{"component": "definition", "props": {"groups": [{"snippet": "means, a systemic approach to managing an organisation\u2019s security needs as per specifications, terms and conditions stipulated under the contract, the organisation in this case refers to Medical Colleges/ Hospitals", "size": 24, "samples": [{"hash": "14HhrDCNep2", "uri": "https://www.wbhealth.gov.in/uploaded_files/tender/NIT-SECURITY-2ND-CALL.pdf", "label": "Notice", "score": 15.210814476, "published": false}, {"hash": "b8ud9mllFnU", "uri": "https://www.wbhealth.gov.in/uploaded_files/tender/2562.pdf", "label": "Notice", "score": 12.8658456802, "published": false}, {"hash": "kI50r1Xkib0", "uri": "https://www.wbhealth.gov.in/uploaded_files/tender/2561.pdf", "label": "Notice", "score": 12.8658456802, "published": false}], "snippet_links": [{"key": "terms-and-conditions", "type": "definition", "offset": [95, 115]}, {"key": "the-contract", "type": "clause", "offset": [133, 145]}, {"key": "the-organisation", "type": "clause", "offset": [147, 163]}], "hash": "1a3c6944ac2a17c05aa3c717b93a52e1", "id": 1}, {"snippet": "/ \"Scope of Services\" means the Security Services to be performed or rendered by the Contractor / SS Provider, in relation to the banking business and operations at its offices/branches/centers/premises/buildings/quarters etc. owned or otherwise of IDBI Bank and matters related to or incidental to the foregoing as described in clause 2 (Scope of Security Services) and Annexure A, and any alterations thereof.", "size": 16, "samples": [{"hash": "93bxzSRTKyT", "uri": "https://www.idbibank.in/notices-Adv/pdf/RFP-FOR-SECURITY-SERVICE-PROVIDERS-VETTED-BY-LEGAL-DEPT-PATNA-ZONE.pdf", "label": "Service Agreement", "score": 14.9698839188, "published": false}, {"hash": "h28baApVhWI", "uri": "https://www.idbibank.in/notices-Adv/pdf/RFP-FOR-APPOINTMENT-OF-SECURITY-SERVICE-PROVIDERS-CHANDIGARH-ZONE.pdf", "label": "Service Agreement", "score": 13.1519508362, "published": false}, {"hash": "8MkuwYMnLCy", "uri": "https://www.idbibank.in/notices-Adv/pdf/RFP-FOR-EMPANELMENT-OF-SECURITY-IN-LUCKNOW-ZONE.pdf", "label": "www.idbibank.in", "score": 10.9698839188, "published": false}], "snippet_links": [{"key": "scope-of-services", "type": "clause", "offset": [3, 20]}, {"key": "the-security", "type": "clause", "offset": [28, 40]}, {"key": "services-to-be-performed", "type": "clause", "offset": [41, 65]}, {"key": "by-the-contractor", "type": "clause", "offset": [78, 95]}, {"key": "in-relation-to", "type": "clause", "offset": [111, 125]}, {"key": "business-and-operations", "type": "clause", "offset": [138, 161]}, {"key": "idbi-bank", "type": "definition", "offset": [249, 258]}, {"key": "related-to", "type": "definition", "offset": [271, 281]}, {"key": "incidental-to", "type": "definition", "offset": [285, 298]}, {"key": "the-foregoing", "type": "definition", "offset": [299, 312]}, {"key": "clause-2", "type": "definition", "offset": [329, 337]}, {"key": "scope-of-security", "type": "clause", "offset": [339, 356]}, {"key": "annexure-a", "type": "definition", "offset": [371, 381]}], "hash": "ff6095e9be262447040cbc996e072898", "id": 2}, {"snippet": "means the services specified in Box 7 and Clause 3 (Security Services) and all other functions performed by the Contractors under the terms of this Contract.", "size": 15, "samples": [{"hash": "iHJN4gLfTGl", "uri": "https://www.steamshipmutual.com/sites/default/files/downloads/circulars-london/L.234.pdf", "label": "Contract", "score": 