Security Policies Sample Clauses

Security Policies. IBM maintains privacy and security policies that are communicated to IBM employees. IBM requires privacy and security training to personnel who support IBM data centers. We have an information security team. IBM security policies and standards are reviewed and re-evaluated annually. IBM security incidents are handled in accordance with a comprehensive incident response procedure.
AutoNDA by SimpleDocs
Security Policies. To the extent the Contractor or its subcontractors, affiliates or agents handles, collects, stores, disseminates or otherwise deals with State Data, the Contractor will have an information security policy that protects its systems and processes and media that may contain State Data from internal and external security threats and State Data from unauthorized disclosure, and will have provided a copy of such policy to the State. The Contractor shall provide the State with not less than thirty (30) days advance written notice of any material amendment or modification of such policies.
Security Policies a. Contractor’s security policy is documented, has obtained management approval, is reviewed no less frequently than annually and is maintained to ensure its continuing suitability, adequacy and effectiveness; and
Security Policies. The responsible party and the operator will each maintain and fully implement written security policies that apply to personal information processing.
Security Policies. Contractor shall comply at all times with Agency’s security policies as they are stated in this Contract or otherwise made available to Contractor.
Security Policies. Controller and processor will each maintain and fully implement written security policies that apply to personal data processing.
Security Policies. Vendor shall at all times ensure personnel who may come in to contact with Confidential Information, including all Vendor employees, subcontractors, service providers, independent contractors, or agents employed or otherwise engaged by Vendor in connection with this Agreement will be subject to and shall comply with all security and confidentiality provisions contained in this Agreement and all established security and privacy policies and practices of Vendor, which will be shared in their entirety with the University within fifteen (15) days of the execution of this Agreement. In the event such policies are modified subsequent to the execution of this Agreement, then Vendor shall promptly notify the University in writing of such changes. In the event that the University finds Vendor’s information security polices and standards deficient, the University may require that the Vendor establish additional safeguards within a commercially reasonable time (but not more than forty-five (45) days). In the event Vendor chooses not to implement additional safeguards suggested by the University, the University will have the right to terminate this Agreement without penalty and with a pro rata refund to the University through the date of termination.
AutoNDA by SimpleDocs
Security Policies. Vendor will maintain written security policies that are fully implemented and applied to the processing of Personal Data. At a minimum, these policies must include assignment of internal responsibility for information security management, devoting adequate personnel resources to information security, carrying out appropriate background checks on permanent staff who will have access to the Personal Data, requiring employees, vendors and others with access to Personal Data to enter into written confidentiality agreements, and conducting training to make employees and others with access to the Personal Data aware of information security risks presented by the processing.
Security Policies. Consultant and Company agree that their personnel, while working at or visiting the premises of the other party, shall comply with all the internal rules and regulations of the other party, including security procedures, and all applicable federal, state, and local laws and regulations applicable to the location where said employees are working or visiting.
Security Policies. Non-Disclosure Agreement. Contractor at all times shall comply with County’s security policies is attached as Exhibit G. Contractor shall upon County’s request provide a written non-disclosure agreement and obtain such from Contractor’s employees or subcontractors performing Services under this Contract including the Maintenance and Support Agreement included as Exhibit G.
Time is Money Join Law Insider Premium to draft better contracts faster.