SOV Cybersecurity Standard 19-01 Sample Clauses

SOV Cybersecurity Standard 19-01. All products and service provided to or for the use of the State under this Contract shall be in compliance with State of Vermont Cybersecurity Standard 19-01, which Contractor acknowledges has been provided to it, and is available on-line at the following URL: xxxxx://xxxxxxxxxxxxxxx.xxxxxxx.xxx/cybersecurity/cybersecurity-standards-and-directives Taxes Due to the State. Contractor certifies under the pains and penalties of perjury that, as of the date this contract amendment is signed, the Contractor is in good standing with respect to, or in full compliance with a plan to pay, any and all taxes due the State of Vermont. Child Support (Applicable to natural persons only; not applicable to corporations, partnerships or LLCs). Contractor is under no obligation to pay child support or is in good standing with respect to or in full compliance with a plan to pay any and all child support payable under a support order as of the date of this amendment.
AutoNDA by SimpleDocs
SOV Cybersecurity Standard 19-01. All products and service provided to or for the use of the State under this Contract shall be in compliance with State of Vermont Cybersecurity Standard 19-01, which Contractor acknowledges has been provided to it, and is available on-line at the following URL: xxxxx://xxxxxxxxxxxxxxx.xxxxxxx.xxx/cybersecurity/cybersecurity-standards-and-directives
SOV Cybersecurity Standard 19-01. All products and service provided to or for the use of the State under this Contract shall be in compliance with State of Vermont Cybersecurity Standard 19-01, which Contractor acknowledges has been provided to it, and is available on-line at the following URL: xxxxx://xxxxxxxxxxxxxxx.xxxxxxx.xxx/cybersecurity/cybersecurity-standards-and-directives Contractor further certifies under pains and penalties of perjury that, as of the date this contract amendment is signed, Contractor is not presently debarred, suspended, nor named on the State’s debarment list at: xxxxx://xxx.xxxxxxx.xxx/purchasing-contracting/debarment This document consists of 9 pages. Except as modified by this Amendment No. 1, all provisions of the Contract remain in full force and effect. The signatures of the undersigned indicate that each has read and agrees to be bound by this Amendment to the Contract. BY THE STATE OF VERMONT: BY THE CONTRACTOR: 2/22/2022 XXXXXX DE XX XXXXXX DATE DVHA Commissioner NOB 1 South, 000 Xxxxx Xxxxx Xxxxxxxxx, XX 00000-0000 Phone: 000-000-0000 Email: Xxxxxx.Xxxxxxxxxx@xxxxxxx.xxx XXXX XXXXXXXX DATE MEMBER 00000 Xxxxx Xxxxxxx Xxxxxx, Xxxxx 000 Xxxxxx Xxxxx, XX 00000 Phone: (000) 000-0000 Email: XXxxxxxxx@xxxx.xxx ATTACHMENT E BUSINESS ASSOCIATE AGREEMENT SOV CONTRACTOR: Xxxxx and Xxxxxxxx SOV CONTRACT No. 39766 CONTRACT Effective DATE: April 1, 2020 THIS BUSINESS ASSOCIATE AGREEMENT (“AGREEMENT”) IS ENTERED INTO BY AND BETWEEN THE STATE OF VERMONT AGENCY OF HUMAN SERVICES, OPERATING BY AND THROUGH ITS AGENCY OF HUMAN SERVICES (“COVERED ENTITY”) AND PARTY IDENTIFIED IN THIS AGREEMENT AS CONTRACTOR OR GRANTEE ABOVE (“BUSINESS ASSOCIATE”). THIS AGREEMENT SUPPLEMENTS AND IS MADE A PART OF THE CONTRACT OR GRANT (“CONTRACT OR GRANT”) TO WHICH IT IS ATTACHED. Covered Entity and Business Associate enter into this Agreement to comply with the standards promulgated under the Health Insurance Portability and Accountability Act of 1996 (“HIPAA”), including the Standards for the Privacy of Individually Identifiable Health Information, at 45 CFR Parts 160 and 164 (“Privacy Rule”), and the Security Standards, at 45 CFR Parts 160 and 164 (“Security Rule”), as amended by Subtitle D of the Health Information Technology for Economic and Clinical Health Act (HITECH), and any associated federal rules and regulations. The parties agree as follows:
