Access, Intervention, Transfer and Separation Control Sample Clauses

Access, Intervention, Transfer and Separation Control a. Supplier will maintain documented security architecture of networks that it manages in its operation of the Contracted Services. Supplier will employ measures to prevent unauthorized network connections to systems, applications, and network devices, ensuring compliance with secure segmentation, isolation, and defense in-depth standards. Supplier may use wireless networking technology in its delivery of the Contracted Services, but Supplier must encrypt and require secure authentication for any such wireless networks. b. Supplier will maintain measures that are designed to logically separate and prevent any Cellulant Data from being exposed to or accessed by unauthorized persons. Further, Supplier will maintain appropriate isolation of its production, non-production, and any other environments, and, if any Cellulant Data are transferred to a non-production environment (for example to reproduce an error), then Supplier will ensure that all security and privacy protections in the non-production environment are equal to those in the production environment. c. Supplier will encrypt all Cellulant Data in transit and at rest (unless Supplier demonstrates to Cellulant’s reasonable satisfaction that encryption for Cellulant Data at rest is technically infeasible). Supplier will also encrypt all physical media, if any, such as media containing backup files. Supplier will maintain documented procedures for secure key generation, issuance, distribution, storage, rotation, revocation, recovery, backup, destruction, access, and use associated with data encryption. d. If Supplier requires access to any Cellulant Data, Supplier will restrict and limit such access to the least level required to provide and support the Contracted Services. Supplier shall require that such access, including administrative access to any underlying components (i.e., privileged access), will be individual, role based, and subject to approval and regular validation by authorized Supplier employees following segregation of duty principles. Supplier will maintain measures to identify and remove redundant and dormant accounts with privileged access and will promptly revoke such access upon the account owner’s separation or at the request of authorized Supplier employees, such as the account owner’s manager. e. Consistent with industry standard practices, Supplier will maintain technical measures enforcing timeout of inactive sessions, lockout of accounts after multiple sequential failed login at...
AutoNDA by SimpleDocs
Access, Intervention, Transfer and Separation Control a. IBM will maintain documented security architecture of networks managed by IBM in its operation of the Cloud Service. IBM will separately review such network architecture, including measures designed to prevent unauthorized network connections to systems, applications and network devices, for compliance with its secure segmentation, isolation, and defense-in-depth standards prior to implementation. IBM may use wireless networking technology in its maintenance and support of the Cloud Service and associated components. Such wireless networks, if any, will be encrypted and require secure authentication and will not provide direct access to Cloud Service networks. Cloud Service networks do not use wireless networking technology. b. IBM will maintain measures for a Cloud Service that are designed to logically separate and prevent Content from being exposed to or accessed by unauthorized persons. IBM will maintain appropriate isolation of its production and non-production environments, and, if Content is transferred to a non-production environment, for example in order to reproduce an error at Client's request, security and privacy protections in the non-production environment will be equivalent to those in production. c. To the extent described in the relevant TD, IBM will encrypt Content not intended for public or unauthenticated viewing when transferring Content over public networks and enable use of a cryptographic protocol, such as HTTPS, SFTP, and FTPS, for Client's secure transfer of Content to and from the Cloud Service over public networks. d. IBM will encrypt Content at rest when specified in a TD. If the Cloud Service includes management of cryptographic keys, IBM will maintain documented procedures for secure key generation, issuance, distribution, storage, rotation, revocation, recovery, backup, destruction, access, and use. e. If IBM requires access to Content, it will restrict such access to the minimum level required. Such access, including administrative access to any underlying components (privileged access), will be individual, role-based, and subject to approval and regular validation by authorized IBM personnel following the principles of segregation of duties. IBM will maintain measures to identify and remove redundant and dormant accounts with privileged access and will promptly revoke such access upon the account owner's separation or the request of authorized IBM personnel, such as the account owner's manager. f. Consistent with indus...
Access, Intervention, Transfer and Separation Control a. Cellulant will maintain documented security architecture of networks that it manages in its operation of the Contracted Services. Cellulant will employ measures to prevent unauthorized network connections to systems, applications, and network devices, ensuring compliance with secure segmentation, isolation, and defense in-depth standards. Cellulant may use wireless networking technology in its delivery of the Contracted Services, but Cellulant must encrypt and require secure authentication for any such wireless networks. b. Cellulant will maintain measures that are designed to logically separate and prevent any Customer Data from being exposed to or accessed by unauthorized persons. Further, Cellulant will maintain appropriate isolation of its production, non-production, and any other environments, and, if any Customer Data are transferred to a non-production environment (for example to reproduce an error), then Cellulant will ensure that all security and privacy protections in the non-production environment are equal to those in the production environment. c. Cellulant will encrypt all Customer Data in transit and at rest (unless Cellulant demonstrates to