I nformation Security Sample Clauses

I nformation Security. Komo will implement and maintain commercially reasonable technical and organisational security measures designed to meet the following objectives: (i) ensure the security and confidentiality of Customer Data in the custody and under the control of Komo; (ii) protect against any anticipated threats or hazards to the security or integrity of such Customer Data; (iii) protect against unauthorised access to or use of such Customer Data; and (iv) ensure that Komo’s return or disposal of such Customer Data is performed in a manner consistent with Komo’s obligations under items (i)-(iii) above. The Customer is solely responsible for consequences of the Customer’s decision not to adopt updates or best practices that Komo makes available to the Customer.
AutoNDA by SimpleDocs
I nformation Security. (a) Service Provider represents and warrants that its creation, collection, receipt, access, use, storage, disposal, and disclosure of Personal Information does and will comply with all applicable federal [and], state[, and foreign] privacy and data protection laws, as well as all other applicable regulations and directives. (b) Service Provider shall implement and maintain a written information security program including appropriate policies, procedures, and risk assessments that are reviewed at least annually. (c) Without limiting Service Provider’s obligations under Section 3(a), Service Provider shall implement administrative, physical, and technical safeguards to protect Personal Information from unauthorized access, acquisition, or disclosure, destruction, alteration, accidental loss, misuse, or damage that are no less rigorous than accepted industry practices, and shall ensure that all such safeguards, including the manner in which Personal Information is created, collected, accessed, received, used, stored, processed, disposed of, and disclosed, comply with applicable data protection and privacy laws, as well as the terms and conditions of this Agreement. (d) At a minimum, Service Provider’s safeguards for the protection of Personal Information shall include: (i) limiting access of Personal Information to Authorized Persons; (ii) securing business facilities, data centers, paper files, servers, backup systems, and computing equipment, including, but not limited to, all mobile devices and other equipment with information storage capability; (iii) implementing network, application, database, and platform security; (iv) securing information transmission, storage, and disposal; (v) implementing authentication and access controls within media, applications, operating systems, and equipment; (vi) encrypting highly Sensitive Personal Information stored on any mobile media;

Related to I nformation Security

  • Information Security IET information security management practices, policies and regulatory compliance requirements are aimed at assuring the confidentiality, integrity and availability of Customer information. The UC Xxxxx Cyber-safety Policy, UC Xxxxx Security Standards Policy (PPM Section 310-22), is adopted by the campus and IET to define the responsibilities and key practices for assuring the security of UC Xxxxx computing systems and electronic data.

  • Aviation Security 1. In accordance with their rights and obligations under international law, the Parties reaffirm that their obligation to each other to protect the security of civil aviation against acts of unlawful interference forms an integral part of this Agreement. Without limiting the generality of their rights and obligations under international law, the Parties shall in particular act in conformity with the provisions of the Convention on Offenses and Certain Other Acts Committed on Board Aircraft, done at Tokyo September 14, 1963, the Convention for the Suppression of Unlawful Seizure of Aircraft, done at The Hague December 16, 1970, the Convention for the Suppression of Unlawful Acts against the Safety of Civil Aviation, done at Montreal September 23, 1971, and the Protocol for the Suppression of Unlawful Acts of Violence at Airports Serving International Civil Aviation, done at Montreal February 24, 1988. 2. The Parties shall provide upon request all necessary assistance to each other to prevent acts of unlawful seizure of civil aircraft and other unlawful acts against the safety of such aircraft, of their passengers and crew, and of airports and air navigation facilities, and to address any other threat to the security of civil air navigation. 3. The Parties shall, in their mutual relations, act in conformity with the aviation security standards and appropriate recommended practices established by the International Civil Aviation Organization and designated as Annexes to the Convention; they shall require that operators of aircraft of their registry, operators of aircraft who have their principal place of business or permanent residence in their territory, and the operators of airports in their territory act in conformity with such aviation security provisions. 4. Each Party agrees to observe the security provisions required by the other Party for entry into, for departure from, and while within the territory of that other Party and to take adequate measures to protect aircraft and to inspect passengers, crew, and their baggage and carry-on items, as well as cargo and aircraft stores, prior to and during boarding or loading. Each Party shall also give positive consideration to any request from the other Party for special security measures to meet a particular threat. 5. When an incident or threat of an incident of unlawful seizure of aircraft or other unlawful acts against the safety of passengers, crew, aircraft, airports or air navigation facilities occurs, the Parties shall assist each other by facilitating communications and other appropriate measures intended to terminate rapidly and safely such incident or threat. 6. When a Party has reasonable grounds to believe that the other Party has departed from the aviation security provisions of this Article, the aeronautical authorities of that Party may request immediate consultations with the aeronautical authorities of the other Party. Failure to reach a satisfactory agreement within 15 days from the date of such request shall constitute grounds to withhold, revoke, limit, or impose conditions on the operating authorization and technical permissions of an airline or airlines of that Party. When required by an emergency, a Party may take interim action prior to the expiry of 15 days.

  • Application Security The ISP will require that in-house application development be governed by a documented secure software development life cycle methodology, which will include deployment rules for new applications and changes to existing applications in live production environments.

