Human Resources Security. 18.1. Graylog personnel sign confidentiality agreements and acknowledge Graylog’s Acceptable Use Policy during the new employee onboarding process.
18.2. Graylog conducts background verification checks for potential Graylog personnel with access to Customer Content in accordance with relevant laws and regulations. The background checks are commensurate to an individual's job duties.
Human Resources Security. Vendor will maintain and enforce a policy that addresses human resources security for all Representatives accessing University Data. Vendor will conduct background checks and not utilize any individual to fulfill the obligations of this Agreement if such individual has been convicted of any crime involving dishonesty or false statement including, but not limited to fraud and theft, or otherwise convicted of any offense for which incarceration for a minimum of one (1) year is an authorized penalty. Any such individual may not be a “Representative” under this Agreement Physical Security. All facilities used by or on behalf of Vendor to store and process University Data will implement and maintain administrative, physical, technical, and procedural safeguards in accordance with industry best practices at a level sufficient to secure University Data from a Security Incident. Such measures will be no less protective than those used to secure the Vendor’s own data of a similar type, and in no event, less than reasonable in view of the type and nature of the data involved.
Human Resources Security. 4.1. Roles & Responsibilities. Supplier shall define and document the security roles and responsibilities of employees, contractors, and third-party users in accordance with Supplier's information security policy. Supplier shall ensure that workforce members agree to terms and conditions concerning information security appropriate to the nature and extent of access they will have to Supplier's assets associated with information systems and services.
Human Resources Security. The Data Importer informs its personnel about relevant security procedures and their respective roles, as well as of possible consequences of breaching the security rules and procedures. Such consequences include disciplinary and/or legal action.
Human Resources Security a. Medallia employees undergo comprehensive screening during the hiring process. Background checks and reference validation will be performed to determine whether candidate qualifications are appropriate for the proposed position. Subject to any restrictions imposed by applicable law and based on jurisdiction, these background checks include criminal background checks, employment validation, and education verification as applicable.
b. Ensuring all Medallia employees are subject to confidentiality and non-disclosure commitments before access is provisioned to Medallia Products and/or Customer Data.
c. Ensuring applicable Medallia employees receive security and privacy awareness training designed to provide such employees with information security knowledge to provide for the security, availability, and confidentiality of Customer Data.
d. Upon Medallia employee separation or change in roles, Medallia shall ensure any Medallia employee access is revoked in a timely manner and all Medallia assets, both information and physical, are returned.
Human Resources Security. 2.1 Supplier will ensure that Supplier’s personnel have received a background check upon hiring, in accordance with Supplier’s internal policies.
2.2 Supplier will ensure that Supplier’s personnel complete information security awareness training on an annual basis, or more frequently as needed, with regards to information security and the handling of UKG Personal Data.
2.3 Supplier will require all of Supplier’s personnel to keep all UKG Personal Data confidential in accordance with the terms of the Agreement and will use UKG Personal Data solely as necessary to perform the Services to UKG.
Human Resources Security. Provider informs its personnel about relevant security procedures and their respective roles, as well as of possible consequences of breaching the security rules and procedures. Such consequences include disciplinary and/or legal action.
Human Resources Security. 1.1 Training
Human Resources Security. 7.1 Prior to employment
1. Security responsibilities are laid down in proper job descriptions and in the employment conditions.
2. NautaDutilh screens its employees in accordance with the guidelines for each job profile.
3. Employees accept and sign the conditions of their employment contract, in which NautaDutilh lays down the employee’s responsibilities and those of the organisation with respect to Information Security.
4. Employees and third parties sign a confidentiality agreement from NautaDutilh prior to commencing the work.
Human Resources Security. Maintain procedures that determine whether Red Hat personnel are suitable for their roles, and provide appropriate training and information so that Red Hat u personnel understand their information security responsibilities in relation to Personal Data. Red Hat personnel with access to Personal Data are subject to Red Hat’s ethical business conduct, confidentiality, security and privacy policies as set forth in Red Hat’s Code of Business Conduct and Ethics.