Customer’s reasonable satisfaction that encryption for Customer Data at rest is technically infeasible). Cellulant will also encrypt all physical media, if any, such as media containing backup files. Cellulant will maintain documented procedures for secure key generation, issuance, distribution, storage, rotation, revocation, recovery, backup, destruction, access, and use associated with data encryption. d. If Cellulant requires access to any Customer Data, Cellulant will restrict and limit such access to the least level required to provide and support the Contracted Services. Cellulant shall require that such access, including administrative access to any underlying components (i.e., privileged access), will be individual, role based, and subject to approval and regular validation by authorized Cellulant employees following segregation of duty principles. Cellulant will maintain measures to identify and remove redundant and dormant accounts with privileged access and will promptly revoke such access upon the account owner’s separation or at the request of authorized Cellulant employees, such as the account owner’s manager. e. Consistent with industry standard practices, Cellulant will maintain technical measures enforcing timeout of inactive sessions, lockout of accounts after multiple sequential fai...
Access, Intervention, Transfer and Separation Control. (a) Pindrop will maintain measures for Pindrop-Controlled Systems that are designed to logically separate and prevent Company’s Confidential Information stored within Pindrop-Controlled Systems from being exposed to or accessed by unauthorized persons. Pindrop will maintain isolation of its production and non-production environments, and, if Company’s Confidential Information is transferred to a non- production environment, for example to reproduce an error at Company’s request, security and privacy protections in the non-production environment will be equivalent to those in production. (b) Pindrop will encrypt Company’s Confidential Information that is subject to long-term storage within Pindrop-Controlled Systems and when Company’s Confidential Information is transmitted by Pindrop over public networks. Pindrop will maintain documented procedures for encryption key generation, issuance, distribution, storage, rotation, revocation, recovery, backup, destruction, access, and use. To the extent that encryption is impractical, Pindrop will use compensating controls designed to protect Company’s Confidential Information. (c) If Pindrop requires access to Company’s Confidential Information that is stored within Pindrop-Controlled Systems, and if such access is managed by Pindrop, Pindrop will deploy measures designed to restrict access to the minimum level required. Such access, including, without limitation, administrative access, will be individual, role- based, and subject to approval and regular validation by authorized Pindrop personnel following the principles of segregation of duties. Pindrop will maintain measures to identify and remove redundant and dormant accounts with privileged access and will promptly revoke such access upon the account owner’s separation or upon the request of authorized Pindrop personnel, such as the account owner’s manager. (d) For Pindrop-Controlled Systems, Pindrop will: (i) monitor and periodically test the Pindrop-Controlled Systems to assess the effectiveness of the Security Policy; (ii) maintain technical measures enforcing timeout of inactive sessions, lockout of accounts after multiple sequential failed login attempts, strong password or passphrase authentication, and password change frequency; (iii) monitor use of privileged access and maintain security information and event management measures designed to: (1) identify unauthorized access, use or tampering; (2) facilitate a timely and appropriate response, and (3) en...
Access, Intervention, Transfer and Separation Control a. The Supplier will maintain a documented security architecture for Components. The Supplier will separately review such security architecture, including measures designed to prevent unauthorized network connections to systems, applications and network devices, for compliance with its secure segmentation, isolation, and defense-in-depth standards prior to implementation. b. The Supplier may use wireless networking technology in its maintenance and support of the Supplier Services and associated Components. Such wireless networks, if any, will be encrypted and require secure authentication and will not provide direct access to the Supplier Cloud Services networks. The Supplier Cloud Services networks do not use wireless networking technology. c. The Supplier will maintain measures for the Supplier Service that are designed to logically separate and prevent Content from being exposed to or accessed by unauthorized persons. The Supplier will maintain appropriate isolation of its production and non-production environments, and, if Content is transferred to a non -production environment, for example to reproduce an error at the Buyer's request, security and privacy protections in the non -production environment will be equivalent to those in production. d. The Supplier will encrypt Content not intended for public or unauthenticated viewing when transferring Content over public networks and enable use of a cryptographic protocol, such as HTTPS, SFTP, or FTPS, for the Buyer’s secure transfer of Content to and from the Supplier Services over public networks. e. The Supplier will encrypt Content at rest if and as specified in the Supplier Services Document. If the Supplier Service includes management of cryptographic keys, the Supplier will maintain documented procedures for secure key generation, issuance, distribution, storage, rotation, revocation, recovery, backup, destruction, access, and use. f. If the Supplier requires access to Content to provide the Supplier Services, and if such access is managed by the Supplier, the Supplier will restrict access to the minimum level required. Such access, including administrative access to any underlying Components (privileged access), will be individual, role-based, and subject to approval and regular validation by authorized the Supplier personnel following the principles of segregation of duties. The Supplier will maintain measures to identify and remove redundant and dormant accounts with privileged access and will ...

