Other Security Requirements Sample Clauses

Other Security Requirements. 8.1 Premises - Please provide details of the security measures in place for restricting access to your premises including alarm systems and security staff etc.
AutoNDA by SimpleDocs
Other Security Requirements. The Company shall maintain all technologies, policies, procedures and practices necessary to secure and protect the confidentiality and integrity of WSD Student Information, including procedures to (a) establish user IDs and passwords as necessary to protect such information; (b) protect all such user passwords from detection and unauthorized use; (c) prevent hostile or unauthorized intrusion that could result in data corruption, or deny service; (d) prevent and detect computer viruses from spreading to disks, attachments to e-mail, downloaded files, and documents generated by word processing and spreadsheet programs; (e) minimize system downtime; (f) notify WSD of planned system changes that may impact the security of WSD data; (g) return or destroy WSD data that exceed specified retention schedules or upon the request of WSD; (h) notify WSD of any data storage outside the United States; (i) in the event of system failure, enable immediate recovery of WSD Student Information to the previous business day. The Company guarantees that WSD Student Information shall not be sold to, accessed by, or moved by third parties. In the event of a security breach, the Company shall (a) immediately take action to close the breach; (b) notify WSD within 24 hours of Company's first knowledge of the breach, the reasons for or cause of the breach, actions taken to close the breach, and identify the WSD Student Information compromised by the breach; (c) return compromised WSD Student Information for review; (d) provide communications on the breach to be shared with affected parties and cooperate with WSD efforts to communicate to affected parties by providing WSD with prior review of press releases and any communications to be sent to affected parties; (e) take all legally required, reasonable, and customary measures in working with WSD to remediate the breach which may include toll free telephone support with informed customer services staff to address questions by affected parties and/or provide monitoring services if necessary given the nature and scope of the disclosure; (f) cooperate with WSD by providing information, records and witnesses needed to respond to any government investigation into the disclosure of such records or litigation concerning the breach; and (g) provide WSD with notice within 24 hours of notice or service on Company, whichever occurs first, of any lawsuits resulting from, or government investigations of, the Company's handling of WSD Student Infor...
Other Security Requirements. The Independent Contractor shall maintain all technologies, policies, procedures and practices necessary to secure and protect the confidentiality and integrity of PSD Student/employee Information, including procedures to (a) establish user IDs and passwords as necessary to protect such information;
Other Security Requirements. The Company shall maintain all technologies, policies, procedures and practices necessary to secure and protect the confidentiality and integrity of FCPS Confidential Records in the Company’s possession, including procedures to (i) restrict access to such records in accordance with this Addendum; (ii) establish user IDs and passwords as necessary to protect such records; (iii) protect all such user passwords from detection and unauthorized use; (iv) prevent hostile or unauthorized intrusion that could compromise confidentiality, result in data corruption, or deny service; (v) prevent and detect computer viruses from spreading to disks, attachments to e-mail, downloaded files, and documents generated by word processing and spreadsheet programs; (v) minimize system downtime; (vi) notify FCPS of planned system changes that may impact the security of FCPS Confidential Records; (vii) return or destroy FCPS Confidential Records that exceed specified retention schedules; (viii) permit periodic security audits by FCPS or designated third party using applicable regulations and industry best practice standards as benchmarks, and make commercially reasonable efforts to remediate the vulnerabilities discovered; and (ix) in the event of system failure, enable immediate recovery of FCPS records to the previous business day. In the event of a security breach, the Company shall (i) immediately take action to close the breach; (ii) notify FCPS within 2 business days after Company's first knowledge of the breach, the reasons for or cause of the breach, actions taken to close the breach, and identify the FCPS Confidential Records compromised by the breach; (iii) return compromised FCPS Confidential Records for review; (iv) provide communications on the breach to be shared with affected parties and cooperate with FCPS efforts to communicate to affected parties by providing FCPS with prior review of press releases and any communications to be sent to affected parties; (v) take all legally required, reasonable, and customary measures in working with FCPS to remediate the breach which may include toll free telephone support with informed customer services staff to address questions by affected parties and/or provide monitoring services if necessary given the nature and scope of the disclosure; (vi) cooperate with FCPS by providing information, records and witnesses needed to respond to any government investigation into the disclosure of such records or litigation concerning the ...
