Sentences with phrase «security standard requirements»

OST has certified and accredited the security of JITS in accordance with DOT information technology security standard requirements.
OST is in process of renewing the DIMS certification and accreditation in accordance with DOT information technology security standard requirements.
FRA has certified and accredited the security of CCM in accordance with DOT information technology security standard requirements.
The DOT is in process to certify and accredit the security of WCIS in accordance with DOT information technology security standard requirements.
The DOT is in process to certify and accredit the security of OWCP in accordance with DOT information technology security standard requirements.
OST has certified and accredited the security of ESS in accordance with DOT information technology security standard requirements.
OST has certified and accredited the security of PRISM in accordance with DOT information technology security standard requirements.
Payroll Labor Distribution System has been certified and accredited in accordance with DOT information technology security standard requirements.
FRA has certified and accredited the security of RES in accordance with DOT information technology security standard requirements.
OST has certified and accredited the security of FBMS in accordance with DOT information technology security standard requirements.
OIG has certified and accredited the security of TIGR in accordance with DOT information technology security standard requirements.
In addition, system security will be certified and accredited in accordance with DOT information technology security standard requirements.
OST has certified and accredited the security of SOS in accordance with DOT information technology security standard requirements.

Not exact matches

Jean Rogers is the founder and CEO of the Sustainability Accounting Standards Board, a nonprofit startup based in San Francisco that develops and disseminates sustainability accounting standards to help publicly listed corporations disclose material factors in compliance with Security and Exchange Commission requirements.
Everything from the Payment Card Industry Data Security Standard (PCI DSS) to the Gramm - Leach - Bliley Act (GLBA) to Health Insurance Portability and Accountability Act (HIPAA) requirements.
If your employer chooses to provide a retirement plan, then it must comply with the requirements and standards mandated under the federal Employee Retirement Income Security Act (ERISA).
Each member of the Audit Committee shall meet the independence standards and expertise requirements of the New York Stock Exchange corporate governance listing standards, the Securities Exchange Act of 1934 and rules promulgated thereunder, the Federal Deposit Insurance Corporation Improvement Act of 1991 (FDICIA), and other applicable laws and regulations, in each case, as of the Firm's most recent annual meeting.
Americans for Annuity Protection has engaged in active outreach to leaders of influence to establish the argument that the DOL's fiduciary rule should be returned because of the analysis performed by the department is flawed, inconclusive and arbitrary; it is not compatible with the Uniform Security Law or established insurance law, and the law has potential conflict with the Dodd - Frank requirements to the Securities and Exchange Commission (SEC) on reviewing a uniform fiduciary standard.
Key steps along this path include completion of the transition to full implementation of Basel III, including new liquidity requirements; enhanced prudential standards for systemically important firms, including risk - based capital requirements, a leverage ratio, and tighter prudential buffers for firms heavily reliant on short - term wholesale funding; expansion of the regulatory umbrella to incorporate all systemically important firms; the institution of an effective, cross-border resolution regime for systemically important financial institutions; and consideration of regulations, such as minimum margin requirements for securities financing transactions, to limit leverage in sectors beyond the banking sector and SIFIs.
Conversely, standard — or traditional — monetary policies used by central banks include open market operations to buy and sell government securities, setting the overnight target interest rate, setting bank reserve requirements and signaling intentions to the public.
The Trustee's custodial operations may refuse to accept instructions to transfer Bitcoins to or from the Trust Custody Account if, in the opinion of the Trustee's custodial operations they are or may be contrary to the standards set forth in the Trust Agreement which establish the minimum requirements acceptable for Bitcoins to be deposited into the Trust Custody Account («Good Delivery Standards»), as applicable, contrary to any applicable law, or a threat to the security of the Trust's assets or the Security System storing such Bitcoins on the Trustee's psecurity of the Trust's assets or the Security System storing such Bitcoins on the Trustee's pSecurity System storing such Bitcoins on the Trustee's premises.
He has experience in all aspects of airport management, including new terminal construction, oversight of environmental issues, management of security requirements, and ensuring compliance with all Part 139 standards and requirements.
And yet, the government and society impose a smothering blanket of political correctness, school lunch nutrition standards, invasive security requirements, and a whole host of other issues that belong in the lawmaking and policymaking areas of government, not in the nations» schools.
FAA is in the process of certifying and accrediting the security of RMS in accordance with DOT standard information technology requirements.
Security of ID credential issued to an employee or contractor is achieved by full compliance with the mandatory requirements of the Federal Information Processing Standard Publication 201 (FIPS Pub 201), Personal Identity Verification of Federal Employees and Contractors.
FAA has certified and accredited the security of CETS in accordance with DOT standard requirements.
