Internal Security Policies Sample Clauses

Internal Security Policies. Vendor shall include in its Information Security Safeguards privacy and information security policies in accordance with ISO/IEC 27001:2013 that address the roles and responsibilities of Vendor employees and Vendor Representatives, including both technical and non-technical personnel, who have direct or indirect access to The Hartford Data. Vendor shall document its Information Security Safeguards and keep them current in light of changes in applicable law and best practices.. Vendor information security policies must at a minimum cover: Information Security Policy; Organization of Information Security; Human Resources Security; Asset Management; Access Control; Cryptography;
AutoNDA by SimpleDocs
Internal Security Policies. The Seller must comply with Xxxxx’s Internal Industrial Security Guidelines when performing work at Buyer’s facility. It is the Seller’s obligation to request the guidelines from Buyer. 24.3.1 The Seller must respect at all times, within Buyer’s plant or on the outside of it, the maximum speed limits set forth by Buyer. The maximum speed limit inside Buyer’s plant is of 20 km/h, and around the plant is of 40 km/h. The breach of this Clause will cause the termination of the Purchase Order. 24.3.2 The Seller is liable for the security of its employees, agents, workers, and/or subordinates. The Seller must establish and reinforce adequate security measures, health and work processes for the executed works, and comply with all applicable security laws and regulations. 24.3.3 Any injury must be immediately reported to Xxxxx’s Shift Manager, as well as to the Security Manager of the facility, together with a complete report of the accident. The Seller must also notify the person who authorized the Order within 24 (twenty four) hours of the injury. 24.3.4 The Seller must use all the necessary methods to adequately protect its personnel and Buyer’s property and adjacent places from any damages, and will indemnify and hold harmless Buyer from all the damages that are caused to its personnel, property, or adjacent places. 24.3.5 The Seller will be liable of any losses caused by its employees, agents, or direct or indirect representatives as a consequence of their acts or omissions during the performance of the services to Buyer or any third party. 24.3.6 The Seller and its employees, agents, and representatives must comply with applicable laws, norms, and rulings, and will indemnify Buyer for any damage caused by its failure to do so. 24.3.7 The Seller must leave its worksite clean and orderly. If the Seller has accumulated trash or debris, the Seller is responsible for disposing of it by the end of each work day. 24.3.8 If the Seller intends to use hazardous materials in delivery of the equipment or performance of the services, such materials should be identified in the specifications or Order and the Seller is responsible for the use, management, handling, and disposal of such hazardous materials and the damage that they may cause.

Related to Internal Security Policies

  • Security Policies IBM maintains privacy and security policies that are communicated to IBM employees. IBM requires privacy and security training to personnel who support IBM data centers. We have an information security team. IBM security policies and standards are reviewed and re-evaluated annually. IBM security incidents are handled in accordance with a comprehensive incident response procedure.

  • Security Policy As part of PCI DSS, the Card Organizations require that you have a security policy that covers the security of credit card information.

  • Blanket Policies Notwithstanding anything to the contrary in this Section 6.03, any insurance which Lessee is required to obtain pursuant to this Section 6.03 may be carried under a “blanket” policy or policies covering other properties or liabilities of Lessee provided that such “blanket” policy or policies otherwise comply with the provisions of this Section 6.03.

  • Internal Accounting and Disclosure Controls The Company and each of its Subsidiaries maintains internal control over financial reporting (as such term is defined in Rule 13a-15(f) under the 0000 Xxx) that is effective to provide reasonable assurance regarding the reliability of financial reporting and the preparation of financial statements for external purposes in accordance with generally accepted accounting principles, including that (i) transactions are executed in accordance with management’s general or specific authorizations, (ii) transactions are recorded as necessary to permit preparation of financial statements in conformity with generally accepted accounting principles and to maintain asset and liability accountability, (iii) access to assets or incurrence of liabilities is permitted only in accordance with management’s general or specific authorization and (iv) the recorded accountability for assets and liabilities is compared with the existing assets and liabilities at reasonable intervals and appropriate action is taken with respect to any difference. The Company maintains disclosure controls and procedures (as such term is defined in Rule 13a-15(e) under the 0000 Xxx) that are effective in ensuring that information required to be disclosed by the Company in the reports that it files or submits under the 1934 Act is recorded, processed, summarized and reported, within the time periods specified in the rules and forms of the SEC, including, without limitation, controls and procedures designed to ensure that information required to be disclosed by the Company in the reports that it files or submits under the 1934 Act is accumulated and communicated to the Company’s management, including its principal executive officer or officers and its principal financial officer or officers, as appropriate, to allow timely decisions regarding required disclosure. Neither the Company nor any of its Subsidiaries has received any notice or correspondence from any accountant or other Person relating to any potential material weakness or significant deficiency in any part of the internal controls over financial reporting of the Company or any of its Subsidiaries.

  • Safety Policy The City agrees to maintain in safe working condition all facilities and equipment furnished by the City to carry out the duties of each bargaining unit position, but reserves the right to determine what those facilities and equipment shall be. The Association agrees to work cooperatively in maintaining safety in the Xenia/Xxxxxx Central Communications Center.

  • Compliance Policies and Procedures To assist the Fund in complying with Rule 38a-1 of the 1940 Act, BBH&Co. represents that it has adopted written policies and procedures reasonably designed to prevent violation of the federal securities laws in fulfilling its obligations under the Agreement and that it has in place a compliance program to monitor its compliance with those policies and procedures. BBH&Co will upon request provide the Fund with information about our compliance program as mutually agreed.

  • Safeguards Monitoring and Reporting The Borrower shall do the following or cause the Project Executing Agency to do the following:

  • Contractor and Employee Security Precautions The security aspects of working at the Correctional Facility are critical. The following security precautions are part of the site conditions and are a part of this Contract. All persons coming on the site in any way connected with this Work shall be made aware of them, and it is the (General) Contractor’s responsibility to check and enforce them.

  • Violence Policies and Procedures The Employer agrees to have in place explicit policies and procedures to deal with violence. The policy will address the prevention of violence, the management of violent situations, provision of legal counsel and support to employees who have faced violence. The policies and procedures shall be part of the employee's health and safety policy and written copies shall be provided to each employee. Prior to implementing any changes to these policies, the employer agrees to consult with the Association.

  • Security Practices Dell has implemented corporate information security practices and standards that are designed to safeguard the Dell’s corporate environment and to address: (1) information security; (2) system and asset management; (3) development; and (4) governance. These practices and standards are approved by the Dell CIO and undergo a formal review on an annual basis.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!