Site Access Dell requires the right to access the APEX System in a timely way and as provided in the Service Offering Description to provide the Support Services. Failure to ensure that Customer provides Dell with timely access to a Site will relieve Dell of the Support Services obligations and Dell may also, at Dell’s discretion, suspend the APEX Service.
Workstation/Laptop encryption All workstations and laptops that process and/or store County PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the County Information Security Office.
Performance Improvement Plan timely and accurate completion of key actions due within the reporting period 100 percent The Supplier will design and develop an improvement plan and agree milestones and deliverables with the Authority 3.2 The Authority may from time to time make changes to the KPIs measured as set out in paragraph 3.1 above and shall issue a replacement version to the Supplier. The Authority shall give notice In Writing of any such change to the KPIs measured and shall specify the date from which the replacement KPIs must be used for future reports. Such date shall be at least thirty (30) calendar days following the date of the notice to the Supplier.