Employee Security Training Sample Clauses

Employee Security Training. AWS will implement and maintain employee security training programs regarding AWS information security requirements. The security awareness training programs will be reviewed and updated at least annually.
AutoNDA by SimpleDocs
Employee Security Training. 1Password will implement and maintain employee security training programs regarding 1Password information security requirements. The security awareness training programs will be reviewed and updated at least annually.

Related to Employee Security Training

  • Contractor and Employee Security Precautions The security aspects of working at the Correctional Facility are critical. The following security precautions are part of the site conditions and are a part of this Contract. All persons coming on the site in any way connected with this Work shall be made aware of them, and it is the (General) Contractor’s responsibility to check and enforce them.

  • Duty to Provide Secure Data The Contractor will maintain the security of State of Florida data including, but not limited to, a secure area around any displayed visible data. The Contractor will also comply with all HIPAA requirements and any other state and federal rules and regulations regarding security of information.

  • LICENCE RESTRICTIONS You agree that you will: 17.1 not rent, lease, sub-license, loan, provide, or otherwise make available, the Apps or the Services in any form, in whole or in part to any person without prior written consent from us; 17.2 not copy the Apps, User Information or Services, except as part of the normal use of the Apps or where it is necessary for the purpose of back-up or operational security; 17.3 not translate, merge, adapt, vary, alter or modify, the whole or any part of the Apps, User Information or Services nor permit the Apps or the Services or any part of them to be combined with, or become incorporated in, any other programs, except as necessary to use the Apps and the Services on devices as permitted in these terms; 17.4 not disassemble, de-compile, reverse engineer or create derivative works based on the whole or any part of the Apps or the Services nor attempt to do any such things, except to the extent that (by virtue of sections 50B and 296A of the UK Copyright, Designs and Patents Act 1988) such actions cannot be prohibited because they are necessary to decompile the Apps to obtain the information necessary to create an independent program that can be operated with the Apps or with another program (Permitted Objective), and provided that the information obtained by you during such activities: (a) is not disclosed or communicated without our prior written consent to any third party to whom it is not necessary to disclose or communicate it in order to achieve the Permitted Objective; and (b) is not used to create any software that is substantially similar in its expression to the Apps; (c) is kept secure; and (d) is used only for the Permitted Objective; 17.5 comply with all applicable technology control or export laws and regulations that apply to the technology used or supported by the Apps or any Service; (a) not overload our servers by contributing or participation in a Denial of Service (DoS) attack.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!