We use cookies on our site to analyze traffic, enhance your experience, and provide you with tailored content.

For more information visit our privacy policy.

DIGITAL SECURITY Sample Clauses

DIGITAL SECURITY. To restrict access to HealthCompass to authorized end users whose identity has been verified, and to secure transmission of information over the Internet between such end users and Licensee, when using HealthCompass, access to, and use of, HealthCompass shall be protected by a Digital Certificate based public-key encryption process. Accordingly, prior to using HealthCompass, End Users shall be required to present a Digital Certificate to Licensee from an HMI approved Certifying Authority. Upon End-User request, HMI will serve as the Certifying Authority and issue an HMI Digital Certificate to the End-User. If the End-User elects to obtain the Digital Certificate from an HMI approved Certifying Authority (as opposed to HMI), the End-User will be responsible for any costs associated with acquiring such Digital Certificate.
DIGITAL SECURITY a) Firewalls control the transmission of data between our trusted internal networks and untrusted external networks, as well as traffic between sensitive areas of the internal networks themselves to protect against unauthorized access. b) The storage of Data is kept to a minimum and appropriate data retention and disposal policies, procedures and processes are in place. Without access to the proper cryptographic keys, encrypted data will be unreadable and unusable by hackers even if they manage to circumvent other security controls. Cryptographic keys are stored securely and access to them is restricted to the fewest custodians necessary. c) Strong cryptography and security protocols such as TLS, IPSEC and SSH are used to safeguard Data during transmission over open, public networks. d) Regular scanning and updating of our systems ensures protection against emerging threats against all types of malware. e) Security patches by vendors or providers of software used to offer our services are implemented regularly to protect our servers against any vulnerabilities f) Server management access is limited by password control and IP addresses. Only trusted staff on a “Need to know” basis has access and only from dedicated IP numbers to our servers for management purposes. “Need to know” means access rights are granted to the smallest amount of Data and privileges required to perform a job.
DIGITAL SECURITY. 53.1 The Contractor shall, in accordance with Applicable Laws and good industry practice implement, maintain, and ensure that its subcontractors that will have direct or indirect access to the Lessee's Confidential Information and/or Lessee’s IT systems (whether through email or other form of electronic communication or otherwise) implement and maintain: (a) technical and organisational measures; and (b) adequate security programmes and procedures to: (i) prevent any accidental, unauthorised or unlawful access to, processing, loss, destruction, damage, disclosure, or other misuse of the Lessee's Confidential Information; and (ii) protect the Contractor's IT systems used to provide the Works. 53.2 The Contractor shall ensure that the measures outlined in Article 53 (Digital Security) include: (a) boundary firewalls and internet gateways to protect the Contractor's networks and IT systems from the internet and other external networks; (b) secure configuration of the Contractor's networks, IT systems, applications and devices, including encryption of portable devices and removable media; (c) physical and logical access controls that restrict access to only authorised users to the extent required to perform the Works; (d) malware protection software that is designed to prevent the introduction of malware into the Contractor's IT systems, networks and devices; (e) patch management practices to identify, assess and apply applicable security patches the Contractor's IT systems, applications and devices; (f) training and awareness for the Contractor's personnel in information security and the handling of personal data in accordance with the terms of this Agreement; and (g) clearly defined security responsibilities, and processes for risk management, access control, authorization and administration, security design and configuration management, audit, and assurance. 53.3 The Owner shall have the right to audit the measures outlined in Article 53.1 (Digital Security) of the Sub-Contractor and any relevant subcontractors annually to confirm such measures comply with the requirements of this Article 53 (Digital Security) and to assess the adequacy of the measures in place. Such audit shall be with two (2) weeks' prior written notice and take place within normal working hours. The Contractor shall be reimbursed for its reasonable costs in assisting with the performance of such audit. The Owner may exercise its rights hereunder using its own employees or a third party a...
