The Remote Access Security Requirement Sample Clauses

The Remote Access Security Requirement should the security requirement for remote access is unavailable or deemed unreliable, physical presence is the only option.
AutoNDA by SimpleDocs

Related to The Remote Access Security Requirement

  • Data Security Requirements A. Data Transport. When transporting Confidential Information electronically, including via email, the data will be protected by:

  • Security Requirements 11.1 The Supplier shall comply, and shall procure the compliance of the Suppliers Personnel, with the Security Policy and the Security Plan and the Supplier shall ensure that the Security Plan produced by the Supplier fully complies with the Security Policy.

  • Information Security Requirements In cases where the State is not permitted to manage/modify the automation equipment (server/computer/other) that controls testing or monitoring devices, the Contractor agrees to update and provide patches for the automation equipment and any installed operating systems or applications on a quarterly basis (at minimum). The Contractor will submit a report to the State of updates installed within 30 days of the installation as well as a Plan of Actions and Milestones (POA&M) to remediate any vulnerabilities ranging from Critical to Low. The contractor will provide an upgrade path or compensatory security controls for any operating systems and applications listed as beyond “end-of-life” or EOL, within 90 days of the EOL and complete the EOL system’s upgrade within 90 days of the approved plan.

  • Additional security requirements The following provisions apply in respect of any Additional Security provided:

  • Remote Access Access to and use of the Data over the State Governmental Network (SGN) or Secure Access Washington (SAW) will be controlled by DSHS staff who will issue authentication credentials (e.g. a Unique User ID and Hardened Password) to Authorized Users on Contractor’s staff. Contractor will notify DSHS staff immediately whenever an Authorized User in possession of such credentials is terminated or otherwise leaves the employ of the Contractor, and whenever an Authorized User’s duties change such that the Authorized User no longer requires access to perform work for this Contract.

  • Payment Security Requirements A. Unless Company has maintained an agreement similar to this Agreement with Authority during the 18 months prior to the effective date of this Agreement without the occurrence of any act or omission that would have been a default under this Agreement, Company will provide Authority on or before the commencement date of this Agreement with an acceptable bond, irrevocable letter of credit or other similar security acceptable to Authority in an amount equal to the estimate of three months’ Rents, fees and charges, payable by Company under this Agreement, to guarantee the faithful performance by Company of its obligations under this Agreement and the payment of all Rents, fees, tax assessments, and charges due hereunder (hereinafter referred to as “Payment Security”). Company will be obligated to maintain such Payment Security in effect until the expiration of 18 consecutive months during which Company commits no default under this Agreement. Such Payment Security will be in a form and with a company acceptable to Authority and licensed to do business in the State of Florida. In the event that any such Payment Security is for a period less than the full period required under this Agreement or if such Payment Security is canceled, Company will provide a renewal or replacement Payment Security for the remaining required period at least 60 days prior to the date of such expiration or cancellation. Such Payment Security will require notice by the surety to Authority at least 60 days prior to any cancellation.

  • Facility Requirements 1. Maintain wheelchair accessibility to program activities according to governing law, including the Americans With Disabilities Act (ADA), as applicable.

  • Violations - Remote Scaling Requirement If PURCHASER violates any of the log accountability requirements of this contract, STATE may require all logs from timber sold under the terms and conditions of this contract to be scaled at a ramp provided by PURCHASER, in a location designated by STATE. All costs associated with this additional scaling requirement shall be paid by PURCHASER. Cost of Scaling. All costs of scaling and all costs in connection with reports furnished to STATE shall be paid by PURCHASER. PURCHASER shall require the scaling organization to furnish copies each week to STATE of all scaled certificates showing gross and net volumes, by species and grade, of all logs scaled during the week. Upon request by STATE, PURCHASER shall also require the scaling organization to furnish and attach a log detail listing to each weekly scale certificate showing all STATE logs included on the certificate. Scaling Instructions. PURCHASER agrees that STATE shall provide instructions to the approved third-party scaling organization for the scaling practices to be used for timber removed from the timber sale area. Instructions shall conform to the terms of this contract, including special scales as necessary. PURCHASER shall acknowledge and sign such instructions and shall be provided a copy. Minimum Products Specifications and Special Scale information are shown on Exhibit G. Logs Damaged During Handling. Mechanical damage to logs shall be prevented during log handling. Deductions for handling damage shall not be allowed. Add-Back Volume. Scaling deduction for deterioration due to abnormal delay in removal of logs from the timber sale area shall not be allowed in determining net volume. Volume of material deteriorated due to delay in removal shall be reported to STATE and paid for at the contract price. Cost for separate reports shall be paid by PURCHASER. Special Scaling Instructions. Segment scaling or grading of logs in excess of 40 feet in gross scaling length shall use actual taper. Procedures are set forth in "Segment Scaling and Grading of Long Logs - All Species - State Forestry Department Scaling Instructions" (Westside).

  • Additional Requirements from Authorized Users An Authorized User may have distinct requirements that must be met by all individuals employed by or working for the Authorized User. The Contractor’s Staff Members will be expected to comply with these requirements as a condition of the placement.

  • Federal Medicaid System Security Requirements Compliance Party shall provide a security plan, risk assessment, and security controls review document within three months of the start date of this Agreement (and update it annually thereafter) in order to support audit compliance with 45 CFR 95.621 subpart F, ADP System Security Requirements and Review Process.

Time is Money Join Law Insider Premium to draft better contracts faster.