Information Security Management Practices Sample Clauses

Information Security Management Practices. You must have a reasonable security management practice in place. In particular, your information security management practice must have: (a) approved information security policies, standards, and guidelines that have been communicated to your Representatives; (b) a formal security and background screening process for all your Representatives (including the requirement for your Representatives to sign confidentiality agreements); (c) an approved access management policy that ensures: (i) access to Confidential Information is only granted to individuals where access is essential to their work, and that access activities are logged and can be provided to Manitoba Public Insurance to support security investigations; (ii) access control procedures are in place to revoke access within a reasonable timeframe when your Representatives change roles or leave your organization, and that such access is provisioned through unique user accounts that are traceable to an individual; and (iii) that passwords are managed and controlled in accordance with industry best practices and in a manner appropriate to the sensitivity of the information stored; (d) a policy requiring your Representatives to be provided with security and privacy training upon hire and on a regular basis; (e) established and formalized best practices in operating and managing your infrastructure and services; (f) reasonable security practices and protections in place to protect against internal and external threats, in ways that will not impact the confidentiality, integrity, and the availability of the Confidential Information; (g) a physical and environmental security policy mandating continuous protection of your premises and computing environments, and that access to these environments has reasonable controls to mitigate risks of unauthorized access to Confidential Information; and (h) a formal information security incident management practice under which you will notify Manitoba Public Insurance forthwith, through a single point of contact, of any security incident impacting Manitoba Public Insurance’s Confidential Information or work you perform for Customers.
AutoNDA by SimpleDocs

Related to Information Security Management Practices

  • Information Management Information and Records

  • Settlement Practices The Custodian shall provide to each Board the information with respect to custody and settlement practices in countries in which the Custodian employs an Eligible Foreign Custodian described on Schedule C at the time or times set forth on the Schedule. The Custodian may revise Schedule C from time to time, but no revision shall result in a Board being provided with substantively less information than had been previously provided on Schedule C.

  • Information/Cooperation Executive shall, upon reasonable notice, furnish such information and assistance to the Bank as may be reasonably required by the Bank, in connection with any litigation in which it or any of its subsidiaries or affiliates is, or may become, a party; provided, however, that Executive shall not be required to provide information or assistance with respect to any litigation between Executive and the Bank or any other subsidiaries or affiliates.

  • Enterprise Information Management Standards Grantee shall conform to HHS standards for data management as described by the policies of the HHS Office of Data, Analytics, and Performance. These include, but are not limited to, standards for documentation and communication of data models, metadata, and other data definition methods that are required by HHS for ongoing data governance, strategic portfolio analysis, interoperability planning, and valuation of HHS System data assets.

  • Safeguards Monitoring and Reporting The Borrower shall do the following or cause the Project Executing Agency to do the following:

  • Information Services Traffic 5.1 For purposes of this Section 5, Voice Information Services and Voice Information Services Traffic refer to switched voice traffic, delivered to information service providers who offer recorded voice announcement information or open vocal discussion programs to the general public. Voice Information Services Traffic does not include any form of Internet Traffic. Voice Information Services Traffic also does not include 555 traffic or similar traffic with AIN service interfaces, which traffic shall be subject to separate arrangements between the Parties. Voice Information services Traffic is not subject to Reciprocal Compensation charges under Section 7 of the Interconnection Attachment. 5.2 If a D&E Customer is served by resold Verizon Telecommunications Service or a Verizon Local Switching UNE, subject to any call blocking feature used by D&E, to the extent reasonably feasible, Verizon will route Voice Information Services Traffic originating from such Service or UNE to the Voice Information Service platform. For such Voice Information Services Traffic, unless D&E has entered into an arrangement with Verizon to xxxx and collect Voice Information Services provider charges from D&E’s Customers, D&E shall pay to Verizon without discount the Voice Information Services provider charges. D&E shall pay Verizon such charges in full regardless of whether or not it collects such charges from its own Customers. 5.3 D&E shall have the option to route Voice Information Services Traffic that originates on its own network to the appropriate Voice Information Services platform(s) connected to Verizon’s network. In the event D&E exercises such option, D&E will establish, at its own expense, a dedicated trunk group to the Verizon Voice Information Service serving switch. This trunk group will be utilized to allow D&E to route Voice Information Services Traffic originated on its network to Verizon. For such Voice Information Services Traffic, unless D&E has entered into an arrangement with Verizon to xxxx and collect Voice Information Services provider charges from D&E’s Customers, D&E shall pay to Verizon without discount the Voice Information Services provider charges. 5.4 D&E shall pay Verizon such charges in full regardless of whether or not it collects charges for such calls from its own Customers. 5.5 For variable rated Voice Information Services Traffic (e.g., NXX 550, 540, 976, 970, 940, as applicable) from D&E Customers served by resold Verizon Telecommunications Services or a Verizon Local Switching Network Element, D&E shall either (a) pay to Verizon without discount the Voice Information Services provider charges, or (b) enter into an arrangement with Verizon to xxxx and collect Voice Information Services provider charges from D&E’s Customers. 5.6 Either Party may request the other Party provide the requesting Party with non discriminatory access to the other party’s information services platform, where such platform exists. If either Party makes such a request, the Parties shall enter into a mutually acceptable written agreement for such access. 5.7 In the event D&E exercises such option, D&E will establish, at its own expense, a dedicated trunk group to the Verizon Information Service serving switch. This trunk group will be utilized to allow D&E to route information services traffic originated on its network to Verizon.

  • Data Practices The Parties acknowledge that this Agreement is subject to the requirements of Minnesota’s Government Data Practices Act, Minnesota Statutes, Section 13.01

  • Best Practices The Recipient acknowledges they may or may not have access to the Owner’s Confidential Information and agrees that it shall not directly or indirectly divulge, disclose, or communicate any of the Confidential Information to any third party, except as may be required during any formal business association or dealings on behalf of the Owner for any event, with the prior written approval of the Owner. The Recipient acknowledges that no license of the Confidential Information, by implication or otherwise, is granted to the Recipient by reason of this Agreement. Additionally, the Recipient acknowledges that it may only use the Confidential Information in connection with its business dealings with the Owner and for no other purpose without the prior written consent of the Owner.

  • Financial Management System Subrecipient shall establish and maintain a sound financial management system, based upon generally accepted accounting principles. Contractor’s system shall provide fiscal control and accounting procedures that will include the following: i. Information pertaining to tuition rates, payments, and educational assistance payments; and

  • STANDARDS OF MANAGEMENT AND OPERATIONS In performing its obligations hereunder, during the term of this ESA, the Competitive Supplier shall exercise reasonable care to assure that its facilities are prudently and efficiently managed; that it employs an adequate number of competently trained and experienced personnel to carry out its responsibilities; that it delivers or arranges to deliver a safe and reliable supply of such amounts of electricity to the Point of Delivery as are required under this ESA; that it complies with all relevant industry standards and practices for the supply of electricity to Participating Consumers; and that, at all times with respect to Participating Consumers, it exercises good practice for a Competitive Supplier and employs Commercially Reasonable skills, systems and methods available to it.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!