Continuous Monitoring Sample Clauses
POPULAR SAMPLE Copied 8 times
Continuous Monitoring. All Contractor-operated systems that input, store, process, output, and/or transmit sensitive information shall meet or exceed the continuous monitoring requirements identified in the Fiscal Year 2014 DHS Information Security Performance Plan, or successor publication. The plan is updated on an annual basis. The Contractor shall also store monthly continuous monitoring data at its location for a period not less than one year from the date the data is created. The data shall be encrypted in accordance with FIPS 140-2 Security Requirements for Cryptographic Modules and shall not be stored on systems that are shared with other commercial or Government entities. The Government may elect to perform continuous monitoring and IT security scanning of Contractor systems from Government tools and infrastructure.
Continuous Monitoring. Vendor agrees to continuously monitor for status events on all servers and network devices including but not limited to network availability, process status, file system capacity and backup success. Additionally, Vendor agrees to implement a monitoring solution to ensure Availability that includes datacenter monitoring, point to point monitoring and Authorized User monitoring through automated scripts running at an interval of no less than hourly. If at any time Vendor fails or anticipates that it will fail to perform its obligations in accordance with the Service Level Agreement, Vendor will advise Company as soon as possible of such failure and of the steps that Vendor will take to address such failure.
Continuous Monitoring. RedRok’s may continuously monitor Software usage to detect potential security threats or misuse.
Continuous Monitoring a. The following instrumentation shall be present for continuous monitoring of the RNG:
i. Chromatograph
1. Btu content
2. ▇▇▇▇▇ Index ii. O2 Analyzer
iii. CO2 Analyzer
iv. H2O Analyzer
v. Sulfur analyzer
b. Continuous monitoring should be completed relative to the equipment’s capabilities (not to exceed twenty (20) minutes per run), as determined by the Company.1
c. The Supplier’s Plant shall be shut in upon the following condition being met for any component of the Minimum Gas Quality Standards (Table I):
i. Three (3) results above the threshold or out of the specified range in one (1) hour (a “Noncompliance Result”).
d. The Company shall notify Supplier of a Noncompliance Result and the Supplier shall follow the restart testing procedure below prior to injecting additional RNG.
Continuous Monitoring. Wallet constantly monitors its customers and their transactions. Ongoing monitoring of business relationships means:
Continuous Monitoring. Unlike electrical resistance tomography (ERT), HRR- LDM does not require complex and time consuming data processing. The method also uses fewer sensors which reduces the time to acquire a complete dataset. The HRR- LDM system is easily automated which can provide continuous leak detection. By contrast, drywell logging is time and labor intensive, limiting the method to only sporadic monitoring.
Continuous Monitoring. As resources allow, and (potentially (based on place-holder)) using increased Section 106 future funding targeted towards monitoring activities, the Agency will continue to build the infrastructure and abilities to routinely incorporate continuous monitoring data into water resource assessment and standards development programming. ▪ River Assessment Initiatives – The Agency will continue to participate in an advisory capacity for the variety of river assessment projects currently underway, including the Large River biological assessment/evaluation tool development work being conducted by USEPA, Ohio River Valley Sanitation Commission (ORSANCO) and other partners, and the National Wadable Streams and Lake Assessment survey work being conducted by the Midwest Biodiversity Institute, Region 5, and other partners. The intended results of these projects (e.g., methods, assessment processes) will be considered and included as appropriate in the development of the new water quality monitoring strategy discussed above. ▪ Eco-region Development in Illinois – On August 30, EPA Region 5, and EPA ORD and Agency staff met for the purpose of initiating an effort to map Level IV eco-regions in Illinois. This effort is designed to provide, on a state and national scale, a more meaningful geographical framework to meet the needs of federal, state, local and private ecosystem resource management organizations. The Agency will participate in an advisory and coordination capacity throughout the process. A follow-up meeting has already been scheduled for December 2005. ▪ SWiMS 2006 and 2007 - The Agency will participate in planning and conducting the 2006 and 2007 Surface Water Monitoring and Standards (SWiMS) meetings in Chicago. ▪ Wetland Assessment Protocol Development – Pursuant to the schedule outlined in our 104(b)(3) grant, the Agency will partner with other state and federal agencies and academic and research entities to form a Technical Work Group that will work together to develop a comprehensive wetland monitoring and assessment protocol, including a Quality Assurance Project Plan (QAPP) and a designated Wetland Use(s). The Wetland Monitoring and Assessment Protocol will be completed in 2007 and incorporated into the monitoring strategy during 2008. ▪ Municipal Wastewater Treatment Nutrient Removal Pilot Studies – Three monitoring studies are underway to document downstream effects of sewage treatment plant phosphorus removal to a discharge limit of 1.0 mg/L or bel...
Continuous Monitoring. The AMH+ practice or CMA must conduct continuous monitoring of progress toward goals identified in the care plan or ISP through face-to-face and collateral contacts with the member and his or her support member(s) and routine care team reviews. The AMH+ practice or CMA must support the member’s adherence to prescribed treatment regimens and wellness activities.
Continuous Monitoring a. Contractor shall adhere to the State Chief Information Officer’s Continuous Monitoring Process requirements, and work with the Department to implement a risk management program that continuously monitors risk through the performance of assessments, risk analysis, and data inventory. The requirements are based on NIST 800-137, Information Security Continuous Monitoring for Federal Information Systems and Organizations” and originates from N.C. Gen. Stat. § 143B-1376, located online at: ▇▇▇▇://▇▇▇.▇▇▇▇▇.▇▇▇/EnactedLegislation/Statutes/HTML/ByChapter/Chapter_143B.h tml, and require the North Carolina State CIO to annually assess each agency and each agency’s contractors’ compliance with enterprise security standards.
b. Contractor shall assist the Department with risk assessment and security assessment of Contractor’s critical systems and infrastructure.
c. Contractor shall perform the required assessments, either through a third-party or a self-assessment, on a three-year cycle (with a third-party assessment mandated every third year).
d. All findings identified in the assessment must be made available to the Department within thirty (30) days after assessment completion, along with a plan to remediate each finding requiring a remediation.
e. Contractor shall provide a risk assessment for its cloud-hosted providers or off-site hosting service providers. Contractor shall provide all findings identified in these risk assessments to the Department within thirty (30) days after assessment completion, to include a plan to remediate each finding requiring a remediation. Contract will annually provide an attestation of compliance and a third -party assessment report of compliance with statewide security policies.
f. Contractor will make available at its principal place of business annually a confidential summary of findings, including all open findings, from a SOC 2 Type II audit of the Data Platform. Contractor will make available for viewing at its principle place of business the complete SOCII report, upon reasonable request of the Department.
g. Contractor shall cooperate with the Department in their completing a Privacy Threshold Analysis (PTA) documenting the data classification and data fields hosted within the cloud, offsite, or vendor hosted environment. The PTA shall be reviewed and updated annually by the Parties and when changes have been made to the data being collected.
h. The DHHS Privacy & Security Office may perform periodic independent security...
Continuous Monitoring. Develop a security and privacy continuous monitoring strategy and implement security and privacy continuous monitoring programs in accordance with specified metrics and for ongoing assessment of security and privacy control effectiveness.