11.1327857971, "published": false}, {"hash": "hkR02Yy44Zx", "uri": "https://www.steamshipmutual.com/sites/default/files/downloads/circulars-bermuda/B.625.pdf", "label": "Contract", "score": 11.1327857971, "published": false}, {"hash": "ixeQnQz1NQm", "uri": "https://www.piclub.or.jp/wp-content/uploads/2014/04/3930.pdf", "label": "www.piclub.or.jp", "score": 10.4715948105, "published": false}], "snippet_links": [{"key": "the-services", "type": "definition", "offset": [6, 18]}, {"key": "clause-3", "type": "clause", "offset": [42, 50]}, {"key": "other-functions", "type": "definition", "offset": [79, 94]}, {"key": "performed-by", "type": "clause", "offset": [95, 107]}, {"key": "terms-of-this-contract", "type": "clause", "offset": [134, 156]}], "hash": "b7a31bc2a40d785b62b9413181199cef", "id": 3}, {"snippet": "means the security services of the Republic referred to in section 199(1) of the Constitution;", "size": 13, "samples": [{"hash": "5hYiS0gOk7N", "uri": "https://media.lawlibrary.org.za/media/legislation/298643/source_file/981fcc2ab37c39cb/2000-27.pdf", "label": "media.lawlibrary.org.za", "score": 19.8926105499, "published": false}, {"hash": "itji8wDMfVE", "uri": "https://media.lawlibrary.org.za/media/legislation/268987/source_file/be3327f29b6f4a24/2000-27.pdf", "label": "media.lawlibrary.org.za", "score": 19.8082942963, "published": false}, {"hash": "6vRuCYol94t", "uri": "https://media.lawlibrary.org.za/media/legislation/298741/source_file/569cd731188ec405/2000-27.pdf", "label": "media.lawlibrary.org.za", "score": 19.7411022186, "published": false}], "snippet_links": [{"key": "the-security", "type": "clause", "offset": [6, 18]}, {"key": "the-constitution", "type": "clause", "offset": [77, 93]}], "hash": "ea22e93fac1bb1b77ea169e7c7523e21", "id": 4}, {"snippet": "\u2019 means the security services of the Republic established in terms of Chapter 11 of the Constitution;", "size": 12, "samples": [{"hash": "8LfqvFsIoJP", "uri": "https://www.dtps.gov.za/index.php?option=com_phocadownload&view=category&download=151:telecommunications&id=27:telecommunications&Itemid=143", "label": "www.dtps.gov.za", "score": 6.0773444176, "published": false}, {"hash": "eMkzZQlxSyB", "uri": "https://www.wipo.int/edocs/lexdocs/laws/en/za/za082en.pdf", "label": "www.wipo.int", "score": 5.0, "published": false}, {"hash": "86coFriZTOK", "uri": "https://www.gov.za/sites/default/files/gcis_document/201409/b9-050.pdf", "label": "www.gov.za", "score": 5.0, "published": false}], "snippet_links": [{"key": "the-security", "type": "clause", "offset": [8, 20]}, {"key": "terms-of", "type": "clause", "offset": [61, 69]}, {"key": "chapter-11", "type": "definition", "offset": [70, 80]}, {"key": "the-constitution", "type": "clause", "offset": [84, 100]}], "hash": "48fb8c2f8d8d3d81ee1c5a6b943794ce", "id": 5}, {"snippet": ", in relation to a member, means a member of\u2014", "size": 10, "samples": [{"hash": "ixuTpl4VqOv", "uri": "http://www.dpsa.gov.za/dpsa2g/documents/acts&regulations/pam/PAM%20Bill%202013%20as%20published%2031%20May%202013.pdf", "label": "www.dpsa.gov.za", "score": 10.1704311371, "published": false}, {"hash": "48c6U2YW4me", "uri": "https://www.gov.za/sites/default/files/gcis_document/201409/public-admin-manage-bill-2013-published-31-may-2013a.pdf", "label": "www.gov.za", "score": 6.7043123245, "published": false}, {"hash": "8sVB9U2JMQz", "uri": "https://static.pmg.org.za/bills/130605publicadministrationmanagementbill.pdf", "label": "static.pmg.org.za", "score": 6.7043123245, "published": false}], "snippet_links": [{"key": "in-relation-to", "type": "clause", "offset": [2, 