Password Security You are responsible for maintaining adequate security and control of any and all User IDs, Passwords, hints, personal identification numbers (PINs), or any other codes that you use to access the Account. Do not discuss, compare, or share information about your account number or password unless you are willing to give them full use of your money. Any loss or compromise of the foregoing information and/or your personal information may result in unauthorized access to your Account by third-parties and the loss or theft of any funds held in your Account and any associated accounts, including your Account. Checks and electronic withdrawals are processed by automated methods, and anyone who obtains your account number or access device could use it to withdraw money from your account, with or without your permission. You are responsible for keeping your email address and telephone number up to date in order to receive any notices or alerts that we may send you. We assume no responsibility for any loss that you may sustain due to compromise of your account login credentials due to no fault of ours and/or your failure to follow or act on any notices or alerts that we may send to you. If you believe your Account information has been compromised, or that someone has transferred or may transfer money from your account without your permission, contact us immediately, through Synapse, at xxxx@xxxxxxxxx.xxx or call at +0(000) 000-0000. You agree to promptly review all Account and transaction records and other Communications that we make available to you and to promptly report any discrepancy to us.
Supply Chain Security Supplier shall implement and maintain a written security program that consists of physical and procedural controls: to (a) prevent unauthorized access to Supplier’s facilities; (b) prevent finished goods or equipment from being tampered with, stolen or damaged prior to Supplier’s delivery in accordance with the terms of this Order; and (c) detect when malicious activity has occurred (the “Supply Chain Security Program”). Supplier’s Supply Chain Security Program shall align to the World Customs Organization’s SAFE Framework of Standards to Secure and Facilitate Global Trade (“SAFE Framework”) or other global security programs recognized by the World Customs Organization. Supplier shall flow down and verify the requirements of its Supply Chain Security Program to its sub-tier suppliers, if applicable. Supplier shall test its Supply Chain Security Program at least annually or whenever there are material changes in Supplier’s operations, risks or business practices. Upon Buyer’s written and reasonable request, Supplier shall provide Buyer with: (i) a copy of Supplier’s Supply Chain Security Program; (ii) an executive summary of test results and a report of corrective actions (including the timing for implementation) to be taken to remedy any deficiencies identified by such testing; and (iii) any audit results or findings resulting from Supplier’s periodic audit or testing of its sub-tier suppliers’ security programs.
Security Cameras Security cameras have been installed throughout the Facility; however, they will not routinely be used in areas where there is an expectation of privacy, such as restrooms or patient care areas.
NIST Cybersecurity Framework The U.S. Department of Commerce National Institute for Standards and Technology Framework for Improving Critical Infrastructure Cybersecurity Version 1.1.
Security Bond The security bond provides protection to Owner if Contractor presents an acceptable guaranteed maximum price (“GMP”) to Owner but is unable to deliver the required payment and performance bonds within the time period stated below.