Compliance with NYS Information Security Policies and Procedures Sample Clauses

Compliance with NYS Information Security Policies and Procedures. Contractor warrants, covenants and represents that it shall comply fully with all security procedures of the State communicated to it in the performance of this Contract, including ITS Information Security policies and procedures located at xxxxx://xxx.xx.xxx/eiso/policies/security. ITS shall have the right at any time to require that the Contractor remove from interaction with ITS any Contractor representative who ITS believes is detrimental to its working relationship with the Contractor. The State will provide the Contractor with notice of its determination, and the reasons it requests the removal. If ITS signifies that a potential security violation exists with respect to the request, the Contractor shall immediately remove such individual. Contractor shall not assign the person to any aspect of the Contract or future work orders without ITS consent. Contractor shall use industry standard security measures, including standard encryption protocols, to protect and guard the availability and security of all NYS Confidential Information, and adhere to all the State’s security policies. Contractor shall be strictly prohibited from using NYS Confidential Information in any fashion other than that defined herein. There may be instances whereby ITS will communicate security procedures necessitated by ITS operations. Contractor will use reasonable efforts to implement same. In the event Contractor does not implement or communicates that it cannot or will not implement such security procedures, the Parties will reasonably work to resolve such dispute pursuant to the Contract's Dispute Resolution process. Contractor warrants that its Contractor Staff members are properly informed and trained regarding security standards andare prohibited from disclosing NYS Confidential Information to any persons without a need to know. Contractor will work cooperatively with the State so that software applications accessed by members of the public or others are accessed by the single sign-on service provided by New York State Directory Services or such other service chosen by ITS. The Contractor’s solution may be required to pass an internal NYS security review conducted by NYS prior to implementation and after any significant system modifications. This review will determine whether adequate controls are in place to protect the availability of the System and the integrity and confidentiality of the information. A significant system modification is considered any change to the un...
AutoNDA by SimpleDocs
Compliance with NYS Information Security Policies and Procedures. Contractor warrants, covenants, and represents that it shall comply fully with all security procedures of the State communicated to it in the performance of the Contract, including NYS Information Security policies and standards located at xxxxx://xxx.xx.xxx/ciso/policies/security. At the State’s discretion, it may, at any time during the term of the Contract, request that Contractor provide documentation validating its adherence to these security policies and standards. Contractor must deliver such documentation within thirty (30) days of a request by the State or as mutually agreed to, in writing, by the Parties. Contractor, to the extent the following meets or exceeds the NYS Information Security policies and standards described above, shall use industry standard security measures, including standard encryption protocols, to protect and guard the availability and security of all NYS Confidential Information, and adhere to all the State’s security policies. Contractor shall be strictly prohibited from using NYS Confidential Information in any fashion other than that defined herein. There may be instances whereby the State will communicate security procedures necessitated by the State’s operations. Contractor will use reasonable efforts to implement same. In the event Contractor does not implement or communicates that it cannot or will not implement such security procedures, the Parties will reasonably work to resolve such dispute pursuant to the Contract's Dispute Resolution process to the extent such dispute does not adversely impact the State’s legal obligations.

Related to Compliance with NYS Information Security Policies and Procedures

  • COMPLIANCE WITH POLICIES AND PROCEDURES During the period that Executive is employed with the Company hereunder, Executive shall adhere to the policies and standards of professionalism set forth in the policies and procedures of the Company and IAC as they may exist from time to time.

  • Compliance Policies and Procedures To assist the Fund in complying with Rule 38a-1 of the 1940 Act, BBH&Co. represents that it has adopted written policies and procedures reasonably designed to prevent violation of the federal securities laws in fulfilling its obligations under the Agreement and that it has in place a compliance program to monitor its compliance with those policies and procedures. BBH&Co will upon request provide the Fund with information about our compliance program as mutually agreed.

