ADDITIONAL SECURITY POLICIES Sample Clauses

ADDITIONAL SECURITY POLICIES. The Vendor shall have a documented operating procedures to discharge the security requirements detailed within this Agreement and provide TSP with access to such documentation in accordance withAccess to Vendor systems” as stipulated in this agreement. The Vendor shall notify the TSP Security Contact immediately of any changes to its Access method through the firewalls, including the provision of network address translation. The Vendor shall implement a controlled exit procedure in respect of the individual Contract Personnel to ensure the return of any TSP assets or TSP Items or TSP Information in the possession of the individual when any of the Contract Personnel who have Access, leave the employment of the Vendor or are no longer engaged for the purpose of this Agreement. Such controlled exit procedure shall include a written communication by the Vendor Security Contact to TSP Security Contact of this removal. The Vendor shall inform the TSP Security Contact immediately upon its becoming aware of any actual or suspected unauthorised Access or misuse of TSP Systems or TSP Information or breach of any of the Vendor's obligations under this Agreement. The Vendor shall maintain integrity of the software build including upgrades, operating systems and application from factory to desk. The Vendor shall demonstrate that the software build (both proprietary and off-the-shelf) delivered to TSP is the same as the software build agreed with TSP. The software should not have such bugs which could hamper security in future including any unauthorized leakage of TSP Information including Sensitive Information. Self-help systems operated by TSP, shall only be remotely accessible by Authorised Contract Personnel. Any change of location by the Contract Personnel or Vendor for any part of the supply chain or the support centers shall be notified to TSP immediately. TSP may carry out current and future risk assessments and other audits with pro-active support from the Vendor on any part of the Vendor’s supply chain to identify additional risks to TSP . TSP may then stipulate additional countermeasures to address any risks. This in no means would reduce the Vendor ultimate obligations and responsibility relating to security No replacement of TSP System support tools must be undertaken by the Vendor without specific agreement from TSP. If TSP agrees to the Vendor’s appointment of Subcontractor under this Agreement , TSP may require that the associated security risks are cl...
AutoNDA by SimpleDocs
ADDITIONAL SECURITY POLICIES. 4.7.1 The Vendor shall have a documented operating procedures to discharge the security requirements detailed within this Agreement and provide TSP with access to such documentation in accordance withAccess to Vendor systems” as stipulated in this agreement.

Related to ADDITIONAL SECURITY POLICIES

  • Security Policies IBM maintains privacy and security policies that are communicated to IBM employees. IBM requires privacy and security training to personnel who support IBM data centers. We have an information security team. IBM security policies and standards are reviewed and re-evaluated annually. IBM security incidents are handled in accordance with a comprehensive incident response procedure.

  • Additional security requirements The following provisions apply in respect of any Additional Security provided:

  • Security Policy As part of PCI DSS, the Card Organizations require that you have a security policy that covers the security of credit card information.

  • SECURITY POLICIES AND NOTIFICATIONS State Security Policies and Procedures The Contractor and its personnel shall review and be familiar with all State security policies, procedures and directives currently existing or implemented during the term of the Contract, including ITS Policy NYS-P03-002 Information Security Policy (or successor policy). Security Incidents Contractor shall address any Security Incidents in the manner prescribed in ITS Policy NYS-P03-002 Information Security Policy (or successor policy), including the New York State Cyber Incident Reporting Procedures incorporated therein or in such successor policy.

  • Additional Security This guarantee is in addition to and is not in any way prejudiced by any other guarantee or security now or subsequently held by any Finance Party.

  • Schedule of Underlying Insurance Policies If Umbrella or Excess policy is evidenced to comply with minimum limits, a copy of the Underlying Schedule from the Umbrella or Excess insurance policy may be required.

  • Security Policy for Contractors 1. The Department for Work and Pensions treats its information as a valuable asset and considers that it is essential that information must be protected, together with the systems, equipment and processes which support its use. These information assets may include data, text, drawings, diagrams, images or sounds in electronic, magnetic, optical or tangible media, together with any Personal Data for which the Department for Work and Pensions is the Data Controller.

  • Additional Insurance Requirements The policies shall include, or be endorsed to include, the following provisions:

  • Contractor and Employee Security Precautions A. The security aspects of working at the Correctional Facility are critical. The following security precautions are part of the site conditions and are a part of this Contract. All persons coming on the site in any way connected with this Work shall be made aware of them, and it is the (General) Contractor’s responsibility to check and enforce them.

  • Required Policies and Coverages Without limiting any liabilities or any other obligations of Seller under this Agreement, Seller shall secure and continuously carry with an insurance company or companies rated not lower than “B+” by the A.M. Best Company the insurance coverage specified below:

Time is Money Join Law Insider Premium to draft better contracts faster.