MEMO ON INFORMATION SAFETY REQUIREMENTS WHEN USING CLIENT Sample Clauses

MEMO ON INFORMATION SAFETY REQUIREMENTS WHEN USING CLIENT. BANK SYSTEM (compulsory for the persons who have the right to impose an Advanced Electronic Signature and/or Simple ES on payment documents and/or sign Certificate Requests on behalf of the Client, as well as for the persons responsible for the operation and administration of the computer(s) with the installed software Client-Bank System). The effectiveness and security of using the Client- Bank System to a large extent depends on the strict observance of information security requirements when operating the system. By providing the specified service, the Bank has created a convenient technology that provides reliable protection of company payments, provided that unauthorized access of third parties to the installed Client- Bank System, secret keys and security passwords, is prevented. The reasons for unauthorized access may be the direct physical access of unauthorized persons to the computer with installed Client- Bank System, computer can pick up viruses and Trojan programs. Factors contributing to the compromise of secret keys are the abandonment of the media with secret keys in computer USB ports by the end of work or the permanent storage of secret keys on its hard disk. For its part, the Bank takes all measures to prevent the potential threats to information security and recommends that the following safe working rules within the Client-Bank System should be followed: Basic rules: 1. Limit the access of third parties to the computer You are using for working with Client-Bank System. Ensure the security of the room where it is installed. 2. Limit the access of third parties to the mobile phone which is used for receiving one-time OTP-codes. Do not tell anyone one-time password. Remember that Bank’s managers can’t motivate/push Client to inform somebody about passwords, codes, requisites of payments etc, give recommendations about making payments for the benefit of third parties. Note! Bank doesn’t recommend to use mobile phone numbers without signing agreement with mobile service operator for receiving one-time OTP-codes. 3. Provide secure storage for the Secret Keys on external media (token, etc.). Do not store the Secret Key files on your computer's hard drive. Immediately after the operations with Secret Keys, disconnect their media from the computer, do not leave them permanently connected to the computer. 4 Use two signatures (two keys) from two separate computers to sign payment documents. 5. Periodically monitor the status of your current accou...
AutoNDA by SimpleDocs
MEMO ON INFORMATION SAFETY REQUIREMENTS WHEN USING CLIENT. BANK SYSTEM (compulsory for the persons who have the right to impose an Advanced Electronic Signature and/or Qualified ES and/or Simple ES on payment documents and/or sign Certificate Requests on behalf of the Client, as well as for the persons responsible for the operation and administration of the computer(s) with the installed software Client- Bank System). The effectiveness and security of using the Client- Bank System to a large extent depends on the strict observance of information security requirements when operating the system. By providing the specified service, the Bank has created a convenient technology that provides reliable protection of company payments, provided that unauthorized access of third parties to the installed Client- Bank System, secret keys and security passwords, is prevented.
MEMO ON INFORMATION SAFETY REQUIREMENTS WHEN USING CLIENT. BANK SYSTEM (compulsory for the persons who have the right to impose an Advanced Electronic Signature and/or Simple ES on payment
MEMO ON INFORMATION SAFETY REQUIREMENTS WHEN USING CLIENT. BANK SYSTEM (compulsory for the persons who have the right to impose an Advanced Electronic Signature and/or Simple ES on payment documents and/or sign Certificate Requests on behalf of the Client, as well as for the persons responsible for the operation and administration of the computer(s) with the installed software Client-Bank System). The effectiveness and security of using the Client- Bank System to a large extent depends on the strict observance of information security requirements when operating the system. By providing the specified service, the Bank has created a convenient technology that provides reliable protection of company payments, provided that unauthorized access of third parties to the installed Client- Bank System, secret keys and security passwords, is prevented. The reasons for unauthorized access may be the direct physical access of unauthorized persons to the computer with installed Client- Bank System, computer can pick up viruses and Trojan programs. Factors contributing to the compromise of secret keys are the abandonment of the media with secret keys in computer USB ports by the end of work or the permanent storage of secret keys on its hard disk.

Related to MEMO ON INFORMATION SAFETY REQUIREMENTS WHEN USING CLIENT

  • Insurance and Fingerprint Requirements Information Insurance If applicable and your staff will be on TIPS member premises for delivery, training or installation etc. and/or with an automobile, you must carry automobile insurance as required by law. You may be asked to provide proof of insurance. Fingerprint It is possible that a vendor may be subject to Chapter 22 of the Texas Education Code. The Texas Education Code, Chapter 22, Section 22.0834. Statutory language may be found at: xxxx://xxx.xxxxxxxx.xxxxx.xxxxx.xx.xx/ If the vendor has staff that meet both of these criterion: (1) will have continuing duties related to the contracted services; and (2) has or will have direct contact with students Then you have ”covered” employees for purposes of completing the attached form. TIPS recommends all vendors consult their legal counsel for guidance in compliance with this law. If you have questions on how to comply, see below. If you have questions on compliance with this code section, contact the Texas Department of Public Safety Non-Criminal Justice Unit, Access and Dissemination Bureau, FAST-FACT at XXXX@xxxxx.xxxxx.xx.xx and you should send an email identifying you as a contractor to a Texas Independent School District or ESC Region 8 and TIPS. Texas DPS phone number is (000) 000-0000. See form in the next attribute to complete entitled: Texas Education Code Chapter 22 Contractor Certification for Contractor Employees

