SECURITY REQUIREMENTS AND STAFF VETTING Sample Clauses

SECURITY REQUIREMENTS AND STAFF VETTING. 16.1 The CONTRACTOR shall comply, and shall procure the compliance of the CONTRACTOR Personnel, with the Security Policy and the Security Management Plan and the CONTRACTOR shall ensure that the Security Management Plan produced by the CONTRACTOR fully complies with the Security Policy.
AutoNDA by SimpleDocs
SECURITY REQUIREMENTS AND STAFF VETTING. The CONTRACTOR shall comply, and shall procure the compliance of the CONTRACTOR Personnel, with the Security Policy and the Security Management Plan and the CONTRACTOR shall ensure that the Security Management Plan produced by the CONTRACTOR fully complies with the Security Policy. The CUSTOMER shall notify the CONTRACTOR of any changes or proposed changes to the Security Policy. If the CONTRACTOR believes that a change or proposed change to the Security Policy will have a material and unavoidable cost implication to the Ordered IT Products it may submit a Contract Change Note. In doing so, the CONTRACTOR must support its request by providing evidence of the cause of any increased costs and the steps that it has taken to mitigate those costs. Any change to the Charges shall then be agreed in accordance with the Contract Change Procedure. Until and/or unless a change to the Charges is agreed by the CUSTOMER pursuant to Clause 16.3 the CONTRACTOR shall continue to provide the Ordered IT Products in accordance with its existing obligations. The CONTRACTOR shall, as an enduring obligation throughout the Term, use the latest versions of anti-virus definitions and software available from an industry accepted anti-virus software vendor to check for, contain the spread of, and minimise the impact of Malicious Software in the ICT Environment (or as otherwise agreed by the parties). Notwithstanding Clause 16.5, if Malicious Software is found, the parties shall co-operate to reduce the effect of the Malicious Software and, particularly if Malicious Software causes loss of operational efficiency or loss or corruption of CUSTOMER Data, assist each other to mitigate any losses and to restore the Ordered IT Products to their desired operating efficiency. Any cost arising out of the actions of the parties taken in compliance with the provisions of Clause 16.6 shall be borne by the parties as follows: by the CONTRACTOR where the Malicious Software originates from the CONTRACTOR Software, the Third Party Software supplied by the CONTRACTOR (except where the CUSTOMER has waived the obligation set out in Clause 16.5) or the CUSTOMER Data (whilst the CUSTOMER Data was under the control of the CONTRACTOR) unless the CONTRACTOR can demonstrate that such Malicious Software was present and not quarantined or otherwise identified by the CUSTOMER when provided to the CONTRACTOR; and by the CUSTOMER if the Malicious Software originates from the CUSTOMER Software (in respect of which ...
SECURITY REQUIREMENTS AND STAFF VETTING. 16.1 The SERVICE PROVIDER shall comply, and shall procure the compliance of the SERVICE PROVIDER Personnel, with the Security Policy and the Security Management Plan and the SERVICE PROVIDER shall ensure that the Security Management Plan produced by the SERVICE PROVIDER fully complies with the Security Policy.

Related to SECURITY REQUIREMENTS AND STAFF VETTING

  • Security Requirements 11.1 The Supplier shall comply, and shall procure the compliance of the Suppliers Personnel, with the Security Policy and the Security Plan and the Supplier shall ensure that the Security Plan produced by the Supplier fully complies with the Security Policy.

  • Facility Requirements 1. Maintain wheelchair accessibility to program activities according to governing law, including the Americans With Disabilities Act (ADA), as applicable.

  • City Requirements Design, construction, materials, sizing, other specifications, permitting, inspections, testing, documentation and furnishing of as-built drawings, and acceptance of completed infrastructure shall be in accordance with City Requirements. Design and construction shall be by professionals licensed in the state of North Carolina to do the relevant work. City approval of the design of the Improvements shall be required prior to construction, as set forth in City Requirements. If Developer is connecting to the County sewer system, the City may require Developer to furnish the contract providing for such connection.

  • E-Verify Requirements To the extent applicable under ARIZ. REV. STAT. § 41- 4401, the Contractor and its subcontractors warrant compliance with all federal immigration laws and regulations that relate to their employees and their compliance with the E-verify requirements under ARIZ. REV. STAT. § 23-214(A). Contractor’s or its subcontractor’s failure to comply with such warranty shall be deemed a material breach of this Agreement and may result in the termination of this Agreement by the City.

  • Accessibility Requirements Under Tex. Gov’t Code Chapter 2054, Subchapter M, and implementing rules of the Texas Department of Information Resources, the System Agency must procure Products and services that comply with the Accessibility Standards when those Products are available in the commercial marketplace or when those Products are developed in response to a procurement solicitation. Accordingly, Grantee must provide electronic and information resources and associated Product documentation and technical support that comply with the Accessibility Standards.

  • Federal Medicaid System Security Requirements Compliance Party shall provide a security plan, risk assessment, and security controls review document within three months of the start date of this Agreement (and update it annually thereafter) in order to support audit compliance with 45 CFR 95.621 subpart F, ADP System Security Requirements and Review Process.

  • TITLE VI REQUIREMENTS H-GAC in accordance with the provisions of Title VI of the Civil Rights Act of 1964 (78 Xxxx. 000, 00 X.X.X. §§ 0000x to 2000d-4) and the Regulations, hereby notifies all bidders that it will affirmatively ensure that any disadvantaged business enterprises will be afforded full and fair opportunity to submit in response to this Agreement and will not be discriminated against on the grounds of race, color, or national origin in consideration for an award.

  • Personal Property Requirements The Collateral Agent shall have received:

  • New Hampshire Specific Data Security Requirements The Provider agrees to the following privacy and security standards from “the Minimum Standards for Privacy and Security of Student and Employee Data” from the New Hampshire Department of Education. Specifically, the Provider agrees to:

  • Residency Requirements 1. All single first-year freshmen students are required to live in University housing for at least two academic semesters. All single students who have earned less than 30 credit hours and have not resided in University housing for two academic semesters are required to live on campus for two academic semesters. This policy does not apply to single first-year students who have been out of high school for more than one year, or to single first-year freshmen who live with their parents in Miami-Dade or Broward Counties. Neither does it apply to those students who, for disciplinary or administrative reasons, may be denied the privilege of continued residency on campus.

Time is Money Join Law Insider Premium to draft better contracts faster.