Information Security Obligations. The Contractor shall abide by the SFWIB’s Information Technology Security Policies and Procedures. • The Contractor (including its officers, employees, subcontractors, agents, partners, principals, servants, representatives or any other individuals to whom Contractor exposes or authorizes to access confidential information obtained under this Contract), shall not store, or allow to be stored, any confidential information on any portable storage media (e.g., laptops, thumb drives, hard drives, etc.) or peripheral device with the capacity to store information. The Contractor shall not electronically transmit, or allow to be transmitted, any personal or confidential information. Failure to strictly comply with this provision shall constitute a breach of this Contract. • The Contractor shall not engage any third party vendor, company or agent to modify, troubleshoot or otherwise alter the configuration of network devices, workstations, printers and/or any other device or hardware attached to the SFWIB’s network and agrees that no other devices, servers, workstations, tablets, wireless devices, etc., other than those installed by the SFWIB’s IT Unit or SFWIB’s authorized agent, will be connected to the SWFIB’s network. • The Contractor shall not engage any third party vendor, company or agent to modify, troubleshoot or otherwise alter the configuration of network devices, workstations, printers and/or any other device or hardware attached to the SFWIB’s network and agrees that no other devices, servers, workstations, tablets, wireless devices, etc., other than those installed by the SFWIB’s IT Unit or SFWIB’s authorized agent, will be connected to the SWFIB’s network. • The Contractor shall ensure that the Contractor’s staff who has access to client information through the Employ Miami-Dade (“EMD”)/Employ Monroe (“EM”), the One-Stop Service Tracking (“OSST”) system(s) and/or any other information systems as required, complete the Information Security and Awareness Training annually.
Information Security Obligations. 1. To identify an appropriately skilled individual to function as its Data Security Officer who shall act as the liaison to the department’s Security Staff and who will maintain an appropriate level of data security for the information the provider is collecting or using in the performance of this contract. An appropriate level of security includes approving and tracking all provider employees that request system or information access and ensuring that user access has been removed from all terminated provider employees.
2. To hold the department harmless from any loss or damage incurred by the department as a result of information technology used, provided or accessed by the provider.
3. To provide the latest departmental Security Awareness Training to its’ staff and subcontractors.
4. To ensure that all provider employees who have access to departmental information are provided a copy of CFOP 50-6 and that they sign the DCF Security Agreement form (CF 114), a copy of which may be obtained from the contract manager.
Information Security Obligations. Provider will employ security measures in accordance with applicable Law.
Information Security Obligations. 1. An appropriately skilled individual shall be identified by the provider to function as its Data Security Officer. The Data Security Officer shall act as the liaison to the department’s security staff and will maintain an appropriate level of data security for the information the provider is collecting or using in the performance of this contract. An appropriate level of security includes approving and tracking all provider employees that request or have access to any departmental data system or information. The Data Security Officer will ensure that user access to the data system or information has been removed from all terminated provider employees.
2. The provider shall provide the latest departmental security awareness training to its staff and subcontractors who have access to departmental information.
3. All provider employees who have access to departmental information shall comply with, and be provided a copy of CFOP 50-2, and shall sign the DCF Security Agreement form CF 0114 annually. A copy of CF 0114 may be obtained from the contract manager.
4. The provider shall make every effort to protect and avoid unauthorized release of any personal or confidential information by ensuring both data and storage devices are encrypted as prescribed in CFOP 50-2. If encryption of these devices is not possible, then the provider shall assure that unencrypted personal and confidential departmental data will not be stored on unencrypted storage devices. The provider shall require the same of all subcontractors.
5. The provider agrees to notify the contract manager as soon as possible, but no later than five (5) business days following the determination of any breach or potential breach of personal and confidential departmental data. The provider shall require the same notification requirements of all subcontractors.
6. The provider shall provide notice to affected parties no later than 45 days following the determination of any potential breach of personal or confidential departmental data provided in section 817.5681, F.S. The provider shall require the same notification requirements of all subcontractors.
