Information Security Policies And Guidelines For Access To Computers, Networks and Information By Non-Employee Personnel Sample Clauses

Information Security Policies And Guidelines For Access To Computers, Networks and Information By Non-Employee Personnel. 9.4.1 Information security policies and guidelines are designed to protect the integrity, confidentiality and availability of computer, networks and information resources. Section 9.5 - 9.11 summarizes the general policies and principles for individuals who are not employees of the Party that provides the computer, network or information, but have authorized access to that Party’s systems, networks or information. Questions should be referred to CLEC or SBC-13STATE, respectively, as the providers of the computer, network or information in question.
AutoNDA by SimpleDocs
Information Security Policies And Guidelines For Access To Computers, Networks and Information By Non-Employee Personnel. 9.4.1 Information security policies and guidelines are designed to protect the integrity, confidentiality and availability of computer, networks and information resources. Section

Related to Information Security Policies And Guidelines For Access To Computers, Networks and Information By Non-Employee Personnel

  • Electronic and Information Resources Accessibility and Security Standards a. Applicability: The following Electronic and Information Resources (“EIR”) requirements apply to the Contract because the Grantee performs services that include EIR that the System Agency's employees are required or permitted to access or members of the public are required or permitted to access. This Section does not apply to incidental uses of EIR in the performance of the Agreement, unless the Parties agree that the EIR will become property of the State of Texas or will be used by HHSC’s clients or recipients after completion of the Agreement. Nothing in this section is intended to prescribe the use of particular designs or technologies or to prevent the use of alternative technologies, provided they result in substantially equivalent or greater access to and use of a Product.

  • Personal Data, Confidentiality, Recording of Telephone Calls and Records 22.1. The Company may collect client information directly from the Client (in his completed Account Opening Application Form or otherwise) or from other persons including, for example, the credit reference agencies, fraud prevention agencies, banks, other financial institutions, third authentication service providers and the providers of public registers.

  • Provisions for Covered Entity to Inform Business Associate of Privacy Practices and Restrictions (a) Covered Entity shall notify Business Associate of any limitation(s) in the notice of privacy practices of Covered Entity under 45 CFR 164.520, to the extent that such limitation may affect Business Associate’s use or disclosure of protected health information.

  • Information Access Each Party (“Disclosing Party”) shall make available to another Party (“Requesting Party”) information that is in the possession of the Disclosing Party and is necessary in order for the Requesting Party to: (i) verify the costs incurred by the Disclosing Party for which the Requesting Party is responsible under this Agreement; and (ii) carry out its obligations and responsibilities under this Agreement. The Parties shall not use such information for purposes other than those set forth in this Article 25.1 of this Agreement and to enforce their rights under this Agreement.

  • Services and Information for Persons with Limited English Proficiency A. Grantee shall take reasonable steps to provide services and information both orally and in writing, in appropriate languages other than English, to ensure that persons with limited English proficiency are effectively informed and can have meaningful access to programs, benefits and activities. Meaningful access may entail providing language assistance services, including oral interpretation and written translation, if necessary. More information can be found at xxxxx://xxx.xxx.xxx/.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!