Security Cameras Security cameras have been installed throughout the Facility; however, they will not routinely be used in areas where there is an expectation of privacy, such as restrooms or patient care areas.
Credit Cards About 60% of first-year students reported they have at least one credit card, although just 15% have two or more cards. Among those students who have credit cards, about 88% reported they pay off their balance each month and, as such, their current credit card balance is zero; however, when asked what their current credit card balance is, just 7% said it is zero. Among those with an unpaid balance, the average credit card debt students have is $1,549. Group 1 students tend to carry a higher balance on their credit cards than Group 2 and Group 3 students. None 40% 42% 45% 32% 42% One 45% 42% 42% 50% 47% Two 7% 6% 6% 8% 5% Three or more 8% 10% 7% 9% 7% Average number 1.8 2.8 1.2 2.2 1.4 Yes 88% 83% 88% 89% 88% Zero 7% 2% 14% 2% 7% $500 or less 83% 83% 79% 87% 79% $501 to $1,000 5% 7% 4% 6% 6% Over $1,000 5% 8% 4% 6% 7% Average (all with credit card) $487 $652 $352 $564 $2,208 Average (those with unpaid balance) $1,549 $1,954 $1,249 $1,648 $4,801 * Total credit card balance and payment of the balance were asked of those who had at least one credit card.
Operator’s Security Contact Information Xxxxxxx X. Xxxxxxx Named Security Contact xxxxxxxx@xxxxxxxxx.xxx Email of Security Contact (000) 000-0000 Phone Number of Security Contact
Security of Vendor Facilities All Vendor and Vendor Staff facilities in which Citizens Confidential Information is located or housed shall be maintained in a reasonably secure manner. Within such facilities, all printed materials containing Citizens Confidential Information should be kept locked in a secure office, file cabinet, or desk (except when materials are being used).
Security Services CONTRACTOR shall provide security services designed for preventing escapes, maintaining order, providing care, custody, control, supervision and management of the inmate population. A successful security program depends heavily on staff training, effective administration, and the establishment of inmate programs. The organization, staffing, and administration of the security program are vital to the Facility. The direction provided by a well-organized and clearly articulated operations manual, and emergency planning provides a solid base for successful administration. The final operations manual shall be submitted to the Bureau prior to the Service Commencement Date and shall be reviewed annually and updated as needed. Documentation of the review shall be provided annually to the On- Site Contract Monitor. Changes to the plan require written permission by the Contract Manager. The Department reserves the right to require changes to plans submitted to the Bureau.
Credit Card If you choose to pay by credit card, you will be prompted to provide your credit card information and will be presented with a screen that reflects the amount of your subscription, the amount of fees that would be charged by the credit card issuer for the transaction and the total amount payable.
Security Systems The Service may not be compatible with security systems. You may be required to maintain a telephone connection through your local exchange carrier in order to use any alarm monitoring functions for any security system installed in your home or business. You are responsible for contacting the alarm monitoring company to test the compatibility of any alarm monitoring or security system with the Service.
Cards 2.1 The Card is a prepaid payment card which may be used to pay for goods and services at participating retailers that accept prepaid Visa cards. The physical card may be used in shops and retail locations where the Cardholder is physically present or for online and other distance purchases. Your Card cannot be used to make cash withdrawals from ATMs and banks. Like any Card, We cannot guarantee that a particular retailer will accept the Card – Cardholders should check with the retailer before attempting the transaction if unsure. The Cardholder will not be able to use the Card to make any purchases from some retailers; such retailers have been blocked by Our systems in order to prevent the potential use of cards for unauthorised or unlawful activity. 2.2 The Card is an electronic money (“e-money”) product, regulated by the Financial Services Commission (“FSC”), Gibraltar. It is a prepaid card not a credit card and is not linked to Your bank account. You must ensure that You have sufficient Available Funds in the Master Wallet for the Cardholder to pay for each purchase or payment using the Card. The Card is intended for use as a means of payment, and funds loaded onto the Card do not constitute a deposit. You will not earn interest on the balance of the Card. The Card will expire on the Expiry Date and will cease to work. Please check clause 8 of this Agreement for further information. 2.3 The electronic money associated with the Card is issued by IDTFS to You. 2.4 When the Cardholder receives the Card, it will be issued in an inactive state. The Cardholder will need to activate it by logging onto Our Website, in Your personal login area (“Online Account Centre”) and then following the login and activation request for the Card prior to use. The Card will normally be ready for use one hour after activation. If the Cardholder does not activate the Card, any transactions that the Cardholder attempts to carry out may be declined.
Information Security Program (1) DTI shall implement and maintain a comprehensive written information security program applicable to the Personal Information ("Information Security Program") which shall include commercially reasonable measures, including, as appropriate, policies and procedures and technical, physical, and administrative safeguards that are consistent with industry standards, providing for (i) the security and confidentiality of the Personal Information, (ii) protection of the Personal Information against reasonably foreseeable threats or hazards to the security or integrity of the Personal Information, (iii) protection against unauthorized access to or use of or loss or theft of the Personal Information, and (iv) appropriate disposal of the Personal Information. Without limiting the generality of the foregoing, the Information Security Program shall provide for (i) continual assessment and re-assessment of the risks to the security of Personal Information acquired or maintained by DTI and its agents, contractors and subcontractors in connection with the Services, including but not limited to (A) identification of internal and external threats that could result in unauthorized disclosure, alteration or destruction of Personal Information and systems used by DTI and its agents, contractors and subcontractors, (B) assessment of the likelihood and potential damage of such threats, taking into account the sensitivity of such Personal Information, and (C) assessment of the sufficiency of policies, procedures, information systems of DTI and its agents, contractors and subcontractors, and other arrangements in place, to control risks; and (ii) appropriate protection against such risks. (2) The Information Security Program shall require encryption of any Personal Information in electronic format while in transit or in storage, and enhanced controls and standards for transport and disposal of physical media containing Personal Information. DTI shall, and shall require its agents, contractors and subcontractors who access or use Personal Information or Confidential Information to, regularly test key controls, systems and procedures relating to the Information Security Program ("ISP Tests"). DTI shall advise the Funds of any material issues identified in the ISP Tests potentially affecting the Information Security Program. (3) DTI shall comply with its Information Security Program.
Removable media devices All electronic files that contain DHCS PHI or PI data must be encrypted when stored on any removable media or portable device (i.e. USB thumb drives, floppies, CD/DVD, smartphones, backup tapes etc.). Encryption must be a FIPS 140-2 certified algorithm which is 128bit or higher, such as AES.