Va handbook 6500.1


















Settlement Procedures Timetable For offers to purchase Certificated Notes accepted by the Company, Settlement Procedures A through F set forth above shall be completed as soon as possible following the trade but not later than the respective times New York City time set forth below: Settlement Procedure Time.

LLC, from time-to-time in effect and attached hereto as Appendix 2. Policies and Procedures means the written policies and procedures of the Client in any way related to the Services, including any such policies and procedures contained in the Organic Documents and the Offering Documents.

Best Management Practices BMPs means schedules of activities, prohibitions of practices, maintenance procedures, and other management practices to prevent or reduce the pollution of waters of the state. BMPs also include treatment requirements, operating procedures, and practices to control site runoff, spillage or leaks, sludge or waste disposal, or drainage from raw material storage.

Best Management Practices BMP means a schedule of activities, prohibition of practices, maintenance procedures and other management practices to prevent or reduce the pollution of state waters. BMPs include treatment requirements, operating and maintenance procedures, schedule of activities, prohibition of activities, and other management practices to control plant site runoff, spillage, leaks, sludge or waste disposal, or drainage from raw material storage.

Security Procedures means any instructions, recommendations, measures and procedures concerning security or authentication issued or made available to You. Applicable Depository Procedures means, with respect to any transfer or transaction involving a Global Security or beneficial interest therein, the rules and procedures of the Depositary for such Security, in each case to the extent applicable to such transaction and as in effect from time to time.

Dissent Procedures has the meaning set out in Section 3. Location within the U. The contractor or subcontractor must notify the Contracting Officer immediately when an employee working on a VA system or with access to VA information is reassigned or leaves the contractor or subcontractor's employ.

The Contracting Officer must also be notified immediately by the contractor or subcontractor prior to an unfriendly termination. If co-mingling must be allowed to meet the requirements of the business need, the contractor must ensure that VA's information is returned to the VA or destroyed in accordance with VA's sanitization requirements. Self-certification by the contractor that the data destruction requirements above have been met must be sent to the VA Contracting Officer within 30 days of termination of the contract.

If Federal or VA information confidentiality and security laws, regulations and policies become applicable to the VA information or information systems after execution of the contract, or if NIST issues or updates applicable FIPS or Special Publications SP after execution of this contract, the parties agree to negotiate in good faith to implement the information confidentiality and security laws, regulations and policies in this contract.

If copies are made for restoration purposes, after the restoration is complete, the copies must be appropriately destroyed. If VA determines that the contractor has violated any of the information confidentiality, privacy, and security provisions of the contract, it shall be sufficient grounds for VA to withhold payment to the contractor or third party or terminate the contract for default or terminate for cause under Federal Acquisition Regulation FAR part Absent an agreement to use or disclose protected health information, there is no business associate relationship.

VA Configuration Guidelines are available upon request. This includes conducting compliant risk assessments, routine vulnerability scanning, system patching and change management procedures, and the completion of an acceptable contingency plan for each system.

The contractor's security control procedures must be equivalent, to those procedures used to secure VA systems. All external Internet connections to VA's network involving VA information must be reviewed and approved by VA prior to implementation. Adequate security controls for collecting, processing, transmitting, and storing of Personally Identifiable Information PIO, as determined by the VA Privacy Service, must be in place, tested, and approved by VA prior to hosting, operation, maintenance, or use of the information system, or systems by or on behalf of VA.

Government-owned government facility or government equipment contractor-operated systems, third party or business partner networks require memorandums of understanding and interconnection agreements MOU-ISA which detail what data types are shared, who has access, and the appropriate level of security controls for all systems connected to VA networks. Security deficiencies must be corrected within the timeframes approved by the government. Both hard copy and electronic copies of the assessment must be provided to the COTR.

All of the security controls required for government furnished equipment GFE must be utilized in approved other equipment OE and must be funded by the owner of the equipment. All remote systems must be equipped with, and use, a VA-approved antivirus AV software and a personal host-based or enclave based firewall that is configured with a VA-approved configuration.

Software must be kept current, including all critical updates and patches. Owners of approved OE are responsible for providing and maintaining the anti-viral software and the firewall on the non-VA owned OE. Media hard drives, optical disks, CDs, back-up tapes, etc.

This must be completed within 30 days of termination of the contract. Bio-Medical devices and other equipment or systems containing media hard drives, optical disks, etc. The options are: 1 Vendor must accept the system without the drive; 2 VA's initial medical device purchase includes a spare drive which must be installed in place of the original drive at time of turn-in; or 3 VA must reimburse the company for media at a reasonable open market replacement cost at time of purchase.

Task 3: Receipt and storage of VA samples for metabolomics analysis The contractor shall include in proposal in their response to this PWS the outer boundaries of needed plasma sample quality, quantity and shipping requirement which will then be discussed and finalized at the Kick-off meeting.

VA will provide the contractor with coded human plasma samples. The samples shall be stored by the contractor at degrees Celsius in locked upright or chest freezers with emergency back-up power until the samples are processed for sequencing.

Any unused samples are to be destroyed by the contractor as specified by VA policies. Sample tracking and management process shall be in place to ensure security of VA samples. Task 4: Proteomics Analysis Contractor shall test plasma for quality sufficient to proceed with vendor sequencing procedures, and to confirm quality from VA reporting sent with samples, and to identity match samples before and after sequencing.

Contractor shall provide the following services when a task order is issued: Summary report that includes methods used and quality control statistics Sensitivity data Intra assay and inter assay variability Dynamic Range of each biomarker assay: require a minimum of logs Raw and scaled data for each biomarker detected Identity of each biomarker and validation method used. Quantification of each biomarker Task 5: Provide reports and required Data 1. Monthly Written Report: B This report shall be delivered electronically via email no later than the 1st day of the following month.

The report shall track parameters, including: Number of samples completed to desired parameters as requested per the task order Quality control measurements of data including number of samples that did not meet QC measurement standards These reports will include any non-compliance issues, to include if and the number of samples that do not meet contractor s QC standards.

And, in accordance with the most current industry standards, any other data that may be deemed beneficial to VA by contractor.

Required Proteomics Data Contractor shall supply completed proteomics analyses data for the VA samples including the data requirements in Task 4, and generated in a secure manner in one or all of the requested formats below: VA approved encrypted hard drives. Task 6: Destruction of Unused sample and proteomic data The contractor shall destroy or return unused VA samples, in compliance with relevant sections of VA Handbook The acceptable method of destroying VA samples is by bleaching and certified to that effect.

The data on the vendor s end shall be destroyed by the vendor after documented completion of initial QC checks by the VA.



0コメント

  • 1000 / 1000