OST has certified and accredited the security of JITS in accordance with DOT information technology
security standard requirements.
OST is in process of renewing the DIMS certification and accreditation in accordance with DOT information technology
security standard requirements.
FRA has certified and accredited the security of CCM in accordance with DOT information technology
security standard requirements.
The DOT is in process to certify and accredit the security of WCIS in accordance with DOT information technology
security standard requirements.
The DOT is in process to certify and accredit the security of OWCP in accordance with DOT information technology
security standard requirements.
OST has certified and accredited the security of ESS in accordance with DOT information technology
security standard requirements.
OST has certified and accredited the security of PRISM in accordance with DOT information technology
security standard requirements.
Payroll Labor Distribution System has been certified and accredited in accordance with DOT information technology
security standard requirements.
FRA has certified and accredited the security of RES in accordance with DOT information technology
security standard requirements.
OST has certified and accredited the security of FBMS in accordance with DOT information technology
security standard requirements.
OIG has certified and accredited the security of TIGR in accordance with DOT information technology
security standard requirements.
In addition, system security will be certified and accredited in accordance with DOT information technology
security standard requirements.
OST has certified and accredited the security of SOS in accordance with DOT information technology
security standard requirements.
Not exact matches
Jean Rogers is the founder and CEO of the Sustainability Accounting
Standards Board, a nonprofit startup based in San Francisco that develops and disseminates sustainability accounting
standards to help publicly listed corporations disclose material factors in compliance with
Security and Exchange Commission
requirements.
Everything from the Payment Card Industry Data
Security Standard (PCI DSS) to the Gramm - Leach - Bliley Act (GLBA) to Health Insurance Portability and Accountability Act (HIPAA)
requirements.
If your employer chooses to provide a retirement plan, then it must comply with the
requirements and
standards mandated under the federal Employee Retirement Income
Security Act (ERISA).
Each member of the Audit Committee shall meet the independence
standards and expertise
requirements of the New York Stock Exchange corporate governance listing
standards, the
Securities Exchange Act of 1934 and rules promulgated thereunder, the Federal Deposit Insurance Corporation Improvement Act of 1991 (FDICIA), and other applicable laws and regulations, in each case, as of the Firm's most recent annual meeting.
Americans for Annuity Protection has engaged in active outreach to leaders of influence to establish the argument that the DOL's fiduciary rule should be returned because of the analysis performed by the department is flawed, inconclusive and arbitrary; it is not compatible with the Uniform
Security Law or established insurance law, and the law has potential conflict with the Dodd - Frank
requirements to the
Securities and Exchange Commission (SEC) on reviewing a uniform fiduciary
standard.
Key steps along this path include completion of the transition to full implementation of Basel III, including new liquidity
requirements; enhanced prudential
standards for systemically important firms, including risk - based capital
requirements, a leverage ratio, and tighter prudential buffers for firms heavily reliant on short - term wholesale funding; expansion of the regulatory umbrella to incorporate all systemically important firms; the institution of an effective, cross-border resolution regime for systemically important financial institutions; and consideration of regulations, such as minimum margin
requirements for
securities financing transactions, to limit leverage in sectors beyond the banking sector and SIFIs.
Conversely,
standard — or traditional — monetary policies used by central banks include open market operations to buy and sell government
securities, setting the overnight target interest rate, setting bank reserve
requirements and signaling intentions to the public.
The Trustee's custodial operations may refuse to accept instructions to transfer Bitcoins to or from the Trust Custody Account if, in the opinion of the Trustee's custodial operations they are or may be contrary to the
standards set forth in the Trust Agreement which establish the minimum
requirements acceptable for Bitcoins to be deposited into the Trust Custody Account («Good Delivery
Standards»), as applicable, contrary to any applicable law, or a threat to the
security of the Trust's assets or the Security System storing such Bitcoins on the Trustee's p
security of the Trust's assets or the
Security System storing such Bitcoins on the Trustee's p
Security System storing such Bitcoins on the Trustee's premises.
He has experience in all aspects of airport management, including new terminal construction, oversight of environmental issues, management of
security requirements, and ensuring compliance with all Part 139
standards and
requirements.
And yet, the government and society impose a smothering blanket of political correctness, school lunch nutrition
standards, invasive
security requirements, and a whole host of other issues that belong in the lawmaking and policymaking areas of government, not in the nations» schools.
FAA is in the process of certifying and accrediting the
security of RMS in accordance with DOT
standard information technology
requirements.
Security of ID credential issued to an employee or contractor is achieved by full compliance with the mandatory
requirements of the Federal Information Processing
Standard Publication 201 (FIPS Pub 201), Personal Identity Verification of Federal Employees and Contractors.
FAA has certified and accredited the
security of CETS in accordance with DOT
standard requirements.
NHTSA has certified and accredited the
security of NDR in accordance with DOT
standard requirements.