16]}, {"key": "a-member-of", "type": "clause", "offset": [33, 44]}], "hash": "6cf267243b36827b4bb202260e6b117c", "id": 6}, {"snippet": "Sub-Sector: Industry Classification: CPC 873", "size": 8, "samples": [{"hash": "lYal2SPrc4u", "uri": "/contracts/lYal2SPrc4u#security-services", "label": "Investment Agreement", "score": 26.8001365662, "published": true}, {"hash": "Vprb3KAK8W", "uri": "/contracts/Vprb3KAK8W#security-services", "label": "Investment Agreement", "score": 26.8001365662, "published": true}, {"hash": "9vopC5jLPZJ", "uri": "/contracts/9vopC5jLPZJ#security-services", "label": "Investment Agreement", "score": 26.8001365662, "published": true}], "snippet_links": [{"key": "industry-classification", "type": "definition", "offset": [12, 35]}], "hash": "650b6807db8c1828ee3d9e776bb66927", "id": 7}, {"snippet": "means the filtering and processing of email within the on-demand, Web-based email security and data loss prevention services provided by Proofpoint, including updates thereto.", "size": 8, "samples": [{"hash": "5X2hZrkD9UQ", "uri": "/contracts/5X2hZrkD9UQ#security-services", "label": "General Terms and Conditions", "score": 27.9676513672, "published": true}, {"hash": "8GCH5xz4rBb", "uri": "/contracts/8GCH5xz4rBb#security-services", "label": "General Terms and Conditions", "score": 26.786447525, "published": true}, {"hash": "2apdNQPsH5Y", "uri": "/contracts/2apdNQPsH5Y#security-services", "label": "General Terms and Conditions", "score": 26.4976043701, "published": true}], "snippet_links": [{"key": "services-provided-by", "type": "clause", "offset": [116, 136]}], "hash": "4633e8e17ff52261c4a2b15be2b40643", "id": 8}, {"snippet": "means, a systemic approach to managing an organization\u2019s security needs as per specifications, terms and conditions stipulated under the contract, the organization in this case refers to Medical Colleges and Hospitals", "size": 8, "samples": [{"hash": "5w0wgwiCBBw", "uri": "https://www.wbhealth.gov.in/uploaded_files/tender/JGMC-NIT01_2023_1.pdf", "label": "www.wbhealth.gov.in", "score": 10.6776180267, "published": false}, {"hash": "bKNi4vxqe0W", "uri": "https://www.wbhealth.gov.in/uploaded_files/tender/JGMC-NIT01_2023.pdf", "label": "www.wbhealth.gov.in", "score": 10.6680355072, "published": false}, {"hash": "e4QuFrS1GLE", "uri": "https://www.wbhealth.gov.in/uploaded_files/tender/JGMC-NIT02_2023.pdf", "label": "www.wbhealth.gov.in", "score": 10.6625595093, "published": false}], "snippet_links": [{"key": "terms-and-conditions", "type": "definition", "offset": [95, 115]}, {"key": "the-contract", "type": "clause", "offset": [133, 145]}, {"key": "the-organization", "type": "clause", "offset": [147, 163]}], "hash": "904cbd17fd825cb92f6f2cdb9ef9c7f4", "id": 9}, {"snippet": "We prioritize security in everything we do, but we also specialize in security assessments and overhauls to safeguard one of your most precious assets \u2014 your data. o Networking Services: Our professional services team will assess the impact on your network bandwidth and recommend upgrades as needed o Cloud Services: Our IT consulting team can assess your needs and help you select the right SaaS or IaaS apps and cloud solutions for your business. o Data Center Services: Our engineers help you cut costs by replacing high-maintenance hardware with converged infrastructure and virtualized network and storage resources, on- premises or in the cloud. o Digital Workspace Services: Our team will help you optimize