Personnel Security 6.1 Staff recruitment in accordance with government requirements for pre- employment checks; 6.2 Staff training and awareness of Departmental security and any specific contract requirements.
Technical Security Controls 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.
Agreement to Purchase and Sell Stock Subject to the terms and conditions of this Agreement, the Company agrees to sell to each of the Investors at the Closing (as defined below), and each of the Investors agrees to purchase from the Company at the Closing, the number of shares of the Company's Common Stock set forth opposite such Investor's name on the Schedule of Investors (collectively, the "Shares") at a price of $39.00 per share.
Physical Security BNY Mellon will deploy perimeter security such as barrier access controls around its facilities processing or storing Customer Data. The ISP will include (i) procedures for validating visitor identity and authorization to enter the premises, which may include identification checks, issuance of identification badges and recording of entry purpose of visit and (ii) physical security policies for personnel, such as a “clean desk” policy. In accordance with its ISP and applicable law, BNY Mellon will install closed circuit television (“CCTV”) systems and CCTV recording systems to monitor and record access to controlled areas, such as data centers and server rooms.
Site Security While providing services at a DSHS location, the Contractor, its agents, employees, or Subcontractors shall conform in all respects with physical, fire, or other security regulations specific to the DSHS location.