SOV Cybersecurity Standard 19-01. All products and service provided to or for the use of the State under this Contract shall be in compliance with State of Vermont Cybersecurity Standard 19-01, which Contractor acknowledges has been provided to it, and is available on-line at the following URL: xxxxx://xxxxxxxxxxxxxxx.xxxxxxx.xxx/cybersecurity/cybersecurity-standards-and-directives Child Support (Applicable to natural persons only; not applicable to corporations, partnerships or LLCs). Contractor is under no obligation to pay child support or is in good standing with respect to or in full compliance with a plan to pay any and all child support payable under a support order as of the date of this amendment.
SOV Cybersecurity Standard 19-01. As of the Effective Date, All products and service provided to or for the use of the State under this Contract shall be in compliance with State of Vermont Cybersecurity Standard 19-01 (as drafted as of the Effective Date), which Contractor acknowledges has been provided to it, and is available on-line at the following URL: xxxxx://xxxxxxxxxxxxxxx.xxxxxxx.xxx/cybersecurity/cybersecurity-standards-and-directives. In the event the aforementioned statute is revised, the parties will use reasonable efforts to negotiate an amendment to this Agreement to attempt to incorporate such revised statute. Attachment F
SOV Cybersecurity Standard 19-01. All products and service provided to or for the use of the State under this Contract shall be in compliance with State of Vermont Cybersecurity Standard 19-01, which Contractor acknowledges has been provided to it, and is available on-line at the following URL: xxxxx://xxxxxxxxxxxxxxx.xxxxxxx.xxx/cybersecurity/cybersecurity-standards-and-directives REQUIRED PRIOR APPROVALS All SOW Agreements, regardless of value, shall be approved by the Vermont Chief Information Officer/Secretary of the Agency of Digital Services prior to execution. CIO Approval Date All SOW Agreements valued at $25,000 or more per year shall be certified by the Vermont Office of the Attorney General in accordance with 3 V.S.A. § 342 prior to execution. Further, there shall be no limitation of liability, including a waiver of consequential, indirect, special, punitive or exemplary damages, or disclaimers of warranty without approval from the Office of the Attorney General. Certified by Date WE THE UNDERSIGNED PARTIES AGREE TO BE BOUND BY THIS SOW AGREEMENT. <CrossWind Technologies Inc.> Signature Date STATE OF VERMONT, <Insert Requesting Agency or business unit> Signature Date Purpose ATTACHMENT F: Valcour CAD/RMS System Policies Agency Agreement Valcour is a proprietary software solution, developed by CrossWind Technologies, (hereinafter “CrossWind”) and designed exclusively for legitimate law enforcement use. Valcour is designed to be used by multiple departments or agencies as a secure automated Computer Aided Dispatch, Records Management, and Mobile Computing system that gathers data for a variety of criminal justice purposes, including but not limited to, records of services rendered, incident/event information, information about persons involved in investigations, crimes reported, arrests, stolen and recovered property and crime data.

