System Security Requirements Sample Clauses

System Security Requirements. Contractor shall, in cooperation with CSD, institute policies, processes, procedures, and security controls designed to ensure the security of data and to protect information in accordance with the Information Practices Act of 1977 (Civ. Code §§ 1798 et seq.), and such other State and federal laws and regulations as may apply. The parties hereto agree to requirements, obligations, and standards in accordance with regulations set in the State Administrative Manual (XXX) and Statewide Information Management Manual (SIMM). In the event there are different system security standards that may be applied to this Article, Contractor shall endeavor to use the strictest security standard that complies with state and federal requirements.
AutoNDA by SimpleDocs
System Security Requirements. If the Contractor becomes aware of any unauthorized access to an agency’s Confidential Information or a security breach that compromises or reasonably could compromise an agency’s Confidential Information (an “incident”), the Contractor shall take appropriate immediate actions to contain the incident, in accordance with applicable law, and notify the Ordering Entity as soon as reasonably possible. The Contractor shall provide the Ordering Entity with information regarding any incident as may be reasonably requested by the Ordering Entity and that is in the Contractor’s possession, custody, or control at the time a request is received. Upon request of the Government, the Contractor will reasonably cooperate with the Government to investigate the nature and scope of any incident and to take appropriate actions to investigate and otherwise respond to the incident or associated risks. (As used in this Section, “compromise” means that the information has been exposed to any unauthorized access, inadvertent disclosure, known misuse, or known loss, alteration or destruction of Confidential Information other than as required to provide the services.)
System Security Requirements. 4.1 National and DOD security requirements
System Security Requirements. Contractor shall utilize tamper-resistant PV module to rack fasteners for all PV module mounting. Contractor shall utilize tamper-resistant fasteners for all electrical fittings, pull boxes and other enclosures. Meters Contractor shall supply and install Utility approved a Net Generation Output Meter (NGOM) for each PV system. Generation Meters shall use Internet Protocol (IP) communication and shall not require a custom network for connection. Generation Meters shall have the capability to store metered data including instantaneous kW, kWh, voltage, current, and phase information) in fifteen (15) minute intervals and retain such information for at least seven (7) Calendar Days. Monitoring System, DAS, and Reporting Contractor shall design, build, activate and ensure proper functioning of Data Acquisition Systems (DAS) that enable the City to track the performance of the PV Systems as well as environmental conditions through an online web-enabled graphical user interface and information displays. Contractor shall provide equipment to connect the DAS via existing Wi-Fi network or cellular data network at all locations. The means of data connection will be determined during design. The City will pay for the cost of cellular data service if needed, and the Contractor shall pay for the modem and/or other equipment needed to connect to the cellular network. The DAS(s) shall provide access to at least the following data: Instantaneous AC system output (kW) PV System production (kWh) over pre-defined intervals that may be user configured AC and DC voltage Horizontal and in-plane irradiance (at least three (3) sensors for each, at different positions in the array) Ambient and back-of-cell temperature (at least two (2) sensors for each, at different positions in the array) Inverter status flags and general system status information System availability Site Load information. Available load data for the meter the system is connected to shall be collected by the solar monitoring solution as part of the DAS. Environmental data such as temperatures, wind speed, and irradiance shall be collected via an individual weather station installed for each system at each site where PV is being installed. Data collected by the DAS shall be presented in an online web interface, accessible from any computer through the Internet with appropriate security (i.e., password-controlled access). The user interface shall allow visualization of the data at least in the following increments: ...
System Security Requirements. COUNTY shall implement security procedures to prevent unauthorized physical access to sensitive voting equipment. The Xxxx Voting and Voter Management System shall include and support operational features to prevent both inadvertent and deliberate operations that could result in the disruption of the election process and corruption of election administrative and voting data.
System Security Requirements. Contractor shall, in cooperation with CSD, institute measures, procedures, and protocols designed to ensure the security of data and to protect information in accordance with the Information Practices Act of 1977 (Civ. Code § 1798 et seq.), and such other State and Federal laws and regulations as may apply. In the event there are different system security standards that may be applied to this Article, Contractor shall endeavor to use the strictest security standard that complies with state and federal requirements. The parties hereto agree to the following requirements, obligations, and standards in accordance with regulations set in the State Administrative Manual (XXX) and Statewide Information Management Manual (SIMM):
System Security Requirements. Requirement 67 The Contractor shall comply with the OSI Information Confidentiality and Security Standards (refer to OSI EBT RFP #XXXXX Appendix F, Information Confidentiality and Security Standards). 68 The Contractor shall classify System Data pursuant to the California State Administrative Manual (XXX) Section 5305.5.
AutoNDA by SimpleDocs
System Security Requirements. 15.1. All Services provided by Bank under this Agreement whether implemented in the state of Washington on State computer systems and networks or on Bank’s systems, must be compliant with the applicable security policy and standards of the Office of the Chief Information Officer (OCIO). The OCIO Security Policy is available at: xxxx://xxx.xx.xxx/ocio/policies/documents/141.pdf. The OCIO Security Standards are available at: xxxx://xxx.xx.xxx/ocio/policies/documents/141.10.pdf.

