Formal Definition of an Information Security Policy Sample Clauses

Formal Definition of an Information Security Policy. Cengage has developed and documented a formal information security policy that sets out Cengage's approach to managing information security. Specific areas covered by this policy include, but are not limited to the following: • Information security responsibilitiesElectronic communications systems - E-mail security - Instant messaging - Voicemail security • Disposing of confidential information - Secure on-site shredding - Disposal and reuse of electronic mediaData classification • Employee monitoring and access to employeeselectronic filesSecuring confidential information ("clean desk") • Data loss prevention tools • Client requests for information security statements and policies • Responding to information requests / media response guidelines • Third-party access to Cengage or client confidential informationMobile device management - Laptop security guidelines - Smart device guidelines - Employee personal device guidelines • Virus and malware protectionRemote accessWireless networking access • Electronic incident management and handling • Internet use and “acceptable use policy” requirements • Internet applications and services security assessment • Identification and authorization - Password standards for employees - Password standards for system / LAN administrators and application developers of intranet systems - Access control standards - User id standards for system / LAN administrators and intranet application developers • Computer hardware & software management • Encryption • IT physical securityIncident response, reporting and tracking policy • Facility security - Emergency evacuation and assembly locations - Handling biochemical incidents, suspicious mail and explosives - Physical security - Security guidelines for visitors - Visitor security information • HR security requirements - Background checks - Cell phones, cameras and recording devices - Workplace safety and weapons - Termination of systems access for departing employees The Cengage Code of Ethics and Security policy document is approved by management, Cengage employees are required to acknowledge receipt and acceptance of the Cengage Code of Ethics and Security policy upon commencing work with Cengage. Policies are communicated to all employees and contractors through onboarding/new hire orientation, training classes, and distribution of policies on-line.
AutoNDA by SimpleDocs
Formal Definition of an Information Security Policy. Cengage has developed and documented a formal information security policy that sets out Cengage's approach to managing information security. Specific areas covered by this policy include, but are not limited to the following: - Password standards for system / LAN administrators and application developers of intranet systems - User id standards for system / LAN administrators and intranet application developers The Cengage Code of Ethics and Security policy document is approved by management, Cengage employees are required to acknowledge receipt and acceptance of the Cengage Code of Ethics and Security policy upon commencing work with Cengage. Policies are communicated to all employees and contractors through onboarding/new hire orientation, training classes, and distribution of policies on-line.

Related to Formal Definition of an Information Security Policy

  • Definition of Customer Information Any Customer Information will remain the sole and exclusive property of the Trust. “Customer Information” shall mean all non-public, personally identifiable information as defined by Xxxxx-Xxxxx-Xxxxxx Act of 1999, as amended, and its implementing regulations (e.g., SEC Regulation S-P and Federal Reserve Board Regulation P) (collectively, the “GLB Act”).

  • Definition of Proprietary Information The Executive acknowledges that he may be furnished or may otherwise receive or have access to confidential information which relates to the Company’s past, present or future business activities, strategies, services or products, research and development; financial analysis and data; improvements, inventions, processes, techniques, designs or other technical data; profit margins and other financial information; fee arrangements; compilations for marketing or development; confidential personnel and payroll information; or other information regarding administrative, management, or financial activities of the Company, or of a third party which provided proprietary information to the Company on a confidential basis. All such information, including in any electronic form, and including any materials or documents containing such information, shall be considered by the Company and the Executive as proprietary and confidential (the “Proprietary Information”).

  • Confidential Information Definition Grantee acknowledges it and its employees or agents may, in the course of performing its responsibilities, be exposed to or acquire information that is: (i) confidential to Agency or Project participants or (ii) the disclosure of which is restricted under federal or state law, including without limitation: (a) personal information, as that term is used in ORS 646A.602(12), (b) social security numbers, and (c) information protected by the federal Family Educational Rights and Privacy Act under 20 USC § 1232g (items (i) and (ii) separately and collectively “Confidential Information”).

  • Additional Definitions The following terms have the meanings given below:

  • Vendor Logo (Supplemental Vendor Information Only) No response Optional. If Vendor desires that their logo be displayed on their public TIPS profile for TIPS and TIPS Member viewing, Vendor may upload that logo at this location. These supplemental documents shall not be considered part of the TIPS Contract. Rather, they are Vendor Supplemental Information for marketing and informational purposes only. Some participating public entities are required to seek Disadvantaged/Minority/Women Business & Federal HUBZone ("D/M/WBE/Federal HUBZone") vendors. Does Vendor certify that their entity is a D/M/WBE/Federal HUBZone vendor? If you respond "Yes," you must upload current certification proof in the appropriate "Response Attachments" location. NO Some participating public entities are required to seek Historically Underutilized Business (HUB) vendors as defined by the Texas Comptroller of Public Accounts Statewide HUB Program. Does Vendor certify that their entity is a HUB vendor? If you respond "Yes," you must upload current certification proof in the appropriate "Response Attachments" location. No Can the Vendor provide its proposed goods and services to all 50 US States? Yes

