Security Requirements Sample Clauses

Security Requirements. 11.1 The Supplier shall comply, and shall procure the compliance of the Suppliers Personnel, with the Security Policy and the Security Plan and the Supplier shall ensure that the Security Plan produced by the Supplier fully complies with the Security Policy.
AutoNDA by SimpleDocs
Security Requirements. The Supplier shall comply, and shall procure the compliance of the Staff, with the Security Policy and the Security Management Plan (if any) and the Supplier shall ensure that the Security Management Plan produced by the Supplier fully complies with the Security Policy. The Customer shall notify the Supplier of any changes or proposed changes to the Security Policy. If the Supplier believes that a change or proposed change to the Security Policy will have a material and unavoidable cost implication to the provision of the Goods and/or Services it may notify the Customer. In doing so, the Supplier must support its request by providing evidence of the cause of any increased costs and the steps that it has taken to mitigate those costs. Any change to the Call Off Contract Charges shall then be subject to the Variation Procedure. Until and/or unless a change to the Call Off Contract Charges is agreed by the Customer pursuant to the Variation Procedure the Supplier shall continue to provide the Goods and/or Services in accordance with its existing obligations.
Security Requirements. 16 32.1.1 CONTRACTOR agrees to maintain the confidentiality of all COUNTY and 17 COUNTY-related records and information pursuant to all statutory laws relating to privacy and 18 confidentiality that currently exists or exists at any time during the term of this Agreement.
Security Requirements. A. Seller shall ensure that it is in compliance with all Federal and state employment laws and regulations governing verification of eligibility of employment for individuals hired by Seller or Seller Representatives prior to permitting such persons to perform Services.
Security Requirements. Authorized Users may have ongoing and/or periodic delivery and/or security restrictions that may affect service, particularly at correctional facilities. In addition, Contractor may be required to obtain security badges from the Authorized User for its employees. Authorized Users shall identify all such restrictions and requirements in the Project Definition, and Contractors are responsible for meeting all security requirements and shall take these restrictions into account when bidding on specific projects. All costs for meeting security requirements shall be included in the prices bid.
Security Requirements. The Contractor shall comply, and shall procure the compliance of the Contractor Personnel, with the Security Policy and the Security Plan and the Contractor shall ensure that the Security Plan produced by the Contractor fully complies with the Security Policy. The Authority shall notify the Contractor of any changes or proposed changes to the Security Policy. If the Contractor believes that a change or proposed change to the Security Policy will have a material and unavoidable cost implication to the Services it may submit a Change Request. In doing so, the Contractor must support its request by providing evidence of the cause of any increased costs and the steps that it has taken to mitigate those costs. Any change to the Charges shall then be agreed in accordance with the Change Control Procedure. Until and/or unless a change to the Charges is agreed by the Authority pursuant to this clause the Contractor shall continue to perform the Services in accordance with its existing obligations.
Security Requirements. 32.1.1 CONTRACTOR agrees to maintain the confidentiality of all 7 COUNTY and COUNTY-related records and information pursuant to all statutory 8 laws relating to privacy and confidentiality that currently exists or exists 9 at any time during the term of this Agreement. CONTRACTOR represents and 10 warrants that it has implemented and will maintain during the term of this 11 Agreement administrative, physical, and technical safeguards to reasonably 12 protect private and confidential client information, to protect against 13 anticipated threats to the security or integrity of COUNTY data, and to 14 protect against unauthorized physical or electronic access to or use of COUNTY 15 data. Such safeguards and controls shall include at a minimum: