Safeguarding requirements and procedures (1) The Contractor shall apply the following basic safeguarding requirements and procedures to protect covered contractor information systems. Requirements and procedures for basic safeguarding of covered contractor information systems shall include, at a minimum, the following security controls: (i) Limit information system access to authorized users, processes acting on behalf of authorized users, or devices (including other information systems). (ii) Limit information system access to the types of transactions and functions that authorized users are permitted to execute. (iii) Verify and control/limit connections to and use of external information systems. (iv) Control information posted or processed on publicly accessible information systems. (v) Identify information system users, processes acting on behalf of users, or devices. (vi) Authenticate (or verify) the identities of those users, processes, or devices, as a prerequisite to allowing access to organizational information systems. (vii) Sanitize or destroy information system media containing Federal Contract Information before disposal or release for reuse. (viii) Limit physical access to organizational information systems, equipment, and the respective operating environments to authorized individuals. (ix) Escort visitors and monitor visitor activity; maintain audit logs of physical access; and control and manage physical access devices. (x) Monitor, control, and protect organizational communications (i.e., information transmitted or received by organizational information systems) at the external boundaries and key internal boundaries of the information systems. (xi) Implement subnetworks for publicly accessible system components that are physically or logically separated from internal networks. (xii) Identify, report, and correct information and information system flaws in a timely manner. (xiii) Provide protection from malicious code at appropriate locations within organizational information systems. (xiv) Update malicious code protection mechanisms when new releases are available. (xv) Perform periodic scans of the information system and real-time scans of files from external sources as files are downloaded, opened, or executed.
COMPLIANCE WITH POLICIES AND PROCEDURES During the period that Executive is employed with the Company hereunder, Executive shall adhere to the policies and standards of professionalism set forth in the Company’s Policies and Procedures as they may exist from time to time.
DBE Requirements A. Notice is hereby given to the CONSULTANT and any SUB-CONSULTANT, and both agree, that failure to carry out the requirements set forth in 49 CFR Sec. 26.13(b) shall constitute a breach of this Contract and, after notification and failure to promptly cure such breach, may result in termination of this Contract or such remedy as INDOT deems appropriate. The referenced section requires the following assurance to be included in all subsequent contracts between the CONSULTANT and any SUB-CONSULTANT: The CONSULTANT, sub recipient or SUB-CONSULTANT shall not discriminate on the basis of race, color, national origin, or sex in the performance of this Contract. The CONSULTANT shall carry out applicable requirements of 49 CFR Part 26 in the award and administration of DOT-assisted contracts. Failure by the CONSULTANT to carry out these requirements is a material breach of this Contract, which may result in the termination of this Contract or such other remedy, as INDOT, as the recipient, deems appropriate. B. The CONSULTANT shall make good faith efforts to achieve the DBE percentage goal that may be included as part of this Contract with the approved DBE SUB-CONSULTANTS identified on its Affirmative Action Certification submitted with its Letter of Interest, or with approved amendments. Any changes to a DBE firm listed in the Affirmative Action Certification must be requested in writing and receive prior approval by the LPA and INDOT’s Economic Opportunity Division Director. After this Contract is completed and if a DBE SUB- CONSULTANT has performed services thereon, the CONSULTANT must complete, and return, a Disadvantaged Business Enterprise Utilization Affidavit (“DBE-3 Form”) to INDOT’s Economic Opportunity Division Director. The DBE-3 Form requires certification by the CONSULTANT AND DBE SUB-CONSULTANT that the committed contract amounts have been paid and received.
Compliance Policies and Procedures To assist the Fund in complying with Rule 38a-1 of the 1940 Act, BBH&Co. represents that it has adopted written policies and procedures reasonably designed to prevent violation of the federal securities laws in fulfilling its obligations under the Agreement and that it has in place a compliance program to monitor its compliance with those policies and procedures. BBH&Co will upon request provide the Fund with information about our compliance program as mutually agreed.
Endorsements and Procedures Company agrees to place on the backside of each Check processed for collection at the Bank through this Service a restrictively endorsement which reads “Mobile Deposit to Central Bank”, or words to that effect as satisfactory to Bank. Endorsements must be made on the back of the Check within 1&1/2 inches from the top edge, although Bank may accept endorsements outside this space. Any loss Bank incurs from a delay or processing error resulting from an irregular endorsement or other markings by Company will be Company’s responsibility. Bank may reject any Check payable to co-payees, even if Company is one of the payees listed on the face of the Check. Bank will consider, but is not obligated to accept, Check’s listing Company as one of the co-payees, provided a) the image of the Check presented to Bank under the Service contains the legible signature endorsement of all co-payees to the instrument, including Company; and b) contains a restrictive endorsement above the co-payees signatures which reads “Mobile Deposit to account of [Company’s full name]”. If Company is a sole proprietorship, Checks written as payable in the name of the individual owner of Company may be deposited to Company’s Account at Bank through this Service so long Checks are presented in compliance with the Service’s terms and conditions. Company agrees to comply with any and all other procedures and instructions for use of the Mobile Deposit Service as the Bank may establish from time to time, such as within any applicable Users Guide (the “Procedures”). Cut-off Times for Deposits: Deposits made via Mobile Deposit must be made before 7:00 PM Eastern Standard Time on a Business Day in order to be considered deposited same day. Deposits made after 7:00 PM Eastern Standard Time on a Business Day will be considered deposited the next Business Day. Receipt of Items: Bank reserves the right to reject any item transmitted through Mobile Deposit, at Bank’s discretion, without liability to Company. Bank shall not be responsible for items Bank does not receive or for Check images that are dropped during transmission. An image of an item shall be deemed received when Company receives a confirmation from Bank that we have received the image. Receipt of such confirmation does not mean the transmission was error free or complete. Processing and/or transmission errors can occur after Bank acknowledges receipt that may impact transaction completion. Following receipt of such confirmation, the Bank will process the image by preparing a “substitute check” or clearing the item as an image. Availability of Funds: Once deposited, subject to the cut-off time described above, our policy, in most cases, is to make funds from Company’s Check deposits available to Company on the second Business Day after the day Bank receives the Check in compliance with this Service, unless a different or longer time period is required under Company’s Account Rules and Regulations’ Funds Availability Policy or should Bank decide to apply a longer hold period due to Company’s history of repeated overdrafts or grounds that Bank reasonably believes affects the ultimate collectability of the Check. In all cases, Company will receive full availability of the funds memorialized in Checks accepted by Bank under this Service by the seventh Business Day after Bank accepts the Check for deposit. If Company’s Account has been open 30 days or less, however, Company may not receive full availability until the ninth Business Day after the day of deposit. Disposal of Transmitted Items: After Company receive confirmation that Bank has received and accepted an image of a Check under this Service, and once Company receive full credit for the Check as manifested in Company’s Account balance as communicated by Bank, Company must and shall prominently marking the original Check “VOID” and then destroying that same Check by cross-cut shredding or another commercially acceptable means of destruction. Destroying the Check prevents it from being presented for deposit another time. After destruction of the original Check, the image will be the sole evidence of the original instrument. Company agree that Company will never re-present the original check, nor give the original Check to anyone else for any purpose other than its destruction.