Related to Access, Intervention, Transfer and Separation Control

  • Project Management Plan 3.2.1 Developer is responsible for all quality assurance and quality control activities necessary to manage the Work, including the Utility Adjustment Work. Developer shall undertake all aspects of quality assurance and quality control for the Project and Work in accordance with the approved Project Management Plan, Good Industry Practice and applicable Law. 3.2.2 Developer shall develop the Project Management Plan and its component parts, plans and other documentation in accordance with the requirements set forth in Section 1.5.2.5

  • Files Management and Record Retention relating to Grantee and Administration of this Agreement a. The Grantee shall maintain books, records, and documents in accordance with generally accepted accounting procedures and practices which sufficiently and properly reflect all expenditures of funds provided by Florida Housing under this Agreement. b. Contents of the Files: Grantee must maintain files containing documentation to verify all funds awarded to Grantee in connection with this Agreement, as well as reports, records, documents, papers, letters, computer files, or other material received, generated, maintained or filed by Grantee in connection with this Agreement. Grantee must also keep files, records, computer files, and reports that reflect any compensation it receives or will receive in connection with this Agreement.

  • Consideration of Criminal History in Hiring and Employment Decisions 10.14.1 Contractor agrees to comply fully with and be bound by all of the provisions of Chapter 12T, “City Contractor/Subcontractor Consideration of Criminal History in Hiring and Employment Decisions,” of the San Francisco Administrative Code (“Chapter 12T”), including the remedies provided, and implementing regulations, as may be amended from time to time. The provisions of Chapter 12T are incorporated by reference and made a part of this Agreement as though fully set forth herein. The text of the Chapter 12T is available on the web at xxxx://xxxxx.xxx/olse/fco. Contractor is required to comply with all of the applicable provisions of 12T, irrespective of the listing of obligations in this Section. Capitalized terms used in this Section and not defined in this Agreement shall have the meanings assigned to such terms in Chapter 12T. 10.14.2 The requirements of Chapter 12T shall only apply to a Contractor’s or Subcontractor’s operations to the extent those operations are in furtherance of the performance of this Agreement, shall apply only to applicants and employees who would be or are performing work in furtherance of this Agreement, and shall apply when the physical location of the employment or prospective employment of an individual is wholly or substantially within the City of San Francisco. Chapter 12T shall not apply when the application in a particular context would conflict with federal or state law or with a requirement of a government agency implementing federal or state law.

