General Security Practices Sample Clauses

General Security Practices. The Contractor has implemented and shall maintain appropriate technical and organizational measures to protect personal data against accidental loss, destruction or alteration, unauthorized disclosure or access, or unlawful destruction, including the policies, and procedures and internal controls set forth in this document for its personnel, equipment, and facilities at the Contractor’s locations providing services to the Company (“Services”). The Services are set forth in one or more agreements between the Contractor and the Company.
AutoNDA by SimpleDocs
General Security Practices. Cisco has implemented and shall maintain appropriate technical and organizational measures designed to protect Protected Data against accidental loss, destruction or alteration, unauthorized disclosure or access, or unlawful destruction, including the policies, procedures, and internal controls set forth in this ISE for its personnel, equipment, and facilities at Cisco’s locations involved in Performing any part of the Agreement.
General Security Practices. 2.1. Vertice has implemented and shall maintain appropriate technical and organisational measures designed to protect Data against accidental loss, destruction or alteration, unauthorised disclosure or access, or unlawful destruction, including the policies, procedures, and internal controls set forth in this Attachment for its Representatives, facilities, and equipment at Vertice’s locations involved in Vertice’s performance of its obligations under the Agreement.
General Security Practices. Supplier has implemented and shall maintain appropriate technical and organizational measures designed to protect Protected Data against accidental loss, destruction or alteration, unauthorized disclosure or ac- cess, or unlawful destruction, including the policies, procedures, and internal controls set forth in this ISE for its personnel, equipment, and facilities at the Supplier’s locations involved in Performing any part of the Agreement.
General Security Practices. Xxxxxx shall maintain commercially reasonable technical and organizational measures designed to protect the security, confidentiality and integrity of Customer Materials. These technical and organizational measures are further outlined within this ISE and are evaluated annually as part of Xxxxxx’x independent third party security audit. Xxxxxx may adjust the security controls listed herein, provided that it will not materially decrease the overall security of the Services during a subscription term. During the term of the Agreement, Xxxxxx shall maintain, at its own expense an audit certification by an independent outside audit firm, and shall provide or make available to Customer, upon request, a copy of each of its ISO27001 and SOC 2 Type II reports, which shall be updated at least annually. If the third party audit discovers any deficiencies, Xxxxxx shall work with the third party auditor to remediate any such deficiencies to remedy such findings in a timely manner.

Related to General Security Practices

  • Security Practices Dell has implemented corporate information security practices and standards that are designed to safeguard the Dell’s corporate environment and to address: (1) information security; (2) system and asset management;

  • SAFETY PRACTICES (a) The employer will take reasonable measures to prevent and eliminate any present or potential job hazards which the employees may encounter at their places of work.

  • Pay Practices The Employer recognizes the importance of regularity in pay practices and to the greatest extent possible the Employer will not alter the payment routines. Nurses will be notified in writing by the Employer not less than sixty (60) days in advance of a change to the pay practices.

  • Data Practices The Parties acknowledge that this Agreement is subject to the requirements of Minnesota’s Government Data Practices Act, Minnesota Statutes, Section 13.01

  • Good industry practices 12.1.1. SAP warrants that: a) its Services will be performed in a professional xxxxxxx-like manner by Consultants with the skills reasonably required for the Services; and

  • Security Policies IBM maintains privacy and security policies that are communicated to IBM employees. IBM requires privacy and security training to personnel who support IBM data centers. We have an information security team. IBM security policies and standards are reviewed and re-evaluated annually. IBM security incidents are handled in accordance with a comprehensive incident response procedure.

  • FAIR PRACTICES 1. As sole bargaining agent the Association shall continue its policy of accepting into membership all eligible persons in the unit without regard to age, race, color, creed and religious creed, national origin, sex, marital status, sexual orientation, veteran’s status, handicap, genetic information, ancestry, or membership or non-membership in any political or ideological organization. The Association shall represent equally all members of the bargaining unit without regard to membership or participation in the activities of any employee organization.

  • STANDARD PRACTICES 47.1 Standard Practices may incorporate by reference various industry, OBF, and other standards referred to throughout this Agreement, which may be implemented to satisfy any CenturyLink obligations under this Agreement.

Time is Money Join Law Insider Premium to draft better contracts faster.