Contractor and all Sample Clauses

Contractor and all. Contractor Parties shall develop, implement and maintain a comprehensive written information security policy for the protection of Confidential Information that meets or exceeds current industry standards and best practices as they may be amended from time to time. The safeguards contained in the written information security policy must meet or exceed the standards for the protection of Confidential Information, and information of a similar character, as set forth in all applicable federal and State law and in written policy of the Client Agency or DAS concerning the confidentiality of Confidential Information. Such data-security program shall include, but not be limited to, the following: 1. A security policy for employees related to the storage, access and transportation of data containing Confidential Information; 2. Reasonable restrictions on access to records containing Confidential Information, including access to any locked storage where such records are kept and an auditable electronic system of logging and tracking the viewing, accessing or both of Confidential Information; 3. A process for reviewing policies and security measures at least annually; 4. Creating secure access controls to Confidential Information, including but not limited to passwords; and 5. Encrypting of Confidential Information that is stored on laptops, portable devices and storage media or that is being transmitted electronically.
Contractor and all. Contractor Parties shall maintain the confidentiality of all information received in the course of performing the Services. This requirement to maintain confidentiality shall extend beyond the termination of this Agreement.
Contractor and all. Contractor Parties shall develop, implement and maintain a comprehensive written information security policy for the protection of Confidential Information that meets or exceeds current industry standards and best practices as they may be amended from time to time. The safeguards contained in the written information security policy must meet or exceed the standards for the protection of Confidential Information, and information of a similar character, as set forth in all applicable federal and State law and in written policy of the Purchasing Entity, Participating Entity, or the Lead State concerning the confidentiality of Confidential Information. Such data-security program shall include, but not be limited to, the following: 1. A security policy for employees related to the storage, access and transportation of data containing Confidential Information; 2. Reasonable restrictions on access to records containing Confidential Information, including access to any locked storage where such records are kept and an auditable electronic system of logging and tracking the viewing, accessing or both of Confidential Information; 3. A process for reviewing policies and security measures at least annually; 4. Creating secure access controls to Confidential Information, including but not limited to passwords; and 5. Encrypting of Confidential Information that is stored on laptops, portable devices and storage media or that is being transmitted electronically.
Contractor and all. Subcontractors shall keep the prevailing wage rates for this Project posted in a conspicuous and accessible place in or about the Project.
Contractor and all. Contractor Parties shall develop, implement and maintain a comprehensive written information security policy for the protection of Confidential Information that meets or exceeds current industry standards and best practices as they may be amended from time to time. The safeguards contained in the written information security policy must meet or exceed the standards for the protection of Confidential Information, and information of a similar character, as set forth in all applicable federal and State law and in the written policy of the Client Agency or DAS, which will be provided to the Contractor prior to the placement of an applicable Order, concerning the confidentiality of Confidential Information. Such data-security program shall include, but not be limited to, the following: 1. A security policy for employees related to the storage, access and transportation of data containing Confidential Information; 2. Reasonable restrictions on access to records containing Confidential Information, including access to any locked storage where such records are kept and an auditable electronic system of logging and tracking the viewing, accessing or both of Confidential Information; 3. A process for reviewing policies and security measures at least annually; 4. Creating secure access controls to Confidential Information, including but not limited to passwords; and 5. Encrypting of Confidential Information that is stored on laptops, portable devices and storage media or that is being transmitted electronically.
Contractor and all. Contractor Parties shall maintain the confidentiality of all information received in the course of performing the Services, including without limitation all federal, state and industry specific privacy laws. Additionally, to the extent Contractor receives education records from District under this Agreement, Contractor shall comply with applicable state and federal privacy laws and regulations, including the Family Education Rights and Privacy Act, 20 U.S.C. § 1232g (“FERPA”). Specifically, Contractor agrees to abide by confidentiality/privacy obligations and the related limitations on re-disclosure of “education records” as set forth in FERPA. This requirement to maintain confidentiality shall extend beyond the termination of this Agreement.

Related to Contractor and all

  • Contractor and H GAC agree that Contractor shall cooperate with the END USER at the time an END USER purchase order is placed, to determine terms for any liquidated damages.

  • Contractor Parties A Contractor’s members, directors, officers, shareholders, partners, managers, principal officers, representatives, agents, servants, consultants, employees or any one of them or any other person or entity with whom the Contractor is in privity of oral or written contract and the Contractor intends for such other person or entity to Perform under the Contract in any capacity.

  • Independent Contractor; Workers’ Compensation Insurance The Contractor is performing as an independent entity under this Contract. No part of this Contract shall be construed to represent the creation of an employment, agency, partnership or joint venture agreement between the parties. Neither party will assume liability for any injury (including death) to any persons, or damage to any property, arising out of the acts or omissions of the agents, employees or subcontractors of the other party. The Contractor shall provide all necessary unemployment and workers’ compensation insurance for the Contractor’s employees, and shall provide the State with a Certificate of Insurance evidencing such coverage prior to starting work under this Contract.

  • Contractors All LAUSD Contractors and their Representatives are expected to conduct any and all business affiliated with LAUSD in an ethical and responsible manner that fosters integrity and public confidence. A “Contractor” is any individual, organization, corporation, sole proprietorship, partnership, nonprofit, joint venture, association, or any combination thereof that is pursuing or conducting business with and/or on behalf of LAUSD, including, without limitation, consultants, suppliers, manufacturers, and any other vendors, bidders or proposers. A Contractor’s “Representative” is also broadly defined to include any subcontractors, employees, agents, or anyone else who acts on a Contractor’s behalf.

  • Subcontractors and Agents Business Associate hereby agrees that any time PHI is provided or made available to any subcontractors or agents, Business Associate shall provide only the minimum necessary PHI for the purpose of the covered transaction and shall first enter into a subcontract or contract with the subcontractor or agent that contains the same terms, conditions and restrictions on the use and disclosure of PHI as contained in this Agreement.