Human Resources Security Sample Clauses

Human Resources Security. Vendor will maintain and enforce a policy that addresses human resources security for all Representatives accessing University Data. Vendor will conduct background checks and not utilize any individual to fulfill the obligations of this Agreement if such individual has been convicted of any crime involving dishonesty or false statement including, but not limited to fraud and theft, or otherwise convicted of any offense for which incarceration for a minimum of one (1) year is an authorized penalty. Any such individual may not be a “Representative” under this Agreement Physical Security. All facilities used by or on behalf of Vendor to store and process University Data will implement and maintain administrative, physical, technical, and procedural safeguards in accordance with industry best practices at a level sufficient to secure University Data from a Security Incident. Such measures will be no less protective than those used to secure the Vendor’s own data of a similar type, and in no event, less than reasonable in view of the type and nature of the data involved.
AutoNDA by SimpleDocs
Human Resources Security. The Data Importer informs its personnel about relevant security procedures and their respective roles, as well as of possible consequences of breaching the security rules and procedures. Such consequences include disciplinary and/or legal action.
Human Resources Security a. Medallia employees undergo comprehensive screening during the hiring process. Background checks and reference validation will be performed to determine whether candidate qualifications are appropriate for the proposed position. Subject to any restrictions imposed by applicable law and based on jurisdiction, these background checks include criminal background checks, employment validation, and education verification as applicable.
Human Resources Security. 4.1. Roles & Responsibilities. Supplier shall define and document the security roles and responsibilities of employees, contractors, and third-party users in accordance with Supplier's information security policy. Supplier shall ensure that workforce members agree to terms and conditions concerning information security appropriate to the nature and extent of access they will have to Supplier's assets associated with information systems and services.
Human Resources Security. 2.1 Supplier will ensure that Supplier’s personnel have received a background check upon hiring, in accordance with Supplier’s internal policies.
Human Resources Security. 18.1. Graylog personnel sign confidentiality agreements and acknowledge Graylog’s Acceptable Use Policy during the new employee onboarding process.
Human Resources Security. Provider informs its personnel about relevant security procedures and their respective roles, as well as of possible consequences of breaching the security rules and procedures. Such consequences include disciplinary and/or legal action.
AutoNDA by SimpleDocs
Human Resources Security. ● A background check will be conducted on the employee(s) that will have access servers to rule out any criminal involvement. ● Processor will make sure to train its employees that will be handling Controller’s Data about their roles and security guidelines that will have to be adhered to from time to time. ● In case of any violation by its employees, Processor will take disciplinary action, that could also include termination of the employee from the Processor’s organization.
Human Resources Security. 1.1 Training 1.1.1 [###] [###] [###] 1.1.2 [###] [###] [###]
Human Resources Security. The Adviser has an InfoSec awareness training program. Non-compliance by employees with the InfoSec policies results in disciplinary action. The InfoSec policies reasonably ensure the proper segregation of duties to prevent fraud, theft, illicit or unethical behaviors. Employees access rights are changed with job reassignments in order to comply with rule of Least Privilege. The InfoSec policies and procedures reduce the risk of unauthorized access or misuse or abuse by former employees by disabling of access accounts and recovering all company property and company information from such former employees.
Time is Money Join Law Insider Premium to draft better contracts faster.