  • UNION SECURITY 7.01 The Employer shall deduct monthly from the pay due to each employee who is covered by this Agreement a sum equal to the monthly Union dues of each such employee. Where an employee has no earnings during the first payroll period, the deduction shall be made in the next payroll period where the employee has earnings, within that month. The Union shall notify the employer in writing of the amount of such dues from time to time. The Employer will send to the Union its cheque for the dues so deducted in the month following the month in which the dues are deducted. When arrears or adjustments are submitted retroactively, the dues month and an explanation will accompany any such dues. 7.02 The Employer shall provide the Union with a list showing the first and last names and Social Insurance Numbers of all employees from whom deductions have been made. The report will identify the name of the facility and the month from which the dues are remitted. The Employer will also identify job classification (where the bargaining unit includes classifications, employees paid less than RNs) and status (i.e. full-time, part-time) of the employees, all terminations, newly hired employees (including start date, where the existing system allows for the information without cost), and employees on Leaves of Absence. On a quarterly basis, the Home will also provide the members’ current addresses and phone numbers, shown on the Employer’s personnel records. The Employer will endeavour to provide information in electronic format if the Employer has the technology. The Union may forward any questions with respect to individual employees in writing (or e-mail) to the Administrator (or designate). The employer will respond to such requests with any information it has which is readily available, within two weeks. 7.03 The Employer shall provide each employee with a T4 Supplementary slip showing the dues deducted in the previous year for income tax purposes where such information is or becomes readily available through the employer's payroll system. 7.04 The Union shall indemnify and save the Employer harmless with respect to dues so deducted and remitted.

  • Personal Information security breach Supplier/Service Provider’s Obligations a) The Supplier/Service Provider shall notify the Information Officer of Transnet, in writing as soon as possible after it becomes aware of or suspects any loss, unauthorised access or unlawful use of any personal data and shall, at its own cost, take all necessary remedial steps to mitigate the extent of the loss or compromise of personal data and to restore the integrity of the affected Goods/Services as quickly as is possible. The Supplier/Service Provider shall also be required to provide Transnet with details of the persons affected by the compromise and the nature and extent of the compromise, including details of the identity of the unauthorised person who may have accessed or acquired the personal data. b) The Supplier/Service Provider shall provide on-going updates on its progress in resolving the compromise at reasonable intervals until such time as the compromise is resolved. c) Where required, the Supplier/Service Provider may be required to notify the South African Police Service; and/or the State Security Agency and where applicable, the relevant regulator and/or the affected persons of the security breach. Any such notification shall always include sufficient information to allow the persons to take protective measures against the potential consequences of the compromise. d) The Supplier/Service Provider undertakes to co‑operate in any investigation relating to security which is carried out by or on behalf of Transnet including providing any information or material in its possession or control and implementing new security measures.

  • ARTICLE UNION SECURITY It is agreed that all employees covered by this Agree- ment shall become and remain members of the Union in good standing as a condition of employment. New employees shall make application for membership in the Union at the time of their hiring and shall become and remain members of the Union in good standing, as a condition of employment. The Employer agrees that it will inform all new employees prior to or at the time of hiring of the Union security provisions of the Agree- ment. The Employer or designate will during the first three (3) weeks of each individual’s employment make known to the new employee the names and work locations of union stewards in the store. The Employer shall, during the term of this Agreement, as a condition of employment, deduct from members of the bargaining unit the regular weekly Union Dues and such Dues shall be remitted to the Union prior to the 15th day of the month following the month in which such deduction is made. The Employer shall notify the Union of new full-time employees’ classifications and rates of pay in addition to ter- minations, on a monthly basis. Deduction statements shall be documented by location, containing the full name of the employee and his starting date and social insurance number subject to the employee consenting to the use of his or her social insurance number. The Employer agrees to record the annual Union Dues deductions for each employee on his Form. Employers shall provide dues information to the Union in an electronic format acceptable to both parties. In the event that such weekly Dues are changed during the term of the Agreement, such change must be given to the Employer by notice properly authorized by Union Officials and shall become effective within one month following the date the notice is received. New employees shall be documented and documents for- warded to the Union Office within two (2) weeks of hiring. The first sixty (60) days worked at each store shall be con- sidered a probationary period. It is understood between the Employer and the Union that a probationary employee shall be considered an employee for all purposes of the Agree- ment save that a probationary employee may be dismissed at any time during the probationary period.

