File Security. All files held by a Contractor in a respective office must be in fire proof cabinets and/or the office must have a fire suppression system in place. The files must be able to be secured from the general public either by containing locking mechanisms with keys provided to only Key Persons or located in a locked room. All files must be labeled CONFIDENTIAL.
File Security. BOLC shall utilize security procedures, similar to those applicable to BOLC’ own data, to ensure that access to Business Records in the possession of BOLC is available only to NUVOLA and necessary BOLC support personnel.
File Security. Employee files will be maintained in a secure place. The Superintendent shall provide prior notice to an employee whose personnel file is to be inspected by a member of the public other than the employee or the employee's designee or the administrator(s), and shall provide an opportunity to the employee to be present when the file is to be inspected by a member of the public. Such member of the public who inspected the record or obtained a copy of any portion of it shall acknowledge same in writing which shall be filed in the personnel file of the employee.
File Security. 11.1 (a) Planet Payment acknowledges that Acquirer is required to comply with various information security standards and other statutory, legal and regulatory requirements as well as their respective internal information security programs for information protection. If applicable, Planet Payment shall make reasonable efforts to assist Acquirer to so comply. Planet Payment shall at all times comply with the requirements of the applicable Account Security System and Acquirer acknowledges that such compliance by Planet Payment is the sole information security standard required of Planet Payment hereunder.
File Security. Client acknowledges that it is technically possible for third parties to monitor data traffic over the air via the Communication Networks. If Client desires to secure its transmissions, Client will be solely responsible for providing encryption and security for its data.
File Security. AURUM (i) will provide reasonable security provisions to ensure that third parties do not have access to the Customer data bases, files and other information provided by Customer to AURUM for use with Premierecorp Cash Management. AURUM reserves the right to issue and change regulations and procedures from time to time.
File Security. JXX acknowledges that all data files provided by Client are the property of Client and that JHA’s use thereof or access thereto does not create in JXX any right, title or interest therein, except as provided for hereunder. JXX will implement reasonable security precautions and take appropriate actions with respect to the Client data files so as to enable JXX to satisfy its obligations under this Agreement and to prevent the loss, alteration or unauthorized access of Client data files.
File Security. Supplier will provide reasonable protection for Customer's computer-stored files and programs from unauthorized access by third parties. Supplier shall be responsible for no less than the security procedures set forth in Supplier's security manuals or comparable documents in existence at the time of the applicable Category Agreements and their Transaction Agreements, and which are incorporated by reference herein. Customer shall have the unconditional right to make security inspections of Supplier's organization at any time without notice to Supplier. If Customer requests additional security provisions, Supplier shall not unreasonably delay or refuse to institute same.
File Security. VITI will provide security and back-up and recovery services as specified in Section 14 to protect TSI's data. VITI reserves the right to issue and change security regulations and procedures as needed. VITI shall not be required to reconstruct any files, data, or programs that may, for any reason, have to be re-entered into the system, unless reconstruction is required due to a negligent act or omission on the part of VITI.
File Security. CUSTOMER acknowledges that it is possible for third parties to monitor data traffic. If CUSTOMER desires to secure its transmissions in connection with the Services, CUSTOMER will procure, at its own cost, encryption software or other transmission protection. CUSTOMER assumes full responsibility for the establishment of appropriate security measures to control access to CUSTOMER’s information.