  • How Do I Get More Information? This Notice summarizes the Action, the terms of the Settlements, and your rights and options in connection with the Settlements. More details are in the Settlement Agreements, which are available for your review at xxx.XxxxxxxxxXxxXxxxxxxxxXxxxxxxxxx.xxx. The Settlement Website also has the Second Amended Complaint and other documents relating to the Settlements. You may also call toll-free 0-000-000-0000 or write the Claims Administrator at: Financial Aid Antitrust Settlements, c/o Claims Administrator, 0000 Xxxx Xxxxxx, Xxxxx 0000, Xxxxxxxxxxxx, XX 00000. To: Settlement Class Member Email Address From: Claims Administrator Subject: Notice of Proposed Class Action Settlement – Xxxxx, et al. x. Xxxxx University, et al. Please visit xxx.XxxxxxxxxXxxXxxxxxxxxXxxxxxxxxx.xxx for more information. • The Court has preliminarily approved proposed settlements (“Settlements”) with the following ten schools: Brown University, the University of Chicago, the Trustees of Columbia University in the City of New York, Trustees of Dartmouth College, Duke University, Emory University, Northwestern University, Xxxxxxx Xxxxx Xxxx University, Vanderbilt University, and Yale University (collectively the “Settling Universities”). • The Court has also preliminarily approved a class of students who attended one or more of the Settling Universities during certain time periods. This is referred to as the “Settlement Class,” which is defined in more detail below.

  • Additional Definition Section 1.02 of the Credit Agreement is hereby amended to add thereto in alphabetical order the following definition which shall read in full as follows:

  • Supplemental Vendor Information Only) No response Optional. If Vendor desires that their logo be displayed on their public TIPS profile for TIPS and TIPS Member viewing, Vendor may upload that logo at this location. These supplemental documents shall not be considered part of the TIPS Contract. Rather, they are Vendor Supplemental Information for marketing and informational purposes only. Some participating public entities are required to seek Disadvantaged/Minority/Women Business & Federal HUBZone ("D/M/WBE/Federal HUBZone") vendors. Does Vendor certify that their entity is a D/M/WBE/Federal HUBZone vendor? If you respond "Yes," you must upload current certification proof in the appropriate "Response Attachments" location. NO Some participating public entities are required to seek Historically Underutilized Business (HUB) vendors as defined by the Texas Comptroller of Public Accounts Statewide HUB Program. Does Vendor certify that their entity is a HUB vendor? If you respond "Yes," you must upload current certification proof in the appropriate "Response Attachments" location. No Can the Vendor provide its proposed goods and services to all 50 US States? No

  • Definition of Confidential Information The term “Confidential Information” shall mean all information that either party discloses (a “Disclosing Party”) to the other party (a “Receiving Party”), whether in writing, electronically, or orally and in any form (tangible or intangible), that is confidential, proprietary, or relates to clients or shareholders (each either existing or potential). Confidential Information includes, but is not limited to:

  • EVENTS CONSTITUTING MATERIAL BREACH OF AGREEMENT The Applicant shall be in Material Breach of this Agreement if it commits one or more of the following acts or omissions (each a “Material Breach”): A. The Application, any Application Supplement, or any Application Amendment on which this Agreement is approved is determined to be inaccurate as to any material representation, information, or fact or is not complete as to any material fact or representation or such application; B. The Applicant failed to complete Qualified Investment as required by Section 2.5.A. of this Agreement during the Qualifying Time Period; C. The Applicant failed to create and maintain the number of New Qualifying Jobs required by the Act; D. The Applicant failed to create and maintain the number of New Qualifying Jobs specified in Schedule C of the Application; E. The Applicant failed to pay at least the average weekly wage of all jobs in the county in which the jobs are located for all New Non-Qualifying Jobs created by the Applicant; F. The Applicant failed to provide payments to the District sufficient to protect future District revenues through payment of revenue offsets and other mechanisms as more fully described in Article IV of this Agreement; G. The Applicant failed to provide the payments to the District that protect the District from the payment of extraordinary education-related expenses related to the project to the extent and in the amounts that the Applicant agreed to provide such payments in Article V of this Agreement; H. The Applicant failed to provide the Supplemental Payments to the extent and in the amounts that the Applicant agreed to provide such Supplemental Payments in Article VI of this Agreement; I. The Applicant failed to create and Maintain Viable Presence on or with the Qualified Property as more fully specified in Article VIII of this Agreement; J. The Applicant failed to submit the reports required to be submitted by Section 8.2 to the satisfaction of the Comptroller; K. The Applicant failed to provide the District or the Comptroller with all information reasonably necessary for the District or the Comptroller to determine whether the Applicant is in compliance with its obligations, including, but not limited to, any employment obligations which may arise under this Agreement; L. The Applicant failed to allow authorized employees of the District, the Comptroller, the Appraisal District, or the State Auditor’s Office to have access to the Applicant’s Qualified Property or business records in order to inspect the project to determine compliance with the terms hereof or as necessary to properly appraise the Taxable Value of the Applicant’s Qualified Property under Sections 8.5 and 8.6; M. The Applicant failed to comply with a request by the State Auditor’s office to review and audit the Applicant’s compliance with this Agreement; N. The Applicant has made any payments to the District or to any other person or persons in any form for the payment or transfer of money or any other thing of value in recognition of, anticipation of, or consideration for this Agreement for limitation on Appraised Value made pursuant to Chapter 313 of the TEXAS TAX CODE, in excess of the amounts set forth in Articles IV, V and VI of this Agreement; O. The Applicant failed to comply with the conditions included in the certificate for limitation issued by the Comptroller.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!