Related to SOV Cybersecurity Standard 19-01

  • Security Standards The Provider shall implement and maintain commercially reasonable security procedures and practices that otherwise meet or exceed industry standards designed to protect Student Data from unauthorized access, destruction, use, modification, or disclosure, including but not limited to the unauthorized acquisition of computerized data that compromises the security, confidentiality, or integrity of the Student Data (a "Security Breach"). For purposes of the DPA and this Exhibit G, "Security Breach" does not include the good faith acquisition of Student Data by an employee or agent of the Provider or LEA for a legitimate educational or administrative purpose of the Provider or LEA, so long as the Student Data is used solely for purposes permitted by SOPPA and other applicable law, and so long as the Student Data is restricted from further unauthorized disclosure.

  • Cybersecurity (i)(x) There has been no security breach or other compromise of or relating to any of the Company’s or any Subsidiary’s information technology and computer systems, networks, hardware, software, data (including the data of its respective customers, employees, suppliers, vendors and any third party data maintained by or on behalf of it), equipment or technology (collectively, “IT Systems and Data”) and (y) the Company and the Subsidiaries have not been notified of, and has no knowledge of any event or condition that would reasonably be expected to result in, any security breach or other compromise to its IT Systems and Data; (ii) the Company and the Subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Data and to the protection of such IT Systems and Data from unauthorized use, access, misappropriation or modification, except as would not, individually or in the aggregate, have a Material Adverse Effect; (iii) the Company and the Subsidiaries have implemented and maintained commercially reasonable safeguards to maintain and protect its material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and Data; and (iv) the Company and the Subsidiaries have implemented backup and disaster recovery technology consistent with industry standards and practices.

  • Cybersecurity; Data Protection The Company’s information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company has implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect its material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (“Personal Data”)) used in connection with its business, and there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same. The Company is presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification, except where the failure to be in compliance would not, individually or in the aggregate, have a Material Adverse Effect.

  • Security System The site and the Work area may be protected by limited access security systems. An initial access code number will be issued to the Contractor by the County. Thereafter, all costs for changing the access code due to changes in personnel or required substitution of contracts shall be paid by the Contractor and may be deducted from payments due or to become due to the Contractor. Furthermore, any alarms originating from the Contractor’s operations shall also be paid by the Contractor and may be deducted from payments due or to become due to the Contractor.

  • STATEWIDE CONTRACT MANAGEMENT SYSTEM If the maximum amount payable to Contractor under this Contract is $100,000 or greater, either on the Effective Date or at any time thereafter, this section shall apply. Contractor agrees to be governed by and comply with the provisions of §§00-000-000, 00-000-000, 00-000-000, and 00- 000-000, C.R.S. regarding the monitoring of vendor performance and the reporting of contract information in the State’s contract management system (“Contract Management System” or “CMS”). Contractor’s performance shall be subject to evaluation and review in accordance with the terms and conditions of this Contract, Colorado statutes governing CMS, and State Fiscal Rules and State Controller policies.

  • Security Systems The Service may not be compatible with security systems. You may be required to maintain a telephone connection through your local exchange carrier in order to use any alarm monitoring functions for any security system installed in your home or business. You are responsible for contacting the alarm monitoring company to test the compatibility of any alarm monitoring or security system with the Service.

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • Destination CSU-Pueblo scholarship This articulation transfer agreement replaces all previous agreements between CCA and CSU-Pueblo in Bachelor of Science in Physics (Secondary Education Emphasis). This agreement will be reviewed annually and revised (if necessary) as mutually agreed.

  • Xxxxxxx Xxxxxxx Restrictions/Market Abuse Laws Participant may be subject to xxxxxxx xxxxxxx restrictions and/or market abuse laws based on the exchange on which the shares of Common Stock are listed and in applicable jurisdictions including the United States and Participant’s country or his or her broker’s country, if different, which may affect Participant’s ability to accept, acquire, sell or otherwise dispose of shares, rights to shares (e.g., Performance Shares) or rights linked to the value of shares of Common Stock (e.g., dividend equivalents) during such times as Participant is considered to have “inside information” regarding the Company (as defined by the laws in applicable jurisdictions). Local xxxxxxx xxxxxxx laws and regulations may prohibit the cancellation or amendment of orders Participant placed before he or she possessed inside information. Furthermore, Participant could be prohibited from (i) disclosing the inside information to any third party, which may include fellow employees and (ii) “tipping” third parties or causing them otherwise to buy or sell securities. Any restrictions under these laws or regulations are separate from and in addition to any restrictions that may be imposed under any applicable xxxxxxx xxxxxxx policy of the Company. Participant acknowledges that it is Participant’s responsibility to comply with any applicable restrictions, and Participant should speak with his or her personal legal advisor on this matter.

  • The Web Services E-Verify Employer Agent agrees to, consistent with applicable laws, regulations, and policies, commit sufficient personnel and resources to meet the requirements of this MOU.

Time is Money Join Law Insider Premium to draft better contracts faster.