General Security Procedures. You need a username and password, to access your Eligible Accounts and Online Financial Services through the Service. We may set standards for your username and password. We recommend that you change your password regularly, and select a unique username and password combination for use only with the Service. We may also require additional security procedures for certain transactions. These additional security procedures may require special hardware, software or third-party services. To enhance the security of your Eligible Accounts and Online Financial Services, we may also offer you additional, optional security procedures. These could include personal reference questions and answers, random number generators or one-time passwords. We may also require the use or activation of specific applications, Internet browser software features, plug-ins and add-ons, to use the Service. These could include JavaScript support and "cookies." To enable and enhance secure access to the Service, we may also access detailed information about the computers and Mobile Devices you use to access the Service. This could include telephone numbers and unique internal and network identifiers for your computers and Mobile Devices. We also use cookies and other technology for information security and other purposes, as described in our Privacy Policy, available at xxxxxxxxxx.xxx.
General Security Procedures. 1.1 Processor shall be responsible for establishing and maintaining an information security program that is designed to: (i) protect the security and confidentiality of Personal Data; (ii) protect against anticipated threats or hazards to the security or integrity of the Personal Data; (iii) protect against unauthorized access to or use of the Personal Data; (iv) ensure the proper disposal of Personal Data, as further defined herein; and, (v) ensure that all employees and subcontractors of Processor, if any, comply with all of the foregoing. Processor will designate an individual to be responsible for the information security program. Such individual shall respond to Controller inquiries regarding computer security and to be responsible for notifying Controller-designated contact(s) if a breach or an incident occurs, as further described herein.
1.2 Processor shall conduct formal privacy and security awareness training for all personnel and contractors as soon as reasonably practicable after the time of hiring and/or prior to being appointed to work on Personal Data and annually recertified thereafter. Documentation of security awareness training shall be retained by Processor, confirming that this training and subsequent annual recertification process have been completed.
1.3 Controller shall have the right to review an overview of Processor’s information security program prior to the commencement of Service and annually thereafter upon Controller request.
1.4 In the event of any apparent or actual theft, unauthorized use or disclosure of any Personal Data, Processor shall immediately commence all reasonable efforts to investigate and correct the causes and remediate the results thereof, and within 2 business days following confirmation of any such event, provide Controller notice thereof, and such further information and assistance as may be reasonably requested. Upon Controller’s request, remediation actions and reasonable assurance of resolution of discovered issues shall be provided to Controller.
1.5 Processor will not transmit any unencrypted Personal Data over the internet or any unsecured network, and will not store any Personal Data on any mobile computing device, such as a laptop computer, USB drive or portable data device, except where there is a business necessity and then only if the mobile computing device is protected by industry-standard encryption software. Processor shall encrypt Personal Data in transit into and out of the Services over...
General Security Procedures. Company agrees to abide by the security procedures set forth in this Agreement ("Security Procedures"). Both parties agree that the services described and provided by Bank will be subject to the terms and conditions set forth below:
General Security Procedures. Each individual who has access to Bank’s Online Banking system, including each individual named on joint accounts, must designate an online password and an Online ID. Your password must be a minimum of eight characters, which must consist of at least one numeric characters, plus alpha characters. For example, your password may be: 123signup. You may be required to change your password periodically to enhance security. All accounts you maintain with Bank will be displayed through online with account numbers, except for the last four digits, masked (your account numbers will still appear in your online statements). This provides additional level of security by ensuring that your actual account numbers will never be displayed.
General Security Procedures. Each individual who has access to Bank’s Online Banking system, including each individual named on joint accounts, must designate a Password and an Access ID. Your Password must be a minimum of 8 characters, which must consist of at least one (1) numeric characters, plus alpha characters. For example, your Password may be: 123signup. You may be required to change your Password periodically to enhance security.
General Security Procedures. (a) Customer agrees to comply with the security procedures described in this agreement, including the following security procedures and safeguards.
