General Security Sample Clauses

General Security. The Contractor shall comply, and be able to demonstrate compliance with: The Lead/Customer Organisation’s Security policies and standards; and The Data Security Plan submitted when completing the Award Criteria Security Questionnaire as part of the tender response.
AutoNDA by SimpleDocs
General Security. 1. Never leave your iPad unsecured. iPads should be locked in a designated storage facility or a secure locker when not in use. 2. During after-school activities, you are still expected to maintain the security of your iPad. Unsupervised iPads will be confiscated by staff, and disciplinary actions may be taken. 3. Each iPad has several identifying labels. (i.
General Security. Details on Provider’s information security practices, data incident response policies, technical and organizational measures, and software development security practices are available at: xxxxx://xxx.xxxxx.xxx/legal/security.aspx (collectively “Security Site”). Customer agrees that Provider may modify its Security Site so long as it does not materially decrease the overall level of protection provided.
General Security. 1. During after-school activities, you are still expected to maintain the security of your iPad. 2. Each iPad has several identifying labels. Under no circumstances are you to modify, remove or destroy these labels.
General Security. Splunk’s information security management system (“ISMS”) is calibrated to protect the confidentiality, integrity and availability of customer data. Splunk employees receive regular training on Splunk’s security policies and procedures, including annual training on secure data handling practices, and supplemental, targeted trainings as appropriate. Employees are background checked and Splunk vendors are risk assessed prior to onboarding to determine if their data protection and security practices meet Splunk’s standards.
General Security. 1. Never leave your computing device unattended or unsecured. 2. Each computing device has several identifying labels. Under no circumstances are you to modify or remove these labels or markings.
General Security. The Supplier shall comply, and be able to demonstrate compliance with: a. HMG Security Policy Framework, as per the following link: xxxx://xxx.xxxxxxxxxxxxx.xxx.xx/sites/default/files/resources/HMG%20Security%20Polic y%20Framework%20-%20v8%200%20-%20April%202012.pdf b. Part 2: Call Off Terms, Schedule 2, Security Management Plan; and c. The Data Security Plan where requested by a Client. The Client’s Security policies and standards are outlined in:
AutoNDA by SimpleDocs
General Security. 1. Defendants will develop and submit to USDOJ and the Monitor for review and approval facility-specific policies designed to promote the safety and security of prisoners and that include the following: a. Clothing that prisoners and staff are required or permitted to wear and/or possess; 1. Review, revise, develop, implement, train, and evaluate policies and procedures requiring all inmates to wear standard-issue correctional uniforms. 2. Consider acquiring correctional apparel that provides obvious recognition of the inmates’ classification/status. 3. Ensure there is a consistently sufficient supply of uniforms to regular laundry exchanges and changes in an inmate’s classification and/or status. 4. Consider developing a correctional industry for making uniforms onsite. 5. Select/make uniforms specifically designed to reduce/eliminate places to hide contraband and weapons. 6. Mark all uniforms with highly visible letters/numbers. b. Identification that prisoners, staff, and visitors are required to carry and/or display; 1. Ensure staff compliance with this provision. 2. Ensure appropriate policies and procedures are in place and made available to staff. 3. Ensure adequate supplies for making identification cards. 4. Regularly audit identification card inventory and maintain proper controls to prevent inappropriate acquisition of cards. Conduct regular “identification card counts” using methods similar to key control inventories. 5. Consistently enforce identification card policies and procedures. c. Requirements for locking and unlocking of exterior and interior gates and doors, including doors to cells consistent with security, classification and fire safety needs; 1. Review, revise, develop, train, implement, evaluation policies and procedures related to facility security pertaining to locking and unlocking access points, units and cell doors, and other locations requiring consistent access controls. 2. Repair/replace all broken locks and keys. 3. Develop, revise, implement, audit lock/key inventory. 4. Regularly inspect keys, locks, and electronic locking systems to ensure reliable functionality, detection of tampering, and timely repair/replacement. 5. Ensure staff are adequately trained in the proper use of mechanical and/or electronic locking systems according to their post assignments. 6. Consistently sanction inmates for attempting or manipulating any security locking system or device. 7. Secure access to keys and electronic locking control panels...
General Security. 8.1 You hereby acknowledge that unauthorized access to the vPayment Account(s) enables misuse of the Virtual Cards. You must therefore take and maintain the necessary and appropriate measures to exclude the risk of unauthorized access to the vPayment Account, and any unauthorized use. This will include, in particular, compliance with all obligations to cooperate and exercise due care stipulated in these vPayment T&Cserms and Conditions. 8.2 Notwithstanding the terms above, you: (a) will ensure that (Sub-)Administrators are selected, instructed and monitored carefully; (b) will ensure Login Data is stored with reasonable care and is only made accessible to (Sub-) Administrators; (c) must protect the Virtual Cards against unauthorized access and may only disclose the same to authorized End Users in a secure manner; (d) must take and maintain all necessary and appropriate measures to exclude the risk of unauthorized access to the vPayment Account and the Virtual Cards; (e) must know, at all times, who has access to the Login Data and Virtual Cards, must document who uses the Virtual Cards for which Transactions, and must provide this documentation to us immediately upon our request; (f) will ensure that the (Sub-)Administrators and End Users are entitled to use the vPayment Account(s) or Virtual Cards, that such individuals have been contractually obliged to comply with the vPayment T&Cs, and that such individuals comply with the vPayment T&Cs. We will not be answerable for your internal instructions; (g) will be responsible for the security of information on devices used in connection with the vPayment Account, and will only work with software from a trusted source; (h) will not leave the devices unattended and will protect them against third-party access through access protection by means of a strong password, which must be kept secret, or equivalent technology; (i) will minimize the risk of unauthorized access to devices through the use of suitable protective measures. In particular, you will keep the original operating system and browser up to date at all times and will take the relevant security precautions customary for electronic networks in accordance with the latest technological standards, in particular by using antivirus programs kept up to date and installing a firewall; (j) will notify us immediately if Transactions have been executed, or if a statement amount has not been paid in full, and yet no monthly statement has been received for more than...
General Security. 1. Never leave your Kindle unsecured. Kindle should be locked in a designated storage facility or kept with you at all times. 2. During after-school activities, you are still expected to maintain the security of your Kindle. Unsupervised Kindles will be confiscated by staff, and disciplinary actions may be taken. 3. Each Kindle has several identifying labels. (i.e. District 49 asset number, and serial number). Under no circumstances are you to modify, remove or destroy these labels.
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!