Access and Security Procedures Sample Clauses

Access and Security Procedures. Partners to the Tier Zero will ensure that personal information is transferred and shared in a secure manner. Any electronic transfer or other risk media are the subject of local Data Sharing Agreements (Tier Two), and organisational Safe Haven Policy and procedures. Staff either representing the partners or who will facilitate this Tier One or related local Data Sharing Agreements (Tier Two) shall be identified by name. Those responsible for information sharing at an operational level shall also be named as part of any individual local agreements. Furthermore, it is the responsibility of the partner organisations to ensure that such information is always kept up to date. Staff representing the partners to the Tier Zero should only have access to personal information on a ‘need to know’ basis in order to perform their duties in connection with one or more of the defined purposes. Information must be used for the purpose for which it was obtained and only if it is appropriate and necessary to do so. Partners will take all reasonable care to both safeguard and protect the physical security of information technology and the data contained within it. They will ensure that mechanisms are in place to address the issues of physical security, security awareness and training, security management, systems development and system specific security policies. Evidence must be in the form of a local Strategy and/or an Information Security Policy. Formal adoption will follow the signing of the Tier Zero by a responsible person for each of the respective organisations. The Tier One will be freely available to any representative of any organisation that shares personally identifiable information with the partner organisations. Copies of the Tier Zero, Tier One and Tier Two will be lodged with the Cheshire and Merseyside STP Share2Care Programme Office. The Tier Zero must be supplemented by individual local Tier Two agreements pertinent to any specific information sharing arrangements. It is recommended that all these agreements/tiers be displayed on the organisation’s website for the information of staff and public alike. Also for public scrutiny to supplement information already provided to the general public on matters of information sharing.
AutoNDA by SimpleDocs
Access and Security Procedures. (a) You agree to comply, and to cause your Designees to comply, with Access Methods that we or our Suppliers may issue or require from time to time for use of the Site and access to the Services and the Information, which may require you to establish a user name and password in order to use the Site. You are solely responsible for any use and unauthorized use of the Site and access to the Services caused by your or your Designee’s acts or omissions or arising by or through you or such Designee, including without limitation, (a) for ensuring that the Services and your Access Methods are provided to and used by only you and your Designees and (b) for any and all use and/or misuse of the Site or the Services by your Designees or any other person who accesses the Services or the Site using your Access Methods or Device, whether or not you have authorized them to do so. You may access the Site and the Services only through acceptable Access Methods. (b) At our reasonable request, you shall provide us with a list of your Designees and their countries of domicile. If any Designee ceases to be associated with your organization or no longer requires access to the Site, or if your Access Methods have been lost, stolen or compromised, you will promptly notify us in writing immediately so that we may cancel relevant Access Methods. You agree to notify us immediately if you become aware of any disclosure, loss, theft, or unauthorized use of Client Information, your Device or other security tools or any loss, theft or unauthorized use of your Device. All transmissions generated by use of your Access Methods will be deemed authorized by you and made by you or your Designee whether or not we acknowledge receipt of such transmission. You agree to notify us immediately in the event that you learn or have reason to believe that any person to whom you have given access to the Site or the Services has violated or intends to violate the terms of this Agreement, and you agree that you will cooperate with us in investigating any unauthorized access or attempted access to the Site or the Services and in seeking injunctive or other equitable relief. You agree to discontinue use of the Site or the Services upon our request. We may restrict your access to the Site or the Services at any time for security or any other reasons or noncompliance with the terms of this Agreement, without liability to us or our Suppliers. (c) Access to the Site and the Services may require transmission of ...
Access and Security Procedures. 6.1 The Project Sponsors will ensure that they have policies and procedures in place, which establish and maintain good security standards for information systems containing service user personal information. These policies and procedures will promote best practice in the management and operation of the systems and ensure that only properly authorised staff access personal information for appropriate purposes. 6.2 This document is not intended to replicate the provisions of the policies and procedures referred to above. However in storing and sharing information attention is drawn to the following: (i) Paper records must be stored in locked cabinets in secure rooms. Keys must be kept securely and only be held by staff who require regular access to the records. (ii) Computer equipment that can be used to gain access to service user personal information must be kept in secure locations with appropriate levels of password protections. Passwords must not be divulged to others. (iii) Information stored on computer must be regularly backed up, with the back up copies stored in secure locations away from the computer. 6.3 The Project Sponsors will make sure that service users personal information is shared in a secure manner, in particular: (i) Before sharing information by telephone the identify and authenticity of the recipient must be established. (ii) Written communications should be transferred in a sealed envelope addressed to the designated recipient. The envelope should be marked ‘Personal and Confidential to be opened by the addresses only’. The designated recipient should be already to the despatch of the information and should make arrangements within their own organisation to ensure that the envelope is delivered to the unopened and that it is received within the expected timescale. (iii) Transfer by fax must only be considered where there is no appropriate alternative available. It is the responsibility of the sender to make sure that the information is sent to the right fax machine. It is the responsibility of the recipient to retrieve the information from the fax machine from the fax promptly. The fax should be marked ‘Personal and Confidential – for the attention of (name of recipient) only’. The designated recipient should be alerted prior to dispatch of the information and should make arrangements to be available to receive the fax personally. (iv) E-mail must not be used for the sharing of sensitive personal data until such time as appropriate ...
Access and Security Procedures 

Related to Access and Security Procedures

  • Safety and Security Procedures Contractor shall maintain and enforce, at the Contractor Work Locations, industry-standard safety and physical security policies and procedures. While at each Court Work Location, Contractor shall comply with the safety and security policies and procedures in effect at such Court Work Location.