DIGITAL SECURITYDigital Assets are digital resources the City possesses or uses that assists in achieving its business objectives. Digital Assets include digital information and supporting or operational technology. The City owns the Digital Assets. The City does not transfer any ownership rights in the Digital Assets to the Supplier, despite any statements to the contrary in any licence agreements related to this Contract. The City may repatriate any or all Digital Assets at any time during or after this Contract’s termination or expiry. After repatriation, the Supplier must ensure that its copy of the repatriated Digital Asset is destroyed as per Section 19. The Supplier must ensure that Digital Assets are segregated from non-City digital assets at all times. The Supplier must ensure that data centres housing Digital Assets are operated securely and that all aspects of the data centre, including operational security, encryption, incident response, identity, access, and disaster recovery, are operated and governed using industry-accepted cyber security practices. At a minimum, any data centre housing Digital Assets must meet the requirements of a Tier 3 data centre, as defined by the Uptime Institute. The Supplier must not store, transfer, or process Contract-related information or non-financial Records in facilities or cloud environments located or hosted outside of Canada, the United States, or the European Union without the City’s written consent. The Supplier must not store, transfer, or process City financial Records in facilities or cloud environments located or hosted outside of Canada.
DIGITAL SECURITYThe Supplier shall implement and maintain appropriate: technical and organizational measures; and adequate security programs and procedures, to prevent any accidental, unauthorized or unlawful access to, processing, destruction, loss, damage or disclosure of the Customer’s Confidential Information including, for the avoidance of doubt, Personal Data (“Customer Data”) and protect the Supplier’s IT systems used to provide the Services in accordance with applicable laws and industry best practice. The Supplier shall ensure that the measures outlined in Section 26.1 above include: boundary firewalls and internet gateways to protect its networks and IT systems from the internet and other external networks; secure configuration of networks, IT systems, applications and devices, including encryption of portable devices and removable media; physical and logical access controls that restrict access to only authorized users to the extent required to perform the required Services for Company; malware protection software that is designed to prevent the introduction of malware into Supplier IT systems, networks and devices; patch management practices to identify, assess and apply applicable security patches to the IT systems, applications and devices; and training and awareness for Supplier personnel in information security and the handling of Company Data in accordance with the terms of this Agreement. The Supplier shall investigate all suspected accidental, unauthorized or unlawful access to, processing, destruction, loss, damage or disclosure of Company Data and/or any cyber-attacks on the Supplier’s IT systems (“Security Incident”) and promptly notify Company, via xxx@Xxxxxxx.xxx, of any confirmed Security Incident.
DIGITAL SECURITY. To restrict access to LHR to authorized end users whose identity has been verified, and to secure transmission of information over the Internet between such end users and HMI, when using LHR, access to, and use of, LHR is protected by a Digital Certificate based public-key encryption process. Accordingly, prior to using LHR, end users shall be required to present a Digital Certificate to HMI from an HMI approved Certifying Authority. Upon end user request, HMI will serve as the Certifying Authority and issue an HMI Digital Certificate to the end user. If the end user elects to obtain the Digital Certificate from an HMI approved Certifying Authority (as opposed to HMI), the end user will be responsible for any costs associated with acquiring such Digital Certificate.
DIGITAL SECURITYThe Supplier shall protect BP's data at all times and will implement relevant industry best practice information security protections and controls, including operating information security management practices, relevant technical controls and ensuring that Supplier Personnel adopt good information security behaviours. The Supplier agrees that it shall immediately notify BP of: (i) any actual, threatened and/or suspected unauthorised or unlawful access to, processing, destruction, damage or disclosure of BP's data; and/or (ii) any accidental loss of BP's data. If an incident referred to in this clause occurs, the Supplier shall provide all necessary assistance as requested by BP with notifications that may be required under applicable law.
DIGITAL SECURITY. EarthRights will provide an industry-standard virtual meeting platform for Employees’ use for their work for EarthRights. EarthRights will provide digital cybersecurity-related training and technology to Employees, including, but not limited to, VPN access on all EarthRights-issued laptop computers and training resources regarding the use of the VPN.

