to aggregate traffic for delivery to a CLEC. During this process, T1 traffic may be consolidated onto DS3s and may become unidentifiable to the Carrier. Because resources will be limited, BellSouth may be forced to "package" this traffic entirely differently then normally received by the CLECs. Therefore, a method for identifying the T1 traffic on the DS3s and providing the information to the Carriers is required.

  • Application Procedures a) An employee applies for a listing on the system-wide registry through the employee’s Human Resources Department by completing the form in Appendix B.

  • Notification Procedures To address non-compliance, the receiving Competent Authority would notify the providing Competent Authority pursuant to Article 5 of the IGA. The notification procedures would differ depending upon whether the receiving Competent Authority seeks to address administrative or other minor errors or significant non-compliance.

  • Administrative Procedures Administrative procedures with respect to the sale of Notes shall be agreed upon from time to time by the Agents and the Company (the "Procedures"). The Agents and the Company agree to perform the respective duties and obligations specifically provided to be performed by them in the Procedures.

  • CUSTOMS PROCEDURES 1. Each Party shall endeavour to apply its customs procedures in a predictable, consistent and transparent manner.

Time is Money Join Law Insider Premium to draft better contracts faster.