Security Sensitive Work Sample Clauses

Security Sensitive Work. “Security Sensitive Work” means any of the Services that requires (i) unescorted access of Supplier Personnel to any Company location, facility, or worksite; (ii) deploying any Supplier Personnel to perform Services at any Company customer location, facility, or worksite; or (iii) granting access to Company networks (i.e., having a GE-issued single sign-on account) to Supplier Personnel. To the extent permissible by applicable law, prior to Supplier or Supplier’s Personnel engaging in any Security Sensitive Work, Supplier shall, after securing written authorization from Supplier’s Personnel and at Supplier’s expense, perform background screening consistent with Company’s “Requirements for Supplier Personnel Screening” attached hereto as Schedule C. This screening shall include the prior seven (7) year period covering all locations in which Supplier’s Personnel resided and will verify employment details during this period. Supplier shall retain a copy of this screening report for Company’s inspection for at least three (3) years following the performance of such Security Sensitive Work by Supplier’s Personnel. Company reserves the right to determine, in its sole discretion, the type of work that will be designated as “security sensitive” under this Agreement.
AutoNDA by SimpleDocs
Security Sensitive Work. Project Co shall comply with the requirements regarding Security Sensitive Work set out in Section 11 [Security Sensitive Work] of Schedule 12 [Safety and Security].
Security Sensitive Work. The Independent Certifier will ensure that each of its partners, directors, officers, employees, servants and agents engaged in the performance of Security Sensitive Work, has, not more than 30 days prior to first performing Security Sensitive Work, successfully completed a Canadian Police Information Centre (CPIC) check. For the purpose of this Section 11.10 [Security Sensitive Work], successful completion of a CIPIC check means that in respect of an individual the search returns no criminal conviction history or returns a history of criminal convictions which the Authority, in its discretion, determines do not pose a material risk to the Project. The Independent Certifier will not permit any individual to perform any Security Sensitive Work unless such individual has successfully completed a CPIC check. Throughout the term of this IC Agreement, the Independent Certifier shall ensure that a CPIC check is repeated for each individual engaged by the Independent Certifier in the performance of Security Sensitive Work from time to time so as to ensure that the results obtained in respect of any such individual are not more than 1 year old at any given time or if any information is received by the Independent Certifier that suggests that the risk in respect of any individual has materially changed. The Independent Certifier will prevent any individual from performing any Security Sensitive Work who does not successfully complete the annual CPIC check. The Independent Certifier will not permit any individual who has previously failed a CPIC check under this IC Agreement to perform Security Sensitive Work, without the prior written consent of the Authority. All CPIC checks during the Construction Period will be administered and performed by the Authority at no cost to the Independent Certifier. In order to obtain a CPIC check in respect of an individual, the Independent Certifier shall:
Security Sensitive Work. Project Co will comply with the provisions of Schedule 21 [Security Protocols].

Related to Security Sensitive Work

  • Contractor Sensitive Information 17.1 The Authority must:

  • COMMERCIALLY SENSITIVE INFORMATION 1. The Authority acknowledges that the Contractor has requested that the following information be treated as Commercially Sensitive Information; Document Page Number Section Condition or Paragraph Number Explanation of harm which may result from disclosure and time period applicable to sensitivity.

  • JOINT WORK PRODUCT This Agreement is the joint work product of H-GAC and the Contractor. This Agreement has been negotiated by H-GAC and the Contractor and their respective counsel and shall be fairly interpreted in accordance with its terms and, in the event of any ambiguities, no inferences shall be drawn against any party.

  • Sensitive data Where the transfer involves personal data revealing racial or ethnic origin, political opinions, religious or philosophical beliefs, or trade union membership, genetic data, or biometric data for the purpose of uniquely identifying a natural person, data concerning health or a person’s sex life or sexual orientation, or data relating to criminal convictions and offences (hereinafter ‘sensitive data’), the data importer shall apply the specific restrictions and/or additional safeguards described in Annex I.B.

  • Handling Sensitive Personal Information and Breach Notification A. As part of its contract with HHSC Contractor may receive or create sensitive personal information, as section 521.002 of the Business and Commerce Code defines that phrase. Contractor must use appropriate safeguards to protect this sensitive personal information. These safeguards must include maintaining the sensitive personal information in a form that is unusable, unreadable, or indecipherable to unauthorized persons. Contractor may consult the “Guidance to Render Unsecured Protected Health Information Unusable, Unreadable, or Indecipherable to Unauthorized Individuals” issued by the U.S. Department of Health and Human Services to determine ways to meet this standard.

  • Faculty Workload The workload of faculty includes student advising, maintaining and improving expertise in a discipline and in pedagogy, serving on departmental and university committees, contributing to student growth and development, evaluating student performance, scholarly activities, and service to university and community, as well as teaching and class preparation. Additionally, as a professional, a faculty member shall devote a substantial amount of his/her workload to course preparation, research, the maintenance of professional expertise, innovations in teaching/learning and other similar activities. These endeavors shall comprise the faculty member’s workload.

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If CBB chooses to subtend a Verizon access Tandem, CBB’s NPA/NXX must be assigned by CBB to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG.

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes.

  • Technology Upgrades Notwithstanding any other provision of this Agreement, Verizon shall have the right to deploy, upgrade, migrate and maintain its network at its discretion. The Parties acknowledge that Verizon, at its election, may deploy fiber throughout its network and that such fiber deployment may inhibit or facilitate PNG’s ability to provide service using certain technologies. Nothing in this Agreement shall limit Verizon's ability to modify its network through the incorporation of new equipment or software or otherwise. PNG shall be solely responsible for the cost and activities associated with accommodating such changes in its own network.

  • Sensitive Information Buyer will inform Licensor if Personal Data falls into any special categories of personal data as defined in Article 9(1) of Regulation (EU) 2016/679.

Time is Money Join Law Insider Premium to draft better contracts faster.