Related to System Security Requirements

  • Security Requirements 11.1 The Supplier shall comply, and shall procure the compliance of the Suppliers Personnel, with the Security Policy and the Security Plan and the Supplier shall ensure that the Security Plan produced by the Supplier fully complies with the Security Policy.

  • Facility Requirements 1. Maintain wheelchair accessibility to program activities according to governing law, including the Americans With Disabilities Act (ADA), as applicable.

  • Federal Medicaid System Security Requirements Compliance Party shall provide a security plan, risk assessment, and security controls review document within three months of the start date of this Agreement (and update it annually thereafter) in order to support audit compliance with 45 CFR 95.621 subpart F, ADP System Security Requirements and Review Process.

  • City Requirements Design, construction, materials, sizing, other specifications, permitting, inspections, testing, documentation and furnishing of as-built drawings, and acceptance of completed infrastructure shall be in accordance with City Requirements. Design and construction shall be by professionals licensed in the state of North Carolina to do the relevant work. City approval of the design of the Improvements shall be required prior to construction, as set forth in City Requirements. If Developer is connecting to the County sewer system, the City may require Developer to furnish the contract providing for such connection.

  • Accessibility Requirements Under Tex. Gov’t Code Chapter 2054, Subchapter M, and implementing rules of the Texas Department of Information Resources, the System Agency must procure Products and services that comply with the Accessibility Standards when those Products are available in the commercial marketplace or when those Products are developed in response to a procurement solicitation. Accordingly, Grantee must provide electronic and information resources and associated Product documentation and technical support that comply with the Accessibility Standards.

  • E-Verify Requirements To the extent applicable under ARIZ. REV. STAT. § 41- 4401, the Contractor and its subcontractors warrant compliance with all federal immigration laws and regulations that relate to their employees and their compliance with the E-verify requirements under ARIZ. REV. STAT. § 23-214(A). Contractor’s or its subcontractor’s failure to comply with such warranty shall be deemed a material breach of this Agreement and may result in the termination of this Agreement by the City.

  • Safety Requirements 17.1.1 The Concessionaire shall comply with the provisions of this Agreement, Applicable Laws and Applicable Permits and conform to Good Industry Practice for securing the safety of the Users. In particular, the Concessionaire shall develop, implement and administer a surveillance and safety programme for providing a safe environment on or about the Project, and shall comply with the safety requirements.

  • Residency Requirements 1. All single first-year freshmen students are required to live in University housing for at least two academic semesters. All single students who have earned less than 30 credit hours and have not resided in University housing for two academic semesters are required to live on campus for two academic semesters. This policy does not apply to single first-year students who have been out of high school for more than one year, or to single first-year freshmen who live with their parents in Miami-Dade or Broward Counties. Neither does it apply to those students who, for disciplinary or administrative reasons, may be denied the privilege of continued residency on campus.

  • New Hampshire Specific Data Security Requirements The Provider agrees to the following privacy and security standards from “the Minimum Standards for Privacy and Security of Student and Employee Data” from the New Hampshire Department of Education. Specifically, the Provider agrees to:

  • Residency Requirement All students in baccalaureate degree programs must earn the following from the University of Maine at Farmington:

Time is Money Join Law Insider Premium to draft better contracts faster.