Usually,
security is a
standard requirement for larger loan applications, as the lender wants some kind of compensation in case the borrower defaults.
The Personal Loan product of the
Standard Chartered Bank has been designed to aid its Salaried & Self Employed Customers fulfil their financial
requirement, conveniently without any
security or collateral.
At least 95 % of the portfolio is invested in equity - type
securities, which meet strict
standards evolving from
requirements originally established by the U.S. District Court for the District of Columbia for the investment of trust funds.
While trading in common
securities like stocks and ETFs don't require an opening minimum, all new accounts for foreign currencies at TradeKing must meet a minimum balance
requirement, which is $ 2,500 for «
standard accounts» and $ 500 for «mini accounts».
The North American Electric Reliability Corp. (NERC)
standard on physical
security — known as Critical Infrastructure Protection - 014 (CIP - 014)-- includes six basic
requirements, but perhaps the most
Since 2010, under the
requirements of the bipartisan Energy Independence and
Security Act of 2007, the EPA has been required to include a
standard for cellulosic ethanol.
Our recommendations include better enforcement of existing regulations, expedited transfer of nuclear waste into dry casks, strengthened reactor
security requirements, and higher safety
standards for new plants.
Even while testing is being carried out to ensure it meets the
requirements and
standards of the transmission grid operator and the approval of AEMO, the system will be helping provide unspecified «system
security services», Weatherill's statement said.
The exact details of those
requirements typically aren't publicly available to people who do not have
security clearances, and might involve crypto
standards rather than the physical locations of the servers used, for example.
UK firms can be reassured by the fact PSD2 aims to increase the
standards of financial transactions, making them more transparent and competitive while ensuring firms — whether banks or non-traditional market entrants — comply with stricter
requirements on transparency, competition and
security.
Define and enforce a custom, hierarchical set of
security levels to secure records, satisfying the most stringent set of records
requirements: DoD
Standard 5015.2.
Duties include, but are not limited to: • Designs and implements LAN, WAN, WLAN, voice, Internet,
security and video solutions that follow architecture
standards and best practices • Works with the infrastructure team to establish support capability, capacity and redundancy • Maintains complete inventory, configuration, and documentation of new and existing deployed infrastructure • Provides support for existing infrastructure services and project - based work leading to the development and deployment of new infrastructure services • Serves as one of the primary points of contact for telecommunication carriers and services providers, coordinating circuit design, provisioning, installation, and troubleshooting • Works cross-functionally with technology, administrative, and legal groups to understand and align technical
requirements and technology choices
«Accordingly, drafting your own checklist and
standard provisions that satisfy your company's privacy and
security requirements in advance can save time and money in the future.»
Facilities are designed with procedures in place which comply with HIPAA (Health Insurance Portability and Accountability Act)
security standards as a business associate, and which meet PII (Personally Identifiable Information) federal and state
requirements.
NetDocuments meets ISO 27018, an extension of ISO 27001,
standards and HIPAA
requirements for privacy,
security and file sharing so firms can share anything securely with employees and clients.
On June 16, 2016, the
Securities and Exchange Commission (the «SEC») announced proposed rules to modernize the property disclosure
requirements for mining registrants, with the objective of aligning
standards with current...
-- Adoption of known
security standards or industry
requirements.
• Worker safety
standards enforced under the Occupational Safety and Health Act and the Mine Safety and Health Act • Clean Water Act permitting of wastewater and stormwater discharges • Clean Air Act emissions regulation • Hazardous waste management and underground storage tank
requirements under the Resource Conservation and Recovery Act (RCRA) • Spill and chemical reporting and release prevention under the Comprehensive Environmental Response, Compensation, and Liability Act (CERCLA), Emergency Planning and Community Right - to - Know Act, Oil Pollution Act, and Clean Water Act • Regulation of chemical manufacturing and distribution under the Toxic Substances Control Act (TSCA) • Environmental disclosures under Regulation S - K of the
Securities and Exchange Commission (SEC) and corporate reporting of environmental, social and governance (ESG) matters to the public and interested investors
The remainder of section 1173 sets out
requirements for the specific
standards the Secretary is to adopt: Unique health identifiers, code sets,
security standards, electronic signatures, and transfer of information among health plans.
Does anyone know whether there is a matter - centric DM based on open source or web services, keeping in mind
standard law firm
security and confidentiality
requirements.
The
Securities and Exchange Commission has issued a notice with new disclosure
requirements that further modernize reporting
standards.
«Appropriate federal oversight may include: data reporting, capital
requirements, cyber
security standards, measures to prevent fraud and price manipulation and anti-money laundering and «know your customer» protections,» he will testify.
At the highest level of technical complexity, design and verify the technology solution meets business and technical
requirements and is in compliance with enterprise architecture guidelines, technology
standards and methodology, and compliance and
security standards