Human Resources Security Sample Clauses

Human Resources Security. 18.1. Graylog personnel sign confidentiality agreements and acknowledge Graylog’s Acceptable Use Policy during the new employee onboarding process. 18.2. Graylog conducts background verification checks for potential Graylog personnel with access to Customer Content in accordance with relevant laws and regulations. The background checks are commensurate to an individual's job duties.
AutoNDA by SimpleDocs
Human Resources Security. Vendor will maintain and enforce a policy that addresses human resources security for all Representatives accessing University Data. Vendor will conduct background checks and not utilize any individual to fulfill the obligations of this Agreement if such individual has been convicted of any crime involving dishonesty or false statement including, but not limited to fraud and theft, or otherwise convicted of any offense for which incarceration for a minimum of one (1) year is an authorized penalty. Any such individual may not be a “Representative” under this Agreement Physical Security. All facilities used by or on behalf of Vendor to store and process University Data will implement and maintain administrative, physical, technical, and procedural safeguards in accordance with industry best practices at a level sufficient to secure University Data from a Security Incident. Such measures will be no less protective than those used to secure the Vendor’s own data of a similar type, and in no event, less than reasonable in view of the type and nature of the data involved.
Human Resources Security. 4.1. Roles & Responsibilities. Supplier shall define and document the security roles and responsibilities of employees, contractors, and third-party users in accordance with Supplier's information security policy. Supplier shall ensure that workforce members agree to terms and conditions concerning information security appropriate to the nature and extent of access they will have to Supplier's assets associated with information systems and services.
Human Resources Security. The Data Importer informs its personnel about relevant security procedures and their respective roles, as well as of possible consequences of breaching the security rules and procedures. Such consequences include disciplinary and/or legal action.
Human Resources Security a. Medallia employees undergo comprehensive screening during the hiring process. Background checks and reference validation will be performed to determine whether candidate qualifications are appropriate for the proposed position. Subject to any restrictions imposed by applicable law and based on jurisdiction, these background checks include criminal background checks, employment validation, and education verification as applicable. b. Ensuring all Medallia employees are subject to confidentiality and non-disclosure commitments before access is provisioned to Medallia Products and/or Customer Data. c. Ensuring applicable Medallia employees receive security and privacy awareness training designed to provide such employees with information security knowledge to provide for the security, availability, and confidentiality of Customer Data. d. Upon Medallia employee separation or change in roles, Medallia shall ensure any Medallia employee access is revoked in a timely manner and all Medallia assets, both information and physical, are returned.
Human Resources Security. 2.1 Supplier will ensure that Supplier’s personnel have received a background check upon hiring, in accordance with Supplier’s internal policies. 2.2 Supplier will ensure that Supplier’s personnel complete information security awareness training on an annual basis, or more frequently as needed, with regards to information security and the handling of UKG Personal Data. 2.3 Supplier will require all of Supplier’s personnel to keep all UKG Personal Data confidential in accordance with the terms of the Agreement and will use UKG Personal Data solely as necessary to perform the Services to UKG.
Human Resources Security. The Contractor takes reasonable steps to ensure that its Workforce is aware of their obligations in the provision of the Services and applicable data protection laws, including that any unauthorized processing or disclosure of the Personal Data may lead to disciplinary action under their contract of employment or other contractual arrangements. Prior to receiving access to Personal Data, the Workforce and any Extended Workforce will receive appropriate security awareness training and recurring security awareness training at appropriate intervals. The access rights of the Contractor’s Workforce with access to the Contractor’s Information Processing System(s) or media containing Personal Data are removed upon termination of their employment, contract or agreement, or adjusted upon change of job function.
AutoNDA by SimpleDocs
Human Resources Security. Provider informs its personnel about relevant security procedures and their respective roles, as well as of possible consequences of breaching the security rules and procedures. Such consequences include disciplinary and/or legal action.
Human Resources Security. ● A background check will be conducted on the employee(s) that will have access servers to rule out any criminal involvement. ● Processor will make sure to train its employees that will be handling Controller’s Data about their roles and security guidelines that will have to be adhered to from time to time.
Human Resources Security. Maintain procedures that determine whether Red Hat personnel are suitable for their roles, and provide appropriate training and information so that Red Hat u personnel understand their information security responsibilities in relation to Personal Data. Red Hat personnel with access to Personal Data are subject to Red Hat’s ethical business conduct, confidentiality, security and privacy policies as set forth in Red Hat’s Code of Business Conduct and Ethics.
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!