  • Security Procedures The Fund shall comply with data access operating standards and procedures and with user identification or other password control requirements and other security procedures as may be issued from time to time by State Street for use of the System on a remote basis and to access the Data Access Services. The Fund shall have access only to the Fund Data and authorized transactions agreed upon from time to time by State Street and, upon notice from State Street, the Fund shall discontinue remote use of the System and access to Data Access Services for any security reasons cited by State Street; provided, that, in such event, State Street shall, for a period not less than 180 days (or such other shorter period specified by the Fund) after such discontinuance, assume responsibility to provide accounting services under the terms of the Custodian Agreement.

  • Security Protocols Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.

  • Security Procedure The Client acknowledges that the Security Procedure it has designated on the Selection Form was selected by the Client from Security Procedures offered by State Street. The Client agrees that the Security Procedures are reasonable and adequate for its wire transfer transactions and agrees to be bound by any payment orders, amendments and cancellations, whether or not authorized, issued in its name and accepted by State Street after being confirmed by any of the selected Security Procedures. The Client also agrees to be bound by any other valid and authorized payment order accepted by State Street. The Client shall restrict access to confidential information relating to the Security Procedure to authorized persons as communicated in writing to State Street. The Client must notify State Street immediately if it has reason to believe unauthorized persons may have obtained access to such information or of any change in the Client’s authorized personnel. State Street shall verify the authenticity of all instructions according to the Security Procedure.

  • Security Safeguards Contractor shall store and process District Data in accordance with commercial best practices, including implementing appropriate administrative, physical, and technical safeguards that are no less rigorous than those outlined in SANS Top 20 Security Controls, as amended, to secure such data from unauthorized access, disclosure, alteration, and use. Contractor shall ensure that all such safeguards, including the manner in which District Data is collected, accessed, used, stored, processed, disposed of and disclosed, comply with all applicable federal and state data protection and privacy laws, regulations and directives, including without limitation C.R.S. § 00-00-000 et seq., as well as the terms and conditions of this Addendum. Without limiting the foregoing, and unless expressly agreed to the contrary in writing, Contractor warrants that all electronic District Data will be encrypted in transmission and at rest in accordance with NIST Special Publication 800-57, as amended.

  • PERSONAL INFORMATION PRIVACY AND SECURITY CONTRACT 11 Any reference to statutory, regulatory, or contractual language herein shall be to such language as in 12 effect or as amended. 13 A. DEFINITIONS

  • Safety Procedures The Contractor shall: (a) comply with all applicable safety regulations according to Attachment H; (b) take care for the safety of all persons entitled to be on the Site; (c) use reasonable efforts to keep the Site and Works clear of unnecessary obstruction so as to avoid danger to these persons; (d) provide fencing, lighting, guarding and watching of the Works until completion and taking over under clause 10 [Employer's Taking Over]; and (e) provide any Temporary Works (including roadways, footways, guards and fences) which may be necessary, because of the execution of the Works, for the use and protection of the public and of owners and occupiers of adjacent land.

  • Information Security Program (1) DTI shall implement and maintain a comprehensive written information security program applicable to the Personal Information ("Information Security Program") which shall include commercially reasonable measures, including, as appropriate, policies and procedures and technical, physical, and administrative safeguards that are consistent with industry standards, providing for (i) the security and confidentiality of the Personal Information, (ii) protection of the Personal Information against reasonably foreseeable threats or hazards to the security or integrity of the Personal Information, (iii) protection against unauthorized access to or use of or loss or theft of the Personal Information, and (iv) appropriate disposal of the Personal Information. Without limiting the generality of the foregoing, the Information Security Program shall provide for (i) continual assessment and re-assessment of the risks to the security of Personal Information acquired or maintained by DTI and its agents, contractors and subcontractors in connection with the Services, including but not limited to (A) identification of internal and external threats that could result in unauthorized disclosure, alteration or destruction of Personal Information and systems used by DTI and its agents, contractors and subcontractors, (B) assessment of the likelihood and potential damage of such threats, taking into account the sensitivity of such Personal Information, and (C) assessment of the sufficiency of policies, procedures, information systems of DTI and its agents, contractors and subcontractors, and other arrangements in place, to control risks; and (ii) appropriate protection against such risks. (2) The Information Security Program shall require encryption of any Personal Information in electronic format while in transit or in storage, and enhanced controls and standards for transport and disposal of physical media containing Personal Information. DTI shall, and shall require its agents, contractors and subcontractors who access or use Personal Information or Confidential Information to, regularly test key controls, systems and procedures relating to the Information Security Program ("ISP Tests"). DTI shall advise the Funds of any material issues identified in the ISP Tests potentially affecting the Information Security Program. (3) DTI shall comply with its Information Security Program.

  • Electronic and Information Resources Accessibility and Security Standards a. Applicability: The following Electronic and Information Resources (“EIR”) requirements apply to the Contract because the Grantee performs services that include EIR that the System Agency's employees are required or permitted to access or members of the public are required or permitted to access. This Section does not apply to incidental uses of EIR in the performance of the Agreement, unless the Parties agree that the EIR will become property of the State of Texas or will be used by HHSC’s clients or recipients after completion of the Agreement. Nothing in this section is intended to prescribe the use of particular designs or technologies or to prevent the use of alternative technologies, provided they result in substantially equivalent or greater access to and use of a Product.

  • Contractor and Employee Security Precautions The security aspects of working at the Correctional Facility are critical. The following security precautions are part of the site conditions and are a part of this Contract. All persons coming on the site in any way connected with this Work shall be made aware of them, and it is the (General) Contractor’s responsibility to check and enforce them.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!