Media Protection Sample Clauses

Media Protection. Supplier will, as applicable to the Services provided: a. Protect information system media, both paper and digital, including encrypting data at rest stored on portable media (e.g. USB drives, removable hard drives). b. Restrict access to media related to Verizon services performed under this Agreement. Access to such media will be granted in accordance with these Requirements. c. Label media containing Verizon data commensurate with the highest confidentiality level of data contained. EA-5 Baseline Security Requirements For Verizon Suppliers d. When (a) directed by Verizon, or (b) unless specifically otherwise required by law or directed by Verizon, upon conclusion or termination of Supplier’s work for Verizon or when no longer required for the performance of work under an Agreement, Supplier will Sanitize (or at Verizon’s election return to Verizon) all copies of all Verizon Confidential Information, including all backup and archival copies, in any electronic or non-electronic form. e. All hardcopy documents will be cross-cut shredded. f. Maintain records for all media that have been destroyed, sanitized or returned to Verizon. Records will be maintained for a minimum of four (4) years and made available to Verizon for inspection upon request.
AutoNDA by SimpleDocs
Media Protection. Supplier must: a. Protect information system media, both paper and digital, including encrypting data at rest stored on portable media (e.g. USB drives, removable hard drives). b. Restrict access to media related to Verizon services performed under this Agreement. Access to such media must be granted in accordance with these Requirements. c. Label media containing Verizon data commensurate with the highest confidentiality level of data contained. d. When (a) directed by Verizon, or (b) unless specifically otherwise required by law or directed by Verizon, upon conclusion or termination of Supplier’s work for Verizon or when no longer required
Media Protection. Supplier must:
Media Protection. UNM will ensure that coaches and other Athletics Department personnel shall not make weekly media appearances on shows that are produced or broadcast by non- affiliated distributors, except for excerpts from press conferences open to the media.
Media Protection. The Contractor must implement measures to provide physical and environmental protection and accountability for tapes, diskettes, printouts, and other media containing Department of Treasury’s personal, confidential and sensitive information to prevent the loss of confidentiality, integrity, or availability of information including data or software, when stored outside the system. This can include storage of information before it is input to the system and after it is output.  The Contractor must ensure that only authorized users have access to information in printed form or on digital media removed from the information system, physically control and securely store information media, both paper and digital, restrict the pickup, receipt, transfer, and delivery of such media to authorized personnel.
Media Protection. As a matter of policy, media containing confidential information must be encrypted and access to the media restricted to authorized personnel. Media that is transported must be encrypted. Where encryption is not feasible/practical, the media must only be transferred by an authorized Pearson employee; or by an approved commercial courier that assures complete, documented chain of custody during the entire transportation process. As a matter of policy, media sanitization is required prior to the transfer of ownership, discarding, scrapping, or repurposing. Sanitization methods must make the data unrecoverable by any means. PE – Physical and Environmental Protection Physical and environmental protections are, in large measure, the purview of our hosting services provider, AWS. Since the systems are hosted in the AWS cloud, no information technology equipment that is critical to the operation of our applications are hosted outside of AWS. AWS datacenters are hosted in secure, undisclosed locations. More information about AWS security certifications and compliance can be found at: xxxx://xxx.xxxxxx.xxx/compliance/programs and xxxxx://xxx.xxxxxx.xxx/compliance/data-center/data-centers/. Regarding Pearson facilities, access is controlled by security guards at the main entrances and/or proximity ID badges. Visitors are required to sign-in, provide a picture ID to verify identity, and are escorted at all times by Pearson personnel. Video cameras monitor secure areas of the facility, in addition to entrance/exit points to the facilities. PL – Planning Information security planning is embodied in Xxxxxxx’x Information Security Management and Governance Policy, which, among many other things, requires system architecture standards; security requirements definition activities on projects; policy documentation creation, maintenance, and dissemination; and a process for handling exceptions to security requirements for those situations where it is not feasible or practical to implement them. Security exceptions are reviewed and, based on risk, dispositioned by senior leadership. PS – Personnel Security Prior to being hired or otherwise engaged as contractors, personnel must submit to a criminal background check, in addition to rigorous interview- and credentials-based review. Upon termination, access to systems is promptly removed. Where members of the workforce change positions and job responsibilities, access and permissions are adjusted accordingly. All employees are r...
Media Protection.  Protect information system media, both paper and digital; limit access to information on information system media to authorized users; and sanitize or destroy information system media no longer needed.
AutoNDA by SimpleDocs
Media Protection. Identify and describe the approach for planned and existing implementation of media protection (MP) security controls. Associated SOWs: SR5.5.5, SR5.8.51, SR5.8.52
Media Protection 

Related to Media Protection

  • Data Protection All personal data contained in the agreement shall be processed in accordance with Regulation (EC) No 45/2001 of the European Parliament and of the Council on the protection of individuals with regard to the processing of personal data by the EU institutions and bodies and on the free movement of such data. Such data shall be processed solely in connection with the implementation and follow-up of the agreement by the sending institution, the National Agency and the European Commission, without prejudice to the possibility of passing the data to the bodies responsible for inspection and audit in accordance with EU legislation (Court of Auditors or European Antifraud Office (XXXX)). The participant may, on written request, gain access to his personal data and correct any information that is inaccurate or incomplete. He/she should address any questions regarding the processing of his/her personal data to the sending institution and/or the National Agency. The participant may lodge a complaint against the processing of his personal data with the [national supervising body for data protection] with regard to the use of these data by the sending institution, the National Agency, or to the European Data Protection Supervisor with regard to the use of the data by the European Commission.

