Information Security Policies And Guidelines For Access To Computers Sample Clauses

Information Security Policies And Guidelines For Access To Computers. Networks and Information By Non-Employee Personnel: 33.11.4.1 Information security policies and guidelines are designed to protect the integrity, confidentiality and availability of computer, networks and information resources. Sections 33.11.5 through 33.11.11 summarize the general policies and principles for individuals who are not employees of the Party that provides the computer, network or information, but have authorized access to that Party’s systems, networks or information. Questions should be referred to CLEC or SBC-13STATE, respectively, as the providers of the computer, network or information in question. 33.11.4.2 It is each Party’s responsibility to notify its employees, contractors and vendors who will have access to the other Party’s network, on the proper security responsibilities identified within this Article. Adherence to these policies is a requirement for continued access to the other Party’s systems, networks or information. Exceptions to the policies must be requested in writing and approved by the other Party’s information security organization.
AutoNDA by SimpleDocs
Information Security Policies And Guidelines For Access To Computers. Networks and Information By Non-Employee Personnel. 6.2.3.1 Information security policies and guidelines are designed to protect the integrity, confidentiality and availability of computer, networks and information resources. This summary provides a convenient reference for individuals who are not employees of the Party that provides the computer, network or information, but have authorized access to that Party’s systems, networks or information. Questions should be referred to CLEC or SBC-AMERITECH, respectively, as the providers of the computer, network or information in question. 6.2.3.2 It is each Party’s responsibility to notify its employees, contractors and vendors who will have access to the other Party’s network, on the proper security responsibilities identified within this Article. Adherence to these policies is a requirement for continued access to the other Party’s systems, networks or information. Exceptions to the policies must be requested in writing and approved by the other Party’s information security organization.
Information Security Policies And Guidelines For Access To Computers. Networks and Information By Non-Employee Personnel: 11.4.1 Information security policies and guidelines are designed to protect the integrity, confidentiality and availability of computer, networks and information resources. Sections

Related to Information Security Policies And Guidelines For Access To Computers

  • Policies and Procedures i) The policies and procedures of the designated employer apply to the employee while working at both sites. ii) Only the designated employer shall have exclusive authority over the employee in regard to discipline, reporting to the College of Nurses of Ontario and/or investigations of family/resident complaints. iii) The designated employer will ensure that the employee is covered by WSIB at all times, regardless of worksite, while in the employ of either home. iv) The designated employer will ensure that the employee is covered by liability insurance at all times, regardless of worksite, while in the employ of either home. v) The designated employer shall have exclusive authority over the employee’s personnel files and health records. These files will be maintained on the site of the designated employer.

  • Information About You and Your Visits to the Website All information we collect on this Website is subject to our Privacy Policy. By using the Website, you consent to all actions taken by us with respect to your information in compliance with the Privacy Policy.

  • Insurance and Fingerprint Requirements Information Insurance If applicable and your staff will be on TIPS member premises for delivery, training or installation etc. and/or with an automobile, you must carry automobile insurance as required by law. You may be asked to provide proof of insurance. Fingerprint It is possible that a vendor may be subject to Chapter 22 of the Texas Education Code. The Texas Education Code, Chapter 22, Section 22.0834. Statutory language may be found at: xxxx://xxx.xxxxxxxx.xxxxx.xxxxx.xx.xx/ If the vendor has staff that meet both of these criterion: (1) will have continuing duties related to the contracted services; and (2) has or will have direct contact with students Then you have ”covered” employees for purposes of completing the attached form. TIPS recommends all vendors consult their legal counsel for guidance in compliance with this law. If you have questions on how to comply, see below. If you have questions on compliance with this code section, contact the Texas Department of Public Safety Non-Criminal Justice Unit, Access and Dissemination Bureau, FAST-FACT at XXXX@xxxxx.xxxxx.xx.xx and you should send an email identifying you as a contractor to a Texas Independent School District or ESC Region 8 and TIPS. Texas DPS phone number is (000) 000-0000. See form in the next attribute to complete entitled: Texas Education Code Chapter 22 Contractor Certification for Contractor Employees

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!