  • Compliance with Safeguarding Customer Information Requirements The Servicer has implemented and will maintain security measures designed to meet the objectives of the Interagency Guidelines Establishing Standards for Safeguarding Customer Information published in final form on February 1, 2001, 66 Fed. Reg. 8616, and the rules promulgated thereunder, as amended from time to time (the “Guidelines”). The Servicer shall promptly provide the Seller information regarding the implementation of such security measures upon the reasonable request of the Seller.

  • Violence Policies and Procedures The Employer agrees to have in place explicit policies and procedures to deal with violence. The policy will address the prevention of violence, the management of violent situations, provision of legal counsel and support to employees who have faced violence. The policies and procedures shall be part of the employee's health and safety policy and written copies shall be provided to each employee. Prior to implementing any changes to these policies, the employer agrees to consult with the Association.

  • Policies and Procedures i) The policies and procedures of the designated employer apply to the employee while working at both sites. ii) Only the designated employer shall have exclusive authority over the employee in regard to discipline, reporting to the College of Nurses of Ontario and/or investigations of family/resident complaints. iii) The designated employer will ensure that the employee is covered by WSIB at all times, regardless of worksite, while in the employ of either home. iv) The designated employer will ensure that the employee is covered by liability insurance at all times, regardless of worksite, while in the employ of either home. v) The designated employer shall have exclusive authority over the employee’s personnel files and health records. These files will be maintained on the site of the designated employer.

  • Compliance with Policies Each Individual Limited Partner hereby agrees that he shall comply with all policies and procedures adopted by any member of the Och-Ziff Group or which Limited Partners are required to observe by law, or by any recognized stock exchange, or other regulatory body or authority.

  • Safeguarding requirements and procedures (1) The Contractor shall apply the following basic safeguarding requirements and procedures to protect covered contractor information systems. Requirements and procedures for basic safeguarding of covered contractor information systems shall include, at a minimum, the following security controls: (i) Limit information system access to authorized users, processes acting on behalf of authorized users, or devices (including other information systems). (ii) Limit information system access to the types of transactions and functions that authorized users are permitted to execute. (iii) Verify and control/limit connections to and use of external information systems. (iv) Control information posted or processed on publicly accessible information systems. (v) Identify information system users, processes acting on behalf of users, or devices. (vi) Authenticate (or verify) the identities of those users, processes, or devices, as a prerequisite to allowing access to organizational information systems. (vii) Sanitize or destroy information system media containing Federal Contract Information before disposal or release for reuse. (viii) Limit physical access to organizational information systems, equipment, and the respective operating environments to authorized individuals. (ix) Escort visitors and monitor visitor activity; maintain audit logs of physical access; and control and manage physical access devices. (x) Monitor, control, and protect organizational communications (i.e., information transmitted or received by organizational information systems) at the external boundaries and key internal boundaries of the information systems. (xi) Implement subnetworks for publicly accessible system components that are physically or logically separated from internal networks. (xii) Identify, report, and correct information and information system flaws in a timely manner. (xiii) Provide protection from malicious code at appropriate locations within organizational information systems. (xiv) Update malicious code protection mechanisms when new releases are available. (xv) Perform periodic scans of the information system and real-time scans of files from external sources as files are downloaded, opened, or executed.

  • COMPLIANCE WITH NEW YORK STATE INFORMATION SECURITY BREACH AND NOTIFICATION ACT Contractor shall comply with the provisions of the New York State Information Security Breach and Notification Act (General Business Law Section 899-aa; State Technology Law Section 208).

  • COMPLIANCE WITH GOVERNMENTAL RULES AND REGULATIONS; RECORDS The Trust assumes full responsibility for its compliance with all securities, tax, commodities and other laws, rules and regulations applicable to it.

  • Compliance with Rules and Policies The Executive shall perform all services in accordance with the lawful policies, procedures and rules established by the Company and the Board. In addition, the Executive shall comply with all laws, rules and regulations that are generally applicable to the Company or its subsidiaries and their respective employees, directors and officers.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!