  • Whistleblower Protection Notwithstanding anything to the contrary contained herein, no provision of this Agreement shall be interpreted so as to impede the Employee (or any other individual) from reporting possible violations of federal law or regulation to any governmental agency or entity, including but not limited to the Department of Justice, the Securities and Exchange Commission, the Congress, and any agency Inspector General, or making other disclosures under the whistleblower provisions of federal law or regulation. The Employee does not need the prior authorization of the Company to make any such reports or disclosures and the Employee shall not be not required to notify the Company that such reports or disclosures have been made.

  • Privacy and Data Protection 8.1 The Receiving Party undertakes to comply with South Africa’s general privacy protection in terms Section 14 of the Xxxx of Rights in connection with this Bid and shall procure that its personnel shall observe the provisions of such Act [as applicable] or any amendments and re-enactments thereof and any regulations made pursuant thereto.

  • Cybersecurity; Data Protection To the Company’s knowledge, the Company and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (collectively, the “Personal Data”)) used in connection with their businesses, and there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same, except in each case as would not reasonably be expected to have a Material Adverse Effect. The Company and its subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification.

  • Whistleblower Protections and Trade Secrets Notwithstanding anything to the contrary contained herein, nothing in this Agreement prohibits Executive from reporting possible violations of federal law or regulation to any United States governmental agency or entity in accordance with the provisions of and rules promulgated under Section 21F of the Securities Exchange Act of 1934 or Section 806 of the Xxxxxxxx-Xxxxx Act of 2002, or any other whistleblower protection provisions of state or federal law or regulation (including the right to receive an award for information provided to any such government agencies). Furthermore, in accordance with 18 U.S.C. § 1833, notwithstanding anything to the contrary in this Agreement: (i) Executive shall not be in breach of this Agreement, and shall not be held criminally or civilly liable under any federal or state trade secret law (x) for the disclosure of a trade secret that is made in confidence to a federal, state, or local government official or to an attorney solely for the purpose of reporting or investigating a suspected violation of law, or (y) for the disclosure of a trade secret that is made in a complaint or other document filed in a lawsuit or other proceeding, if such filing is made under seal; and (ii) if Executive files a lawsuit for retaliation by the Company for reporting a suspected violation of law, Executive may disclose the trade secret to Executive’s attorney, and may use the trade secret information in the court proceeding, if Executive files any document containing the trade secret under seal, and does not disclose the trade secret, except pursuant to court order.

  • Cybersecurity and Data Protection The Company and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are reasonably believed by the Company to be adequate in all material respects for, and operate and perform as required in connection with, the operation of the business of the Company and its Subsidiaries as currently conducted and, to the Company’s knowledge, are free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants, except as would not individually or in the aggregate reasonably be expected to result in a Material Adverse Effect. The Company and its Subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (“Personal Data”)) used in connection with the business of the Company and its Subsidiaries as currently conducted, and, to the knowledge of the Company, there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same, except for such failures as would not individually or in the aggregate reasonably be expected to result in a Material Adverse Effect. The Company and its Subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification, except for such failures as would not individually or in the aggregate reasonably be expected to result in a Material Adverse Effect.

  • Anti-Dilution Protection In the event that the Company consummates a sale of Common Stock for cash consideration (a “Financing”) prior to January 1, 2018 (such applicable period, the “Anti-Dilution Period”), and the price per share of such Common Stock shares sold in such Financing (the “Per Share Price”) is less than $0.15 per share (the “Anti-Dilution Price”)(each as adjusted for stock splits, dividends, recapitalizations and the like), the Subscriber who purchased Shares hereunder shall receive such additional number of Shares equal to (i) the aggregate Purchase Price paid by the Subscriber, divided by (ii) the price that Common Stock was sold at in the Financing (or any subsequent Financing where the Per Share Price is less than the prior Anti-Dilution Price), minus (iii) the total aggregate Shares issued to the Subscriber at the time of his, her or its entry into this Agreement plus any additional Shares previously issued to the Subscriber pursuant to the terms of this Section H. Each time that additional Shares are issued to the Subscriber under this Section H, the “Anti-Dilution Price” shall be deemed to reset and equal the lowest Per Share Price for all Financings to date through the Anti-Dilution Period, immediately after such applicable issuance of Shares. Notwithstanding the above, no Shares will be issued to the Subscriber pursuant to this Section H and no anti-dilution rights hereunder will apply (i) upon the exercise of any warrants, options or convertible securities granted, issued and outstanding on the date of this Agreement; (ii) upon the grant or exercise of any stock or options which may hereafter be granted or exercised under any employee benefit plan, stock option plan or restricted stock plan of the Company now existing or to be implemented in the future; (iii) upon the issuance of any securities in connection with an acquisition by the Company; (iv) upon the issuance of any securities pursuant to a commitment by the Company that has been previously disclosed prior to the date hereof; (v) in connection with any public offering of securities; (vi) in connection with the sale, exercise or conversion of any convertible securities, warrants or options; or (vii) in connection with the issuance of shares of Common Stock other than for cash consideration.

  • PATENT PROTECTION The vendor agrees to indemnify and defend the State of New Hampshire from alleged and actual patent infringements and further agrees to hold the State of New Hampshire harmless from any liability arising under RSA 382- A:2-312(3). (Uniform Commercial Code).

  • Fire Protection Contractor shall take adequate and reasonable precautions to protect the Work against damage by fire and smoke. For example, without limitation, Contractor shall do the following:

  • Privacy Act If performance involves design, development or operation of a system of records on individuals, this Agreement incorporates by reference FAR 52.224-1 Privacy Act Notification (Apr 1984) and FAR 52.224-2 Privacy Act (Apr 1984).

Time is Money Join Law Insider Premium to draft better contracts faster.