Related to DIGITAL SECURITY

  • Physical Security Contractor shall ensure that Medi-Cal PII is used and stored in an area that is physically safe from access by unauthorized persons during working hours and non- working hours. Contractor agrees to safeguard Medi-Cal PII from loss, theft or inadvertent disclosure and, therefore, agrees to: A. Secure all areas of Contractor facilities where personnel assist in the administration of the Medi-Cal program and use or disclose Medi-Cal PII. The Contractor shall ensure that these secure areas are only accessed by authorized individuals with properly coded key cards, authorized door keys or access authorization; and access to premises is by official identification. B. Ensure that there are security guards or a monitored alarm system with or without security cameras 24 hours a day, 7 days a week at Contractor facilities and leased facilities where a large volume of Medi-Cal PII is stored. C. Issue Contractor personnel who assist in the administration of the Medi-Cal program identification badges and require County Workers to wear the identification badges at facilities where Medi-Cal PII is stored or used. D. Store paper records with Medi-Cal PII in locked spaces, such as locked file cabinets, locked file rooms, locked desks or locked offices in facilities which are multi-use (meaning that there are personnel other than contractor personnel using common areas that are not securely segregated from each other.) The contractor shall have policies which indicate that Contractor and their personnel are not to leave records with Medi-Cal PII unattended at any time in vehicles or airplanes and not to check such records in baggage on commercial airlines. E. Use all reasonable measures to prevent non-authorized personnel and visitors from having access to, control of, or viewing Medi-Cal PII.

  • E7 Security The Authority shall be responsible for maintaining the security of the Authority premises in accordance with its standard security requirements. The Contractor shall comply with all security requirements of the Authority while on the Authority premises, and shall ensure that all Staff comply with such requirements.

  • System Security (a) If any party hereto is given access to the other party’s computer systems or software (collectively, the “Systems”) in connection with the Services, the party given access (the “Availed Party”) shall comply with all of the other party’s system security policies, procedures and requirements that have been provided to the Availed Party in advance and in writing (collectively, “Security Regulations”), and shall not tamper with, compromise or circumvent any security or audit measures employed by such other party. The Availed Party shall access and use only those Systems of the other party for which it has been granted the right to access and use. (b) Each party hereto shall use commercially reasonable efforts to ensure that only those of its personnel who are specifically authorized to have access to the Systems of the other party gain such access, and use commercially reasonable efforts to prevent unauthorized access, use, destruction, alteration or loss of information contained therein, including notifying its personnel of the restrictions set forth in this Agreement and of the Security Regulations. (c) If, at any time, the Availed Party determines that any of its personnel has sought to circumvent, or has circumvented, the Security Regulations, that any unauthorized Availed Party personnel has accessed the Systems, or that any of its personnel has engaged in activities that may lead to the unauthorized access, use, destruction, alteration or loss of data, information or software of the other party hereto, the Availed Party shall promptly terminate any such person’s access to the Systems and immediately notify the other party hereto. In addition, such other party hereto shall have the right to deny personnel of the Availed Party access to its Systems upon notice to the Availed Party in the event that the other party hereto reasonably believes that such personnel have engaged in any of the activities set forth above in this Section 9.2(c) or otherwise pose a security concern. The Availed Party shall use commercially reasonable efforts to cooperate with the other party hereto in investigating any apparent unauthorized access to such other party’s Systems.

  • Network Security The AWS Network will be electronically accessible to employees, contractors and any other person as necessary to provide the Services. AWS will maintain access controls and policies to manage what access is allowed to the AWS Network from each network connection and user, including the use of firewalls or functionally equivalent technology and authentication controls. AWS will maintain corrective action and incident response plans to respond to potential security threats.

