Safeguarding requirements and procedures (1) The Contractor shall apply the following basic safeguarding requirements and procedures to protect covered contractor information systems. Requirements and procedures for basic safeguarding of covered contractor information systems shall include, at a minimum, the following security controls: (i) Limit information system access to authorized users, processes acting on behalf of authorized users, or devices (including other information systems). (ii) Limit information system access to the types of transactions and functions that authorized users are permitted to execute. (iii) Verify and control/limit connections to and use of external information systems. (iv) Control information posted or processed on publicly accessible information systems. (v) Identify information system users, processes acting on behalf of users, or devices. (vi) Authenticate (or verify) the identities of those users, processes, or devices, as a prerequisite to allowing access to organizational information systems. (vii) Sanitize or destroy information system media containing Federal Contract Information before disposal or release for reuse. (viii) Limit physical access to organizational information systems, equipment, and the respective operating environments to authorized individuals. (ix) Escort visitors and monitor visitor activity; maintain audit logs of physical access; and control and manage physical access devices. (x) Monitor, control, and protect organizational communications (i.e., information transmitted or received by organizational information systems) at the external boundaries and key internal boundaries of the information systems. (xi) Implement subnetworks for publicly accessible system components that are physically or logically separated from internal networks. (xii) Identify, report, and correct information and information system flaws in a timely manner. (xiii) Provide protection from malicious code at appropriate locations within organizational information systems. (xiv) Update malicious code protection mechanisms when new releases are available. (xv) Perform periodic scans of the information system and real-time scans of files from external sources as files are downloaded, opened, or executed.
Insurance and Fingerprint Requirements Information Insurance If applicable and your staff will be on TIPS member premises for delivery, training or installation etc. and/or with an automobile, you must carry automobile insurance as required by law. You may be asked to provide proof of insurance. Fingerprint It is possible that a vendor may be subject to Chapter 22 of the Texas Education Code. The Texas Education Code, Chapter 22, Section 22.0834. Statutory language may be found at: ▇▇▇▇://▇▇▇.▇▇▇▇▇▇▇▇.▇▇▇▇▇.▇▇▇▇▇.▇▇.▇▇/ If the vendor has staff that meet both of these criterion: (1) will have continuing duties related to the contracted services; and (2) has or will have direct contact with students Then you have ”covered” employees for purposes of completing the attached form. TIPS recommends all vendors consult their legal counsel for guidance in compliance with this law. If you have questions on how to comply, see below. If you have questions on compliance with this code section, contact the Texas Department of Public Safety Non-Criminal Justice Unit, Access and Dissemination Bureau, FAST-FACT at ▇▇▇▇@▇▇▇▇▇.▇▇▇▇▇.▇▇.▇▇ and you should send an email identifying you as a contractor to a Texas Independent School District or ESC Region 8 and TIPS. Texas DPS phone number is (▇▇▇) ▇▇▇-▇▇▇▇. See form in the next attribute to complete entitled: Texas Education Code Chapter 22 Contractor Certification for Contractor Employees
Records and Reporting 6.1. WHO shall, in accordance with its regulations, rules, policies and procedures, maintain books, records, documents and other evidence in accordance with its usual accounting procedures to substantiate sufficiently the use of the Trust Fund funds transferred to it. 6.2. WHO shall provide the following financial information to the Facility Executive Board, through the Bank, prepared in accordance with the accounting and reporting procedures of WHO and provided in a form and means agreed upon with the Bank: (a) Within thirty (30) calendar days after June 30 of each year, an annual unaudited financial report for the activities for which the Allocation to WHO was made; (b) Within thirty (30) calendar days after June 30 of each year, an annual unaudited financial report of the Funding Account; (c) Within six (6) months after the Closing Date (or within six (6) months after termination of this Agreement, if earlier), a final unaudited financial report of the Funding Account, certified by WHO’s Comptroller (or equivalent); and (d) Such other periodic financial reports for the activities for which the Allocation to WHO was made, as may be agreed upon by the Bank and the Facility Executive Board following consultation with WHO. 6.3. Unless the Bank and WHO agree otherwise, all financial reports provided under this Agreement shall be expressed in United States dollars. 6.4. WHO shall provide the Facility Executive Board, through the Bank, with progress reports for activities funded with Trust Fund funds as follows: (a) Within thirty (30) calendar days after June 30 of each year, an annual report on the progress of the implementation of the activities for which the Allocation to WHO was made, with reference to the results framework for the Trust Fund agreed between the Bank and the Donors as well as with the results framework for the activities for which such Allocation was approved; and (b) Within six (6) months following the completion of the activities for which the Allocation to WHO was made, the Closing Date, or termination of this Agreement, whichever is earlier, a final report on the implementation of such activities. 6.5. WHO shall provide the Bank with a list containing the names and signatures of the authorized officers of WHO (each, an “Authorized Signatory”), substantially in the form attached to this Agreement as ▇▇▇▇▇ ▇ (Form of Authorized Signatory Letter), as such list shall be revised from time to time as necessary and kept current at all times.
Human and Financial Resources to Implement Safeguards Requirements The Borrower shall make available necessary budgetary and human resources to fully implement the EMP and the RP.
Personnel Requirements and Documentation Grantee will; 1. maintain current personnel documentation on each employee. All documents must be factual and accurate. Health-related information must be stored separately with restricted access as appropriate under Tex. Gov. Code §552.102. Training records may be stored separately from the main personnel file but must be easily accessible upon request. Required documentation includes the following, as applicable: i. A copy of the current job description signed by the employee; ii. Application or resume with documentation of required qualifications and verification of required credentials; iii. Verification of work experience; iv. Annual performance evaluations; v. Personnel data that includes date hired, rate of pay, and documentation of all pay increases and bonuses; vi. Documentation of appropriate screening and/or background checks, to include probation or parole documentation; vii. Signed documentation of initial and other required training; and viii. Records of any disciplinary actions. 2. document authentication must include signature, credentials when applicable, and date. If the document relates to past activity, the date of the activity must also be recorded. Documentation must be permanent and legible. When it is necessary to correct a required document, the error must be marked through with a single line, dated, and initialed by the writer.