  • Information Security Program (1) DTI shall implement and maintain a comprehensive written information security program applicable to the Personal Information ("Information Security Program") which shall include commercially reasonable measures, including, as appropriate, policies and procedures and technical, physical, and administrative safeguards that are consistent with industry standards, providing for (i) the security and confidentiality of the Personal Information, (ii) protection of the Personal Information against reasonably foreseeable threats or hazards to the security or integrity of the Personal Information, (iii) protection against unauthorized access to or use of or loss or theft of the Personal Information, and (iv) appropriate disposal of the Personal Information. Without limiting the generality of the foregoing, the Information Security Program shall provide for (i) continual assessment and re-assessment of the risks to the security of Personal Information acquired or maintained by DTI and its agents, contractors and subcontractors in connection with the Services, including but not limited to (A) identification of internal and external threats that could result in unauthorized disclosure, alteration or destruction of Personal Information and systems used by DTI and its agents, contractors and subcontractors, (B) assessment of the likelihood and potential damage of such threats, taking into account the sensitivity of such Personal Information, and (C) assessment of the sufficiency of policies, procedures, information systems of DTI and its agents, contractors and subcontractors, and other arrangements in place, to control risks; and (ii) appropriate protection against such risks. (2) The Information Security Program shall require encryption of any Personal Information in electronic format while in transit or in storage, and enhanced controls and standards for transport and disposal of physical media containing Personal Information. DTI shall, and shall require its agents, contractors and subcontractors who access or use Personal Information or Confidential Information to, regularly test key controls, systems and procedures relating to the Information Security Program ("ISP Tests"). DTI shall advise the Funds of any material issues identified in the ISP Tests potentially affecting the Information Security Program. (3) DTI shall comply with its Information Security Program.

  • Transaction Security Each of the Parties agrees that the Transaction Security shall rank and secure the Credit Facility Liabilities, the Hedging Liabilities and the Pari Passu Debt Liabilities (subject to the terms of this Agreement) pari passu and without any preference between them (but only to the extent that such Transaction Security is expressed to secure those Liabilities).

  • ASSOCIATION SECURITY 5.01 The Hospital will deduct from each nurse covered by this Agreement an amount equal to the regular monthly Association dues designated by the Association. The deduction period for a part-time nurse may be extended where the nurse does not receive any pay in a particular month. Where a nurse has no dues deducted during the payroll period from which dues are normally deducted, that deduction shall be made in the next payroll period provided the nurse has earnings in the next payroll period. If the failure to deduct dues results from an error by the Hospital, then, as soon as the error is called to its attention by the union, the Hospital shall make the deduction in the manner agreed to by the parties. If there is no agreement, the Hospital shall make the deduction in the manner prescribed by the union. 5.02 Such dues shall be deducted monthly and in the case of newly employed nurses, such deductions shall commence in the month following their date of hire. 5.03 The amount of the regular monthly dues shall be those authorized by the Association and the Vice-President, Finance of the Association shall notify the Hospital of any changes therein and such notification shall be the Hospital's conclusive authority to make the deduction specified. In the case of any local dues levies, notification will be made by the local treasurer and such notification shall be the Hospital’s conclusive authority to make the deduction specified. 5.04 In consideration of the deducting and forwarding of Association dues by the Hospital, the Association agrees to indemnify and save harmless the Hospital against any claims or liabilities arising or resulting from the operation of this Article. 5.05 The amounts so deducted shall be remitted monthly to the Vice-President, Finance of the Association, no later than the end of the month following the month in which the dues were deducted. In remitting such dues, the Hospital shall provide a list of nurses from whom deductions were made, their work site (if the bargaining unit covers more than one site) and the nurses’ social insurance numbers, amount of dues deducted and, where feasible, the Hospital shall also provide the job classification, and status of the nurses. The list shall also include deletions and additions from the preceding month highlighting new hires, resignations, terminations, new unpaid leave of absence of greater than one (1) month and returns from leaves of absence. A copy of this list will be sent concurrently to the local Association. Where the parties agree, the Hospital may also provide the information in an electronic format or on a computer disk. If the central parties are able to agree on a template for dues related information, it will be distributed and jointly recommended to the Hospitals. 5.06 The Hospital agrees that an officer of the Association or Union representative shall be allowed a reasonable period during regular working hours to interview newly hired nurses during their probationary period. During such interview, membership forms may be provided to the nurse. These interviews shall be scheduled in advance as determined by local negotiation and may be arranged collectively or individually by the Hospital. NOTE: The list provided for in Article 5.05 shall include any other information that is currently provided to ONA. Additionally, the Hospital will provide each nurse with a T-4 Supplementary Slip showing the dues deducted in the previous year for income tax purposes where such information is or becomes readily available through the Hospital's payroll system.

  • Password Security You are responsible for maintaining adequate security and control of any and all User IDs, Passwords, hints, personal identification numbers (PINs), or any other codes that you use to access the Account. Do not discuss, compare, or share information about your account number or password unless you are willing to give them full use of your money. Any loss or compromise of the foregoing information and/or your personal information may result in unauthorized access to your Account by third-parties and the loss or theft of any funds held in your Account and any associated accounts, including your Account. Checks and electronic withdrawals are processed by automated methods, and anyone who obtains your account number or access device could use it to withdraw money from your account, with or without your permission. You are responsible for keeping your email address and telephone number up to date in order to receive any notices or alerts that we may send you. We assume no responsibility for any loss that you may sustain due to compromise of your account login credentials due to no fault of ours and/or your failure to follow or act on any notices or alerts that we may send to you. If you believe your Account information has been compromised, or that someone has transferred or may transfer money from your account without your permission, contact us immediately, through Synapse, at xxxx@xxxxxxxxx.xxx or call at +0(000) 000-0000. You agree to promptly review all Account and transaction records and other Communications that we make available to you and to promptly report any discrepancy to us.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!