General Security Procedures. Any bags of merchandise from other stores that you bring to work must be stapled closed and retained in the Manager’s office until the end of your work shift. All handbags must be secured in your assigned locker. Merchandise for which you have not paid may not be stored in your locker. Pocketbooks, gym bags, etc., which do not fit in your locker, must be retained in the Manager’s office until the end of your work shift. All merchandise removed from the store must be in a bag and stapled closed with a receipt attached. CVS Health reserves the right to inspect all packages, pocketbooks, bags, etc., at the time you leave the store. Lockers and locks remain company property, and CVS Health reserves the right to inspect locker contents at any time. Only a company- issued lock should be used on your assigned locker. Please acknowledge your receipt of the Loss Prevention Policy/Procedure statement by signing below. If you wish, you may have a copy for your reference. Reviewed and Acknowledged by: Signature: Print Name: Date: Federal lawmakers enacted the Health Insurance Portability and Accountability Act (HIPAA) to better safeguard the privacy of patient records or “Protected Health Information” (PHI). This communication is designed to help you better understand how HIPAA impacts our operations as a healthcare provider, our customers, and all CVS colleagues. As more and more healthcare providers use electronic means to transmit health care information, there have been increasing concerns regarding the privacy of information in this process. As a result, HIPAA defines how healthcare providers such as pharmacies, hospitals, insurers, and physician’s offices are permitted to handle and transmit healthcare information. HIPAA provides a set of minimum standards for protection of patient privacy. It is important to note that some state laws may provide for an even greater level of protection. Protecting the health information of our customers has always been our highest priority at CVS/pharmacy. As a healthcare provider, we recognize our responsibility to safeguard health information and have very clear guidelines to help CVS colleagues protect customer privacy. (Refer to the confidentiality section in “Your Guide to CVS” for more information about these guidelines.) CVS/pharmacy has created a Privacy Office to help provide guidance to all CVS colleagues. The Privacy Office will work to make HIPAA compliance as easy as possible for everyone at CVS/pharmacy. HIPAA requ...
General Security Procedures. (a) (i) Introduction - The following general security procedure requirements apply to any Services provided. Certain Services require special security procedure requirements. The User Materials outline in detail the security safeguards that allow you to determine the holder of the security system for your company, authorized users, authorized transaction types and dollar limits on all transactions. For certain Services, you will be responsible for the administration, including the deletion of authorized users.
(a) (ii) Access - Most Services can be accessed and instructions and communications can be given by you to us by electronic means, such as a computer terminal. If we give you access to a secure system of communicating with us, such as our online banking services, you will be given or will select a user id and password. Each individual who is authorized by you to access the Services must have a unique user id and password. You will be responsible for the confidentiality and use of each user id and password. You will be responsible for all instructions received by us through and under any authorized user id and password. We reserve the right to require you to change any or all of the security procedures or codes at any time. We may require that you designate an individual (and, where applicable, we recommend that you have at least two individuals) who are authorized to take control of the security procedures inherent in the Service. Unless we are otherwise advised, the employee(s) (up to two), who execute the enrollment agreement are conclusively presumed to be the Designated Company Contact (“DCC”). The DCC is, or can assign to another(s), the role of System Administrator(s). The System Administrator(s) is responsible for assigning the levels of security necessary for you.
(a) (iii) Default Password - Any initial default passwords are sent to the DCC under separate cover.
(a) (iv) Password Change - Any System Administrator(s) will be required to change the initial passwords the first time they use their IDs to login into the System. It is the System Administrator’s responsibility to understand the security capabilities built into the Service and to assign and, as appropriate to your business and security needs, to restrict access to the various applications only to those employees who have a need to know, keeping in mind the importance of separation of duties as an important way of protecting your company. The System Administrator also maintains the r...
General Security Procedures. 1.1 Processor shall be responsible for establishing and maintaining an information security program that is designed to: (i) protect the security and confidentiality of Personal Data; (ii) protect against anticipated threats or hazards to the security or integrity of the Personal Data;
General Security Procedures a. Any interaction with inmates is prohibited. The Contractor must not bring anything to an inmate or from the Facility on behalf of an inmate. The Contractor is to report any interaction with an inmate to security staff immediately.
b. No firearms, weapons, explosives, alcoholic beverages, tobacco, or controlled substances are allowed on the grounds or within the Facility.
c. The use of cellular phones will be allowed within the work area on a limited basis, but must be authorized in advance by the Facility. No cellular phones are allowed within the facility and must stay locked in the Contractor work vehicle at all times.