Security Policies IBM maintains privacy and security policies that are communicated to IBM employees. IBM requires privacy and security training to personnel who support IBM data centers. We have an information security team. IBM security policies and standards are reviewed and re-evaluated annually. IBM security incidents are handled in accordance with a comprehensive incident response procedure.
Security Policy As part of PCI DSS, the Card Organizations require that you have a security policy that covers the security of credit card information.
Blanket Policies Notwithstanding anything to the contrary in this Section 6.03, any insurance which Lessee is required to obtain pursuant to this Section 6.03 may be carried under a “blanket” policy or policies covering other properties or liabilities of Lessee provided that such “blanket” policy or policies otherwise comply with the provisions of this Section 6.03.
Internal Accounting and Disclosure Controls The Company and each of its Subsidiaries maintains internal control over financial reporting (as such term is defined in Rule 13a-15(f) under the 0000 Xxx) that is effective to provide reasonable assurance regarding the reliability of financial reporting and the preparation of financial statements for external purposes in accordance with generally accepted accounting principles, including that (i) transactions are executed in accordance with management’s general or specific authorizations, (ii) transactions are recorded as necessary to permit preparation of financial statements in conformity with generally accepted accounting principles and to maintain asset and liability accountability, (iii) access to assets or incurrence of liabilities is permitted only in accordance with management’s general or specific authorization and (iv) the recorded accountability for assets and liabilities is compared with the existing assets and liabilities at reasonable intervals and appropriate action is taken with respect to any difference. The Company maintains disclosure controls and procedures (as such term is defined in Rule 13a-15(e) under the 0000 Xxx) that are effective in ensuring that information required to be disclosed by the Company in the reports that it files or submits under the 1934 Act is recorded, processed, summarized and reported, within the time periods specified in the rules and forms of the SEC, including, without limitation, controls and procedures designed to ensure that information required to be disclosed by the Company in the reports that it files or submits under the 1934 Act is accumulated and communicated to the Company’s management, including its principal executive officer or officers and its principal financial officer or officers, as appropriate, to allow timely decisions regarding required disclosure. Neither the Company nor any of its Subsidiaries has received any notice or correspondence from any accountant or other Person relating to any potential material weakness or significant deficiency in any part of the internal controls over financial reporting of the Company or any of its Subsidiaries.
Safety Policy The City agrees to maintain in safe working condition all facilities and equipment furnished by the City to carry out the duties of each bargaining unit position, but reserves the right to determine what those facilities and equipment shall be. The Association agrees to work cooperatively in maintaining safety in the Xenia/Xxxxxx Central Communications Center.
Compliance Policies and Procedures To assist the Fund in complying with Rule 38a-1 of the 1940 Act, BBH&Co. represents that it has adopted written policies and procedures reasonably designed to prevent violation of the federal securities laws in fulfilling its obligations under the Agreement and that it has in place a compliance program to monitor its compliance with those policies and procedures. BBH&Co will upon request provide the Fund with information about our compliance program as mutually agreed.
Safeguards Monitoring and Reporting The Borrower shall do the following or cause the Project Executing Agency to do the following:
Contractor and Employee Security Precautions The security aspects of working at the Correctional Facility are critical. The following security precautions are part of the site conditions and are a part of this Contract. All persons coming on the site in any way connected with this Work shall be made aware of them, and it is the (General) Contractor’s responsibility to check and enforce them.
Violence Policies and Procedures The Employer agrees to have in place explicit policies and procedures to deal with violence. The policy will address the prevention of violence, the management of violent situations, provision of legal counsel and support to employees who have faced violence. The policies and procedures shall be part of the employee's health and safety policy and written copies shall be provided to each employee. Prior to implementing any changes to these policies, the employer agrees to consult with the Association.
Security Practices Dell has implemented corporate information security practices and standards that are designed to safeguard the Dell’s corporate environment and to address: (1) information security; (2) system and asset management; (3) development; and (4) governance. These practices and standards are approved by the Dell CIO and undergo a formal review on an annual basis.