Other Security Requirements. The Company shall maintain all technologies, policies, procedures and practices necessary to secure and protect the confidentiality and integrity of ACS student information, including procedures to (a) establish user IDs and passwords as necessary to protect such information;
Other Security Requirements. The Company shall maintain all technologies, policies, procedures and practices necessary to secure and protect the confidentiality and integrity of BCS student information, including procedures to (a) establish user IDs and passwords as necessary to protect such information; (b) protect all such user passwords from detection and unauthorized use; (c) prevent hostile or unauthorized intrusion that could result in data corruption, or deny service; (d) prevent and detect computer viruses from spreading to disks, attachments to e-mail, downloaded files, and documents generated by word processing and spreadsheet programs; (e) minimize system downtime; (f) notify BCS of planned system changes that may impact the security of BCS data; (g) return or destroy BCS data that exceed specified retention schedules;
Other Security Requirements. 8.1 Premises - Please provide details of the security measures in place for restricting access to your premises including alarm systems and security staff etc. To prevent unauthorised physical access, damage and interference to our premises and information, appropriate levels of physical entry controls are implemented at all of our premises to ensure security both during and outside working hours. Security perimeters and tools (barriers such as walls, CCTV, card controlled entry gates or manned reception desks) are used to protect areas that contain information and information processing facilities. Secure areas are protected by appropriate entry controls to ensure that only authorised personnel are permitted access. All employees, contractors, third party users and visitors are required to wear some form of visible identification and should immediately notify security personnel if they encounter unescorted visitors of anyone not wearing visible identification. Additional rules exist such as no tailgating’ so that individual access can be recorded and monitored. A visitor policy is in place to record visits, address information security and H&S requirements. Visitors are required to wear of visitor ID whilst on site and comply with supervision and escort requirements. Access to premises is by a physical access card issued to an individual and access can only be authorised by the employee's line manager. An inventory of all access cards is retained and checked every week. All unused access cards must be held securely. If an access card is reported lost or stolen the physical entry control system must be changed or reprogrammed immediately so that the missing card cannot be used. Access to specific rooms or areas, secure areas, stores, computer and server rooms must be by one of the following: Access card, Access card with additional access permissions to secure areas, Number coded key pad. Access to computer / server rooms, stores or secure areas is kept to a minimum, in line with the operational objectives. The responsibility for issuing access cards or granting secure room access rests with the employee’s line manager or for the secure area the manager of the business function in which the individual is working. An Access Register is retained in each secure area listing all Capita employees, contractors, related 3rd parties or visitors that have access to secure areas. Employees, contractors, and related 3rd parties, whose responsibilities change or no lo...
AutoNDA by SimpleDocs
Other Security Requirements. The Company shall maintain all technologies, policies, procedures and practices necessary to secure and protect the confidentiality and integrity of GCS student information, including procedures to
Other Security Requirements. The Company shall maintain commercially reasonable technologies, policies, procedures and practices necessary to secure and protect the confidentiality and integrity of FCPS Confidential Student Records, including procedures to (i) restrict access to such records as described in the “Confidentiality” provision of this Addendum;
Other Security Requirements. The Company shall maintain all technologies, policies, procedures and practices reasonably necessary to secure and protect the confidentiality and integrity of FCPS Confidential Student Records. In the event of a security breach, the Company shall (i) promptly take action to close the breach; (ii) notify FCPS within 2 business days after Company's first knowledge of the breach, the reasons for or cause of the breach, actions taken to close the breach, and identify the FCPS Confidential Student Records compromised by the breach; (iii) return compromised FCPS Confidential Student Records for review; (iv) provide communications on the breach to be shared with affected parties and cooperate with FCPS efforts to communicate to affected parties by providing FCPS with prior review of press releases and any communications to be sent to affected parties; (v) take all legally required, reasonable, and customary measures in working with FCPS to remediate the breach which may include toll free telephone support with informed customer services staff to address questions by affected parties and/or provide monitoring services if necessary given the nature and scope of the disclosure; (vi) cooperate with FCPS by providing information, records and witnesses needed to respond to any government investigation into the disclosure of such records or litigation concerning the breach; and
Time is Money Join Law Insider Premium to draft better contracts faster.