Access controls and security Sample Clauses

Access controls and security. All parties will ensure that they have appropriate technical and organisational security measures in place to guard against unauthorised or unlawful processing of personal data and against accidental loss or destruction of, or damage to, personal data. All personal data held by partner organisations electronically will be stored in a secure network area with password protected entry and appropriate back-up functionality. The systems will be auditable so that it is possible for any auditor to establish who has accessed the system. All laptops, computers, and any other portable devices will be encrypted. Any individual no longer required to have access will promptly have such access revoked by the line manager and Human Resources related to the relevant employer. There is an expectation that partner organisations will either be working toward ISO 27001, the International Standard for Information Security Management, or a similar standard of security.
AutoNDA by SimpleDocs
Access controls and security. All parties will ensure that they have appropriate technical and organisational security measures in place to guard against unauthorised or unlawful processing of personal data and against accidental loss or destruction of, or damage to, personal data.
Access controls and security. All parties will ensure that they have appropriate technical and organisational security measures in place to guard against unauthorised or unlawful processing of personal data and against accidental loss or destruction of, or damage to, personal data. All personal data held by partner organisations electronically will be stored in a secure network area with password protected entry and appropriate back-up functionality. The systems will be auditable so that it is possible for any auditor to establish who has accessed the system. All laptops, computers, and any other portable devices will be encrypted. Any individual no longer required to have access will promptly have such access revoked by the line manager and Human Resources related to the relevant employer. There is an expectation that partner organisations will either be working toward ISO 27001, the International Standard for Information Security Management, or a similar standard of security. At the end of the efficacy part of the LYPS (currently scheduled for the second half of 2024), identifiable data will be held separately on the IFS Data Enclave. The data relating to this project held on the IFS data enclave can only be accessed by Approved Enclave Users who are also required to sign the Data Enclave Access Agreement and have BPSS ( Baseline Personnel Security Standard) clearance. IFS data Enclave: The system (except the server and some cabling) is contained entirely within a physically secured room. The door is locked with an access card reader and a keypad. The Enclave server is contained within a separate secure room which is locked with a key. The access card system is used throughout the IFS to control access to different areas. Access is assigned by IT Services. Ability to enter the Enclave is only given to staff who have been approved to use the Enclave as outlined in Section 2.4 and who have signed the Data Enclave Access Agreement (hereafter referred to as “Approved Person(s)”). As a secondary security measure, Approved Users will also need to obtain the number code to unlock the door from the Head of Data Services, the Head of ICT or the IT Support and Systems Administrator. 2 xxxxx://xxxx.xxxxxxxxx.xxx/en-us/azure/compliance/ Visits to the Enclave are recorded via the Door Access System. Logs are kept for three months. Logs of data access are recorded electronically using the in-built computer auditing tools. Details of any outputs removed from the Enclave will be recorded in a Logboo...
Access controls and security. Both Parties will ensure that they have appropriate technical and organisational security measures in place to guard against unauthorised or unlawful processing of personal data and against accidental loss or destruction of, or damage to, personal data. All personal data held by the Parties electronically will be stored in a secure network area with password protected entry and appropriate back-up functionality. The systems will be auditable so that it is possible for any auditor to establish who has accessed the system. All laptops, computers, and any other portable devices will be encrypted. Any individual no longer required to have access will promptly have such access revoked by the line manager and Human Resources related to the relevant employer. Both partners are NHS Digital’s Data Security and Protection Toolkit (DSP ) compliant. There is an expectation that partner organisations will either be working toward ISO 27001, the International Standard for Information Security Management, or a similar standard of security such as Cyber Essentials or Cyber Essentials Plus.
Access controls and security. Landlord shall maintain within the Building, including the Premises and all common areas, a reasonably adequate door access control and electronic surveillance security system and shall provide reasonable access to the same to Tenant at all times.

Related to Access controls and security

  • Tools and Equipment As established by current practices, the Employer may determine and provide necessary tools, tool allowance, equipment and foul weather gear. The Employer will repair or replace employer-provided tools and equipment if damaged or worn out beyond usefulness in the normal course of business. Employees are accountable for equipment and/or tools assigned to them and will maintain them in a clean and serviceable condition.

  • Access Controls The system providing access to PHI COUNTY discloses to 20 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY 21 must use role based access controls for all user authentications, enforcing the principle of least privilege.

  • Security Controls for State Agency Data In accordance with Senate Bill 475, Acts 2021, 87th Leg., R.S., pursuant to Texas Government Code, Section 2054.138, Contractor understands, acknowledges, and agrees that if, pursuant to this Contract, Contractor is or will be authorized to access, transmit, use, or store data for System Agency, Contractor is required to meet the security controls the System Agency determines are proportionate with System Agency’s risk under the Contract based on the sensitivity of System Agency’s data and that Contractor must periodically provide to System Agency evidence that Contractor meets the security controls required under the Contract.

  • For Information/Tools and Other Research Studies  Outcome of project.  Published documents, including date, title, and periodical name.  A discussion of policy development. State if the project has been cited in government policy publications or technical journals, or has been used to inform regulatory bodies.  The number of website downloads.  An estimate of how the project information has affected energy use and cost, or have resulted in other non-energy benefits.  An estimate of energy and non-energy benefits.  Data on potential job creation, market potential, economic development, and increased state revenue as a result of project.  A discussion of project product downloads from websites, and publications in technical journals.  A comparison of project expectations and performance. Discuss whether the goals and objectives of the Agreement have been met and what improvements are needed, if any. • Respond to CAM questions regarding responses to the questionnaires. The Energy Commission may send the Recipient similar questionnaires after the Agreement term ends. Responses to these questionnaires will be voluntary. Products: • Kick-off Meeting Benefits Questionnaire • Mid-term Benefits Questionnaire • Final Meeting Benefits Questionnaire

  • Accreditation of Public Schools and Adoption and Implementation of School Plans The District will implement a system of accrediting all of its schools, as described in section 22-11- 307, C.R.S., which may include measures specifically for those schools that have been designated as Alternative Education Campuses, in accordance with the provisions of 1 CCR 301-57. The District will ensure that plans are implemented for each school in compliance with the requirements of the State Board pursuant to 1 CCR 301-1.

  • Internal Controls The Company shall maintain a system of internal accounting controls sufficient to provide reasonable assurances that: (i) transactions are executed in accordance with management’s general or specific authorization; (ii) transactions are recorded as necessary in order to permit preparation of financial statements in accordance with GAAP and to maintain accountability for assets; (iii) access to assets is permitted only in accordance with management’s general or specific authorization; and (iv) the recorded accountability for assets is compared with existing assets at reasonable intervals and appropriate action is taken with respect to any differences.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!