Data and Technology definition
Examples of Data and Technology in a sentence
Eligible Users may revoke Access to Secure State Facilities, Data, and Technology granted in the event of any negative results.
DTS will use this same information to complete a Name Check in the Utah Criminal Justice Information System (UCJIS) every two years and reserves the right to revoke Access to Secure State Facilities, Data, and Technology granted in the event of any negative results.
CONTRACTOR ACCESS TO SECURE STATE FACILITIES, STATE DATA, AND TECHNOLOGY: An employee of Contractor or a Subcontractor is required to complete a Federal Criminal Background Check, in accordance with DTS Policy 2000-0014 Background Investigations, if said employee of Contractor or a Subcontractor will have Access to Secure State Facilities, State Data, and Technology.
Additionally, each employee of Contractor or a Subcontractor, who will have Access to Secure State Facilities, State Data, and Technology, will be scheduled by DTS to be fingerprinted, at a minimum of one week prior to having such access.
Contractor agrees to notify DTS if an arrest or conviction of any employee of Contractor or a Subcontractor that has Access to Secure State Facilities, State Data and Technology occurs during the Contract Period.
Contractor, in executing any duty or exercising any right under this Contract, shall not cause or permit any of its employees or employees of a Subcontractor (if any) who have been convicted of a felony or misdemeanor to have Access to Secure State Facilities, State Data, and Technology.
The Eligible User may use this same information to complete a Name Check in the Utah Criminal Justice Information System (UCJIS) every two years and reserves the right to revoke Access to Secure State Facilities, Data, and Technology granted in the event of any negative results.
Contractor agrees to notify the Eligible User if an arrest or conviction of any employee of Contractor or a Subcontractor that has Access to Secure Public Facilities, Public Data and Technology occurs during this Contract.
Additionally, each employee of Contractor or a Subcontractor, who will have Access to Secure Public Facilities, Public Data, and Technology, will be scheduled by the Eligible User to be fingerprinted, at a minimum of one week prior to having such access.
Contractor, in executing any duty or exercising any right under this Contract, shall not cause or permit any of its employees or employees of a Subcontractor (if any) who have been convicted of a felony or misdemeanor to have Access to Secure Public Facilities, Public Data, and Technology.