NHTSA has certified and accredited the security of NDR in accordance with DOT standard requirements.
Usually, security is a standard requirement for larger loan applications, as the lender wants some kind of compensation in case the borrower defaults.
The Personal Loan product of the Standard Chartered Bank has been designed to aid its Salaried & Self Employed Customers fulfil their financial requirement, conveniently without any security or collateral.
At least 95 % of the portfolio is invested in equity - type securities, which meet strict standards evolving from requirements originally established by the U.S. District Court for the District of Columbia for the investment of trust funds.
While trading in common securities like stocks and ETFs don't require an opening minimum, all new accounts for foreign currencies at TradeKing must meet a minimum balance requirement, which is $ 2,500 for «standard accounts» and $ 500 for «mini accounts».
The North American Electric Reliability Corp. (NERC) standard on physical security — known as Critical Infrastructure Protection - 014 (CIP - 014)-- includes six basic requirements, but perhaps the most
Since 2010, under the requirements of the bipartisan Energy Independence and Security Act of 2007, the EPA has been required to include a standard for cellulosic ethanol.
Our recommendations include better enforcement of existing regulations, expedited transfer of nuclear waste into dry casks, strengthened reactor security requirements, and higher safety standards for new plants.
Even while testing is being carried out to ensure it meets the requirements and standards of the transmission grid operator and the approval of AEMO, the system will be helping provide unspecified «system security services», Weatherill's statement said.
The exact details of those requirements typically aren't publicly available to people who do not have security clearances, and might involve crypto standards rather than the physical locations of the servers used, for example.
UK firms can be reassured by the fact PSD2 aims to increase the standards of financial transactions, making them more transparent and competitive while ensuring firms — whether banks or non-traditional market entrants — comply with stricter requirements on transparency, competition and security.
Define and enforce a custom, hierarchical set of security levels to secure records, satisfying the most stringent set of records requirements: DoD Standard 5015.2.
Duties include, but are not limited to: • Designs and implements LAN, WAN, WLAN, voice, Internet, security and video solutions that follow architecture standards and best practices • Works with the infrastructure team to establish support capability, capacity and redundancy • Maintains complete inventory, configuration, and documentation of new and existing deployed infrastructure • Provides support for existing infrastructure services and project - based work leading to the development and deployment of new infrastructure services • Serves as one of the primary points of contact for telecommunication carriers and services providers, coordinating circuit design, provisioning, installation, and troubleshooting • Works cross-functionally with technology, administrative, and legal groups to understand and align technical requirements and technology choices
«Accordingly, drafting your own checklist and standard provisions that satisfy your company's privacy and security requirements in advance can save time and money in the future.»
Facilities are designed with procedures in place which comply with HIPAA (Health Insurance Portability and Accountability Act) security standards as a business associate, and which meet PII (Personally Identifiable Information) federal and state requirements.
NetDocuments meets ISO 27018, an extension of ISO 27001, standards and HIPAA requirements for privacy, security and file sharing so firms can share anything securely with employees and clients.
On June 16, 2016, the Securities and Exchange Commission (the «SEC») announced proposed rules to modernize the property disclosure requirements for mining registrants, with the objective of aligning standards with current...
-- Adoption of known security standards or industry requirements.
• Worker safety standards enforced under the Occupational Safety and Health Act and the Mine Safety and Health Act • Clean Water Act permitting of wastewater and stormwater discharges • Clean Air Act emissions regulation • Hazardous waste management and underground storage tank requirements under the Resource Conservation and Recovery Act (RCRA) • Spill and chemical reporting and release prevention under the Comprehensive Environmental Response, Compensation, and Liability Act (CERCLA), Emergency Planning and Community Right - to - Know Act, Oil Pollution Act, and Clean Water Act • Regulation of chemical manufacturing and distribution under the Toxic Substances Control Act (TSCA) • Environmental disclosures under Regulation S - K of the Securities and Exchange Commission (SEC) and corporate reporting of environmental, social and governance (ESG) matters to the public and interested investors
The remainder of section 1173 sets out requirements for the specific standards the Secretary is to adopt: Unique health identifiers, code sets, security standards, electronic signatures, and transfer of information among health plans.
Does anyone know whether there is a matter - centric DM based on open source or web services, keeping in mind standard law firm security and confidentiality requirements.
The Securities and Exchange Commission has issued a notice with new disclosure requirements that further modernize reporting standards.
«Appropriate federal oversight may include: data reporting, capital requirements, cyber security standards, measures to prevent fraud and price manipulation and anti-money laundering and «know your customer» protections,» he will testify.
At the highest level of technical complexity, design and verify the technology solution meets business and technical requirements and is in compliance with enterprise architecture guidelines, technology standards and methodology, and compliance and security standards
a b c d e f g h i j k l m n o p q r s t u v w x y z