your network for mobile workspaces and collaboration while prioritizing efficiency and security. With over 1,000 original equipment manufacturers (OEMs), Members have the choice of the usual heavyweights such as HPI, Lenovo, Cisco, Microsoft, Acer, Dell EMC, HPE. We also offer hundreds of other vendors making very cool products and providing very specific services that may be the precise technology for a Member in, say, public safety, such as Getac\u2019s rugged laptops, or \u2587\u2587\u2587\u2587\u2587\u2019 mounting solutions. But at CDW\u2022G we know just offering solutions, services, and products doesn\u2019t answer the mail. A critical factor for Members in their procurement goals is the delivery and implementation of the solutions, services, and products to ensure their needs are met. As our company has amassed this impressive portfolio of solutions, products, and services, our leadership foresaw the potential hazards of onboarding newer to market OEMs for our customers and built uncompromising oversight into our process as a result. Sourcewell members benefit from the following steps CDW\u2022G built into our procurement process to ensure risk management on the solutions, products, and services we deliver: - Requesting our OEM partners put in place supply chain risk management plans to control components sourcing and ensure that no gray market or counterfeit materials are incorporated into their products. - Vetting to ensure that only OEMs that produce genuine, quality equipment are added to CDW\u2022G\u2019s manufacturer portfolio. - Acquiring equipment only from manufacturer-authorized sources. - Selling only equipment that we are authorized to sell. - Maintaining redundancy in our manufacturer portfolio, such that if one manufacturer is having trouble with counterfeit parts being introduced to its supply chain, the customer has the option of purchasing an alternative manufacturer from CDW\u2022G. - Purchasing additional stock, when commercially reasonable, to provide customers access to replacement products should a recall be issued for products they have purchased. - Conducting quarterly business reviews with our major OEM partners where any counterfeit/gray market issues are addressed. * DocuSign Envelope ID: B9103D10-16E8-4220-A1A2-A4F534AE59B4", "size": 7, "samples": [{"hash": "gWZUaxiwkVT", "uri": "/contracts/gWZUaxiwkVT#security-services", "label": "Contract", "score": 30.7378330231, "published": true}, {"hash": "hp2a7HYhhjc", "uri": "/contracts/hp2a7HYhhjc#security-services", "label": "Contract", "score": 30.5938282013, "published": true}, {"hash": "3KU8QGpCIdB", "uri": "/contracts/3KU8QGpCIdB#security-services", "label": "Contract", "score": 29.3810119629, "published": true}], "snippet_links": [{"key": "security-assessments", "type": "clause", "offset": [70, 90]}, {"key": "your-data", "type": "definition", "offset": [153, 162]}, {"key": "networking-services", "type": "definition", "offset": [166, 185]}, {"key": "services-team", "type": "clause", "offset": [204, 217]}, {"key": "your-network", "type": "definition", "offset": [244, 256]}, {"key": "as-needed", "type": "definition", "offset": [290, 299]}, {"key": "cloud-services", "type": "definition", "offset": [302, 316]}, {"key": "consulting-team", "type": "definition", "offset": [325, 340]}, {"key": "the-right", "type": "clause", "offset": [383, 392]}, {"key": "cloud-solutions", "type": "clause", "offset": [415, 430]}, {"key": "your-business", "type": "definition", "offset": [435, 