  • Collateral Security (a) The Obligations shall be secured by (a) a perfected first-priority security interest (subject to Permitted Liens entitled to priority under Applicable Law) in all Collateral, whether now owned or hereafter acquired, pursuant to the terms of the Security Agreement to which each Borrower is a party to the extent perfected by the filing of UCC financing statements; (b) a pledge of 100% of the capital stock or other Equity Interests of such Borrowers (other than the Parent) and of the Non-Borrower Subsidiaries (other than the Foreign Subsidiaries) to the Administrative Agent on behalf of the Secured Parties pursuant to the Pledge Agreement; and (c) a pledge of the capital stock or other Equity Interests of each Foreign Subsidiary (provided that not more than 65% of the total voting power of all outstanding capital stock or other Equity Interest of any such first-tier Foreign Subsidiary of a Borrower shall be required to be so pledged and no Equity Interests of any non-first-tier Foreign Subsidiary shall be provided to be so pledged); provided that the Borrowers hereby agree, upon the request of the Administrative Agent and the Required Lenders, to deliver, as promptly as practicable, but in any event within ninety (90) days after request therefor, or such other later time, if any, to which the Administrative Agent may agree, (i) certificates of titles for all or substantially all vehicles, trucks, trailers, tractors, automobiles and any other equipment covered by certificates of title owned by a Borrower (collectively, “Motor Vehicles”) with the Administrative Agent listed as lienholder therein (subject to a limited power of attorney in favor of the Parent to dispose of titled equipment) and, if required by the Administrative Agent, the Borrowers shall retain Corporation Service Company (or other similar company satisfactory to the Administrative Agent) pursuant to agreements reasonably satisfactory to the Administrative Agent pursuant to which Corporation Service Company (or such other company) will agree to act as agent for the Secured Parties with respect to the perfection of security interests in the Motor Vehicles; and (ii) mortgages with respect to Real Property and to take such other steps and make such other deliveries as may be reasonably requested by the Administrative Agent (including, without limitation, the delivery of legal opinions, Consulting Engineer’s reports, surveys, title insurance, environmental assessment reports, flood hazard certifications, evidence of flood insurance, if required, and a certification of the name and address of each real estate recording office where a mortgage on the real estate on which any Collateral consisting of fixtures may be located would be recorded) so as to provide the Administrative Agent, for the benefit of the Secured Parties, a perfected first-priority security interest in such assets, provided that to the extent that any lease of (or operating/management agreement with respect to) Real Property prohibits assignment of such lease (or operating/management agreement) without the consent of the lessor or another party thereunder, the Borrowers shall not be required to grant a mortgage on the leasehold interest under such lease, but in such event, the Borrowers agree to diligently and in good faith use its reasonable best efforts to obtain the consent (which consent shall be in form and substance reasonably satisfactory to the Administrative Agent) of the applicable lessor or other party to such leasehold mortgage (and, upon the receipt of such consent, the Borrowers shall promptly grant such leasehold mortgage and comply with the other provisions of this Section 10.15 with respect thereto). (b) In the event any Borrower disposes of any assets or Equity Interests as permitted under, and in compliance with, Section 7.04(b) (including any amendment thereof or consent thereunder), or in the event that the Parent designates any Borrower as an Excluded Subsidiary or a Non-Borrower Subsidiary hereunder and no Default would result from such designation, and so long as such Borrower (or the Parent, in the case of designating a Borrower as an Excluded Subsidiary hereunder) shall have provided the Administrative Agent with such certifications or documents, if any, as the Administrative Agent shall reasonably request, the Administrative Agent will, at the Borrowers’ sole cost and expense, and without recourse to or warranty by the Administrative Agent, execute and deliver all such forms, releases, discharges, assignments, termination statements, and similar documents as the Borrowers may reasonably request in order to release such Person from its Obligations under the Loan Documents and to release the Liens granted to the Administrative Agent with respect to such assets, Equity Interests or Borrower, as applicable.

