BEST PRACTISE SECURITY POLICIES Sample Clauses

BEST PRACTISE SECURITY POLICIES. 3.1 As part of the Subscription, the Supplier will enforce secure, best practise threat protection policies for endpoint protection. to These policies will dictate the automated behaviour of the software for the purposes of;
AutoNDA by SimpleDocs

Related to BEST PRACTISE SECURITY POLICIES

  • Security Policies IBM maintains privacy and security policies that are communicated to IBM employees. IBM requires privacy and security training to personnel who support IBM data centers. We have an information security team. IBM security policies and standards are reviewed and re-evaluated annually. IBM security incidents are handled in accordance with a comprehensive incident response procedure.

  • Security Policy As part of PCI DSS, the Card Organizations require that you have a security policy that covers the security of credit card information.

  • Best Practices The Recipient acknowledges they may or may not have access to the Owner’s Confidential Information and agrees that it shall not directly or indirectly divulge, disclose, or communicate any of the Confidential Information to any third party, except as may be required during any formal business association or dealings on behalf of the Owner for any event, with the prior written approval of the Owner. The Recipient acknowledges that no license of the Confidential Information, by implication or otherwise, is granted to the Recipient by reason of this Agreement. Additionally, the Recipient acknowledges that it may only use the Confidential Information in connection with its business dealings with the Owner and for no other purpose without the prior written consent of the Owner.

  • Best Practice 9.1 The parties agree that Best Practice is simply a better way of doing things - it is a process of constantly changing and adapting to new pressures and work methods. Best Practices are not fixed. It is the method of operation to achieve exemplary levels of performance. Best Practices are not restricted to an examination of cost, but also include quality and timely completion of work safely and efficiently.

  • SECURITY POLICIES AND NOTIFICATIONS State Security Policies and Procedures The Contractor and its personnel shall review and be familiar with all State security policies, procedures and directives currently existing or implemented during the term of the Contract, including ITS Policy NYS-P03-002 Information Security Policy (or successor policy). Security Incidents Contractor shall address any Security Incidents in the manner prescribed in ITS Policy NYS-P03-002 Information Security Policy (or successor policy), including the New York State Cyber Incident Reporting Procedures incorporated therein or in such successor policy.

  • Security Policy for Contractors 1. The Department for Work and Pensions treats its information as a valuable asset and considers that it is essential that information must be protected, together with the systems, equipment and processes which support its use. These information assets may include data, text, drawings, diagrams, images or sounds in electronic, magnetic, optical or tangible media, together with any Personal Data for which the Department for Work and Pensions is the Data Controller.

  • Safety Policy Each employer is required by law to have a safety policy and program. TIR will ask for and may require a copy of that policy and program.

  • Security Practices A. Protected data provided to the contractor will be stored: (include where and how) B. The security protections taken to ensure data will be protected that align with the NIST Cybersecurity Framework and industry best practices include:

  • Best Management Practices 1. Contractor shall conduct operations under this Contract so as to assure that pollutants do not enter municipal storm drain systems which systems are comprised of, but are not limited to curbs and gutters that are part of the street systems ("Stormwater Drainage System"), and to ensure that pollutants do not directly impact "Receiving Waters" (as used herein, Receiving Waters include, but are not limited to, rivers, creeks, streams, estuaries, lakes, harbors, bays and oceans).

  • Management; Community Policies Owner may retain employees and management agents from time to time to manage the Property, and Owner’s agent may retain other employees or contractors. Resident, on behalf of himself or herself and his or her Guests, agrees to comply fully with all directions from Owner and its employees and agents, and the rules and regulations (including all amendments and additions thereto, except those that substantially modify the Resident’s bargain and to which Resident timely objects) as contained in this Agreement and the Community Policies of the Property. The Community Policies are available at xxxxx://xxxxxxxxxxxxxx.xxx/policies.pdf or on request from the management office and are considered part of this Agreement.

Time is Money Join Law Insider Premium to draft better contracts faster.