ISM Code and ISPS Code compliance All requirements of the ISM Code and the ISPS Code as they relate to the Borrowers, the Approved Manager and the Ships have been complied with.
Technical Security Controls 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.
Closure Area Calculation Sheet – A computer generated print-out of the area and the perimeter bearings, distances, curve data, and coordinates of an individual parcel of land to be acquired.
Gold Open Access Articles May be shared according to the author-selected end-user license and should contain a CrossMark logo, the end user license, and a DOI link to the formal publication on ScienceDirect. Please refer to Elsevier's posting policy for further information.
ISPS Code Each Borrower shall comply with the ISPS Code and in particular, without limitation, shall: (a) procure that the Ship owned by it and the company responsible for that Ship’s compliance with the ISPS Code comply with the ISPS Code; and (b) maintain for that Ship an ISSC; and (c) notify the Agent immediately in writing of any actual or threatened withdrawal, suspension, cancellation or modification of the ISSC.