448]}, {"key": "data-center-services", "type": "clause", "offset": [452, 472]}, {"key": "storage-resources", "type": "clause", "offset": [604, 621]}, {"key": "digital-workspace", "type": "clause", "offset": [655, 672]}, {"key": "our-team", "type": "clause", "offset": [683, 691]}, {"key": "and-security", "type": "clause", "offset": [798, 810]}, {"key": "original-equipment-manufacturers", "type": "clause", "offset": [828, 860]}, {"key": "dell-emc", "type": "definition", "offset": [964, 972]}, {"key": "other-vendors", "type": "clause", "offset": [1005, 1018]}, {"key": "specific-services", "type": "clause", "offset": [1064, 1081]}, {"key": "a-member", "type": "definition", "offset": [1121, 1129]}, {"key": "public-safety", "type": "clause", "offset": [1139, 1152]}, {"key": "critical-factor", "type": "definition", "offset": [1312, 1327]}, {"key": "for-members", "type": "clause", "offset": [1328, 1339]}, {"key": "delivery-and-implementation", "type": "clause", "offset": [1374, 1401]}, {"key": "to-ensure", "type": "clause", "offset": [1443, 1452]}, {"key": "our-company", "type": "clause", "offset": [1477, 1488]}, {"key": "potential-hazards", "type": "clause", "offset": [1592, 1609]}, {"key": "procurement-process", "type": "definition", "offset": [1801, 1820]}, {"key": "in-place", "type": "clause", "offset": [1934, 1942]}, {"key": "management-plans", "type": "definition", "offset": [1961, 1977]}, {"key": "to-control", "type": "definition", "offset": [1978, 1988]}, {"key": "gray-market", "type": "definition", "offset": [2028, 2039]}, {"key": "to-sell", "type": "clause", "offset": [2336, 2343]}, {"key": "counterfeit-parts", "type": "definition", "offset": [2454, 2471]}, {"key": "the-customer", "type": "clause", "offset": [2510, 2522]}, {"key": "the-option", "type": "clause", "offset": [2527, 2537]}, {"key": "additional-stock", "type": "clause", "offset": [2605, 2621]}, {"key": "commercially-reasonable", "type": "clause", "offset": [2628, 2651]}, {"key": "to-provide", "type": "clause", "offset": [2653, 2663]}, {"key": "access-to", "type": "definition", "offset": [2674, 2683]}, {"key": "replacement-products", "type": "definition", "offset": [2684, 2704]}, {"key": "for-products", "type": "clause", "offset": [2731, 2743]}, {"key": "quarterly-business-reviews", "type": "clause", "offset": [2778, 2804]}, {"key": "docusign-envelope", "type": "definition", "offset": [2891, 2908]}], "hash": "2798201f00e6641b7ef61e692a3eb389", "id": 10}], "next_curs": "Cl4SWGoVc35sYXdpbnNpZGVyY29udHJhY3RzcjoLEhpEZWZpbml0aW9uU25pcHBldEdyb3VwX3Y1NiIac2VjdXJpdHktc2VydmljZXMjMDAwMDAwMGEMogECZW4YACAA", "definition": {"snippet": "means, a systemic approach to managing an organisation\u2019s security needs as per specifications, terms and conditions stipulated under the contract, the organisation in this case refers to Medical Colleges/ Hospitals", "size": 300, "title": "Security Services", "id": "security-services", "examples": ["TT sub-contracted the Prime <strong>Security Services</strong> to the Contractor (\u201cSubcontracted <strong>Security Services</strong>\u201d)."], "related": [["beta-services", "Beta Services", "Beta Services"], ["utility-services", "Utility services", "Utility services"], ["cemetery-services", "Cemetery services", "Cemetery services"], ["community-services", "Community services", "Community services"], ["security-management-plan", "Security Management Plan", "Security Management Plan"]], "related_snippets": [], "updated": "2025-07-23T06:00:50+00:00"}, "json": true, "cursor": ""}}