  • LEAST RESTRICTIVE ENVIRONMENT/DUAL ENROLLMENT CONTRACTOR and XXX shall follow all LEA policies and procedures that support Least Restrictive Environment (“LRE”) options and/or dual enrollment options if available and appropriate, for students to have access to the general curriculum and to be educated with their nondisabled peers to the maximum extent appropriate. CONTRACTOR and XXX shall ensure that LRE placement options are addressed at all IEP team meetings regarding students for whom ISAs have been or may be executed. This shall include IEP team consideration of supplementary aids and services, goals and objectives necessary for placement in the LRE and necessary to enable students to transition to less restrictive settings. When an IEP team has determined that a student should be transitioned into the public school setting, CONTRACTOR shall assist the LEA in implementing the IEP team’s recommended activities to support the transition.

  • Construction Management Plan Contractor shall prepare and furnish to the Owner a thorough and complete plan for the management of the Project from issuance of the Proceed Order through the issuance of the Design Professional's Certificate of Material Completion. Such plan shall include, without limitation, an estimate of the manpower requirements for each trade and the anticipated availability of such manpower, a schedule prepared using the critical path method that will amplify and support the schedule required in Article 2.1.5 below, and the Submittal Schedule as required in Article 2.2.3. The Contractor shall include in his plan the names and resumés of the Project Superintendent, Project Manager and the person in charge of Safety.

  • TRAINING AND EMPLOYEE DEVELOPMENT 9.1 The Employer and the Union recognize the value and benefit of education and training designed to enhance an employee’s ability to perform their job duties. Training and employee development opportunities will be provided to employees in accordance with Employer policies and available resources. 9.2 Attendance at employer-required training will be considered time worked. The Employer will make reasonable attempts to schedule employer-required training during an employee’s regular work shift. The Employer will pay the registration and associated travel costs in accordance with Article 23, Travel, for employer-required training.

  • Information Systems Acquisition Development and Maintenance a. Client Data – Client Data will only be used by State Street for the purposes specified in this Agreement.

  • Project Manager, County The County shall appoint a Project Manager to act as liaison between the County and the Subrecipient during the term of this Contract. The County’s Project Manager shall coordinate the activities of the County staff assigned to work with the Subrecipient.

  • Additional Acceptable Uses of Student Data Contractor is prohibited from using Student Data for any secondary use not described in this agreement except: a. for adaptive learning or customized student learning purposes; b. to market an educational application or product to a parent or legal guardian of a student if Contractor did not use Data, shared by or collected per this Contract, to market the educational application or product; c. to use a recommendation engine to recommend to a student i. content that relates to learning or employment, within the third-party contractor's internal application, if the recommendation is not motivated by payment or other consideration from another party; or

  • Contractor’s Project Manager and Key Personnel Contractor shall appoint a Project Manager to direct the Contractor’s efforts in fulfilling Contractor’s obligations under this Contract. This Project Manager shall be subject to approval by the County and shall not be changed without the written consent of the County’s Project Manager, which consent shall not be unreasonably withheld. The Contractor’s Project Manager shall be assigned to this project for the duration of the Contract and shall diligently pursue all work and services to meet the project time lines. The County’s Project Manager shall have the right to require the removal and replacement of the Contractor’s Project Manager from providing services to the County under this Contract. The County’s Project manager shall notify the Contractor in writing of such action. The Contractor shall accomplish the removal within five (5) business days after written notice by the County’s Project Manager. The County’s Project Manager shall review and approve the appointment of the replacement for the Contractor’s Project Manager. The County is not required to provide any additional information, reason or rationale in the event it The County is not required to provide any additional information, reason or rationale in the event it requires the removal of Contractor’s Project Manager from providing further services under the Contract.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!