  • Internet Security The Service utilizes a comprehensive security strategy to protect your accounts and transactions conducted over the Internet. Prior to activating your access to the Service, our Internet Banking Department will verify your identity and authorization against information associated with the Eligible Account (s) that you request to be linked to the Service. Access IDs and Passcodes - One of the main security features protecting the Service is the unique combination of your Access Identification Code (Access ID) and Passcode. During the enrollment process, you will be asked to select a unique Access ID, and then choose a Passcode that will be used to gain access to the Service. You determine your own Passcode, which is encrypted in our database. Neither this Institution nor its Service Providers have access to this information. The Service will automatically deactivate your account after three unsuccessful login attempts within a 24-hour time frame. You may reset your passcode online or you may contact this Institution for assistance. Because your Passcode is used to access your accounts, you should treat it as you would any other sensitive personal data. • You should carefully select a Passcode that is hard to guess. • You should not use words based on your name, address or other personal information. • Special characters may be used to increase security. • Do NOT use dictionary words. The “Help” link within the Service will offer tips on choosing a secure Passcode that you can remember. • Keep your Passcode safe. • Memorize your Passcode and do NOT write it down. • You should also change your Passcode occasionally, such as every 90 days. • A Passcode should be changed immediately if you suspect that your Passcode has been compromised. This can be done at any time from the “User Services” menu after you log on to the Service. NEITHER THIS INSTITUTION NOR ITS SERVICE PROVIDERS WILL CONTACT YOU VIA TELEPHONE OR EMAIL REQUESTING PERSONAL INFORMATION, YOUR ACCESS ID, OR YOUR PASSCODE. IF YOU ARE CONTACTED BY ANYONE REQUESTING THIS INFORMATION, PLEASE CONTACT US IMMEDIATELY.

  • National Security 28.01 The Canadian government, either directly or through its agencies, may instruct the Employer with respect to the security of information and materials and the personnel permitted to do certain work. The Union recognizes that the Employer is obliged to meet such instructions and that for such reason the Employer may refuse certain Employees access to the work or may transfer Employees covered by such instructions.

  • User Security You agree to take every precaution to ensure the safety, security and integrity of your account and transactions when using Mobile Banking. You agree not to leave your Device unattended while logged into Mobile Banking and to log off immediately at the completion of each access by you. You agree not to provide your username, password or other access information to any unauthorized person. If you permit other persons to use your Device, login information, or other means to access Mobile Banking, you are responsible for any transactions they authorize and we will not be liable for any damages resulting to you. You agree not to use any personally identifiable information when creating shortcuts to your Account. We make no representation that any content or use of Mobile Banking is available for use in locations outside of the United States. Accessing Mobile Banking from locations outside of the United States is at your own risk.

  • Password Security You are responsible for maintaining adequate security and control of any and all User IDs, Passwords, hints, personal identification numbers (PINs), or any other codes that you use to access the Account. Do not discuss, compare, or share information about your account number or password unless you are willing to give them full use of your money. Any loss or compromise of the foregoing information and/or your personal information may result in unauthorized access to your Account by third-parties and the loss or theft of any funds held in your Account and any associated accounts, including your Account. Checks and electronic withdrawals are processed by automated methods, and anyone who obtains your account number or access device could use it to withdraw money from your account, with or without your permission. You are responsible for keeping your email address and telephone number up to date in order to receive any notices or alerts that we may send you. We assume no responsibility for any loss that you may sustain due to compromise of your account login credentials due to no fault of ours and/or your failure to follow or act on any notices or alerts that we may send to you. If you believe your Account information has been compromised, or that someone has transferred or may transfer money from your account without your permission, contact us immediately, through Synapse, at xxxx@xxxxxxxxx.xxx or call at +0(000) 000-0000. You agree to promptly review all Account and transaction records and other Communications that we make available to you and to promptly report any discrepancy to us.

  • Personnel Security 6.1 Staff recruitment in accordance with government requirements for pre- employment checks; 6.2 Staff training and awareness of Departmental security and any specific contract requirements.