Information Security Obligations eGain will use commercially reasonable security technologies (such as encryption, password protection and firewall protection) in providing the Cloud Services, however, Customer acknowledges that eGain cannot and does not guarantee the privacy, security, authenticity and non-corruption of any information transmitted through, or stored in any system connected to the Internet. Customer further acknowledges that Customer is responsible for any security vulnerabilities, and the consequences of such vulnerabilities, arising from Customer’s content and Customer’s applications, including any Malicious Codes contained in Customer’s content or Customer’s applications that could limit or harm the functionality of a computer or that could damage, intercept or expropriate data. If made available by eGain, Customer may purchase, or may be required to purchase, through Business Partner, additional Cloud Services Add-Ons from eGain (e.g. Security Plus, HIPAA Compliant Customer Environment, PCI Certified Customer Environment, etc.) to address particular data protection requirements applicable to Customer’s business or Customer’s content or to address changes in other Applicable Laws which affects the scope, provision, receipt or use of the Cloud Services.
Information Security Obligations. 41.1. The Training Vendor shall abide by the SFWIB’s Information Technology Security Policies and Procedures.
41.1.1. The Training Vendor (including its officers, employees, subcontractors, agents, partners, principals, servants, representatives or any other individuals to whom Training Vendor exposes or authorizes to access confidential information obtained under this Agreement), shall not store, or allow to be stored, any confidential information on any portable storage media (e.g., laptops, thumb drives, hard drives, etc.) or peripheral device with the capacity to store information. The Training Vendor shall not electronically transmit, or allow to be transmitted, any personal or confidential information. Failure to strictly comply with this provision shall constitute a breach of this Contract.
41.1.2. During the term of this Agreement, the Training Vendor must obtain signed confidentiality access agreements, which are required by the SFWIB and/or the DEO for systems access privileges, for any individual including, but not limited to all of the Training Vendor’s officers, employees, subcontractors, agents, partners, principals, servants, representatives and security officers, prior to their access to electronic data systems.
41.1.3. The Training Vendor shall ensure that the Training Vendor’s staff who has access to client information through the WFMS and/or any other information systems as required, complete the Information Security and Awareness Training annually.
41.1.4. The Training Vendor shall make every effort to protect and avoid unauthorized release of any personal or confidential information, as set forth in Article 37,
Information Security Obligations. 12.2.2.1 Each Party shall adopt technical and organizational measures to guarantee reasonable protection of the other Party’s Confidential Information, including the measures listed in Exhibit 12.2.2.1.
12.2.2.2 Each Party may audit the other Party’s technical and organizational measures. For this purpose, each Party shall have the right, upon [[***]] Business Days’ prior notice and during regular business hours, to:
(i) request information from the other Party (self-reporting);
(ii) cause a personal on-site inspection of the other Party, by a qualified Third Party (on-site audit). For such on-site audit, the audited Party shall grant the auditing Party access to, in particular, the data processing systems, files and documents pertaining to or containing Confidential Information of the auditing Party; and / or
(iii) interview relevant personnel, provided that such rights may not be exercised in a manner that interferes with the normal operations and activities of the audited Party’s personnel. The audited Party shall and shall cause its personnel to cooperate with any such activities. In particular, it shall immediately make available to the auditing Party all information and certifications that are necessary for the performance of the information security control.
Information Security Obligations. The Transferred Press Subsidiaries have established and as at the date of this Agreement maintain commercially reasonable information security procedures (including with respect to the collection and processing of Personal Data) and, to the Knowledge of Seller, the Transferred Press Subsidiaries have not in the two years prior to the date of this Agreement materially failed to comply with such information security procedures.
Information Security Obligations. The Contractor shall abide by the SFWIB’s Information Technology Security Policies and Procedures.
Information Security Obligations. Each Party shall adopt technical and organizational measures to guarantee reasonable protection of the other Party’s Confidential Information, including the measures listed in Exhibit 12.2.2.1.