Cyber incident damage assessment activities If DoD elects to conduct a damage assessment, the Contracting Officer will request that the Contractor provide all of the damage assessment information gathered in accordance with paragraph (e) of this clause.
Post-Accident Testing a. The City may require a Covered Employee who caused, or may have caused, an Accident, based on information known at the time of the Accident, to submit to drug and/or alcohol testing.
Emergency Overtime In the event of an emergency as defined in Section 13.15 notwithstanding the terms of this Article, the Agency Head or designee may assign someone to temporarily meet the emergency requirements, regardless of the overtime distribution.
Emergency Escalation Escalation is strictly for purposes of notifying and investigating possible or potential issues in relation to monitored services. The initiation of any escalation and the subsequent cooperative investigations do not in themselves imply that a monitored service has failed its performance requirements. Escalations shall be carried out between ICANN and Registry Operators, Registrars and Registry Operator, and Registrars and ICANN. Registry Operators and ICANN must provide said emergency operations departments. Current contacts must be maintained between ICANN and Registry Operators and published to Registrars, where relevant to their role in escalations, prior to any processing of an Emergency Escalation by all related parties, and kept current at all times.
Safety, breakdowns and accidents 17.5.1 The Concessionaire shall ensure safe conditions for the Users and passengers, and in the event of unsafe conditions, it shall follow the relevant operating procedures and undertake removal of obstruction and debris without delay. Such procedures shall conform to the provisions of this Agreement, Applicable Laws, Applicable Permits and Good Industry Practice.
Security Incident Reporting A security incident occurs when CDA information assets are or reasonably believed to have been accessed, modified, destroyed, or disclosed without proper authorization, or are lost, or stolen. Subrecipient must comply with CDA’s security incident reporting procedures located at xxxxx://xxx.xxxxx.xx.xxx/ProgramsProviders/#Resources.