  • Provisions for Covered Entity to Inform Business Associate of Privacy Practices and Restrictions (a) Covered Entity shall notify Business Associate of any limitation(s) in the notice of privacy practices of Covered Entity under 45 CFR 164.520, to the extent that such limitation may affect Business Associate’s use or disclosure of protected health information.

  • Safety Requirements 18.1.1 The Concessionaire shall comply with the provisions of this Agreement, Applicable Laws and Applicable Permits and conform to Good Industry Practice for securing the safety of the Users. In particular, the Concessionaire shall develop, implement and administer a surveillance and safety program for providing a safe environment on or about the Project, and shall comply with the safety requirements set forth in Schedule-L (the “Safety Requirements”).

  • Expenditure on Safety Requirements All costs and expenses arising out of or relating to Safety Requirements shall be borne by the Concessionaire to the extent such costs and expenses form part of the works and services included in the Scope of the Project, and works and services, if any, not forming part of the Scope of the Project shall be undertaken in accordance with the provisions of Article 16. Costs and expenses on works and services not covered hitherto before and arising out of Safety Requirements shall, subject to the provisions of Clause 16.3.2, be borne from out of a dedicated safety fund (the “Safety Fund”) to be funded, owned and operated by the Authority or a substitute thereof.

  • Information Technology Accessibility Standards Any information technology related products or services purchased, used or maintained through this Grant must be compatible with the principles and goals contained in the Electronic and Information Technology Accessibility Standards adopted by the Architectural and Transportation Barriers Compliance Board under Section 508 of the federal Rehabilitation Act of 1973 (29 U.S.C. §794d), as amended. The federal Electronic and Information Technology Accessibility Standards can be found at: xxxx://xxx.xxxxxx-xxxxx.xxx/508.htm.

  • Health and Safety Requirements The Contractor and his subcontractors ensure at all times compliance with safety regulations imposed by any Act of Parliament, ordinance or any regulation or by¬law of any local or statutory authority. Occupational Health and Safety Act (Act of 1993-Section 37) The Contractor shall comply with:  The Occupational Health and Safety Xxx, 0000, and all Regulations made there under;  All Eskom Safety and Operating Procedures listed in this Works Information. The Contractor acknowledges that it is fully aware of the requirements of all the above and undertakes to employ only people who have been duly authorised in terms thereof and who have received sufficient training to ensure that they can comply therewith. The Contractor undertakes not to do, or not to allow anything to be done which will contravene any of the provisions of the Act, Regulations or Safety and Operating Procedures. The Contractor shall appoint a person who will liaise with the Eskom Safety Officer responsible for the premises relevant to this contract. The person so appointed shall, on request:  Supply the Eskom Safety Officer with copies of minutes of all Health and Safety Committee meetings, whenever he is required to do so;  Supply the Eskom Safety Officer with copies of all appointments in respect of employees employed on this contract, in terms of the Act and Regulations and shall advise the Eskom Safety Officer of any changes thereto. Eskom may, at any stage during the currency of this agreement, be entitled to:  Do safety audits at the Contractor’s premises, its work-places and on its employees;  Refuse any employee, sub-contractor or agent of the Contractor access to its premises if such person has been found to commit any unlawful act or any unsafe working practice or is found to be not authorised or qualified in terms of the Act;

  • Electronic and Information Resources Accessibility and Security Standards a. Applicability: The following Electronic and Information Resources (“EIR”) requirements apply to the Contract because the Grantee performs services that include EIR that the System Agency's employees are required or permitted to access or members of the public are required or permitted to access. This Section does not apply to incidental uses of EIR in the performance of the Agreement, unless the Parties agree that the EIR will become property of the State of Texas or will be used by HHSC’s clients or recipients after completion of the Agreement. Nothing in this section is intended to prescribe the use of particular designs or technologies or to prevent the use of alternative technologies, provided they result in substantially equivalent or greater access to and use of a Product.

  • CERTIFICATION PROHIBITING DISCRIMINATION AGAINST FIREARM AND AMMUNITION INDUSTRIES (Texas law as of September 1, 2021) By submitting a proposal to this Solicitation, you certify that you agree, when it is applicable, to the following required by Texas law as of September 1, 2021: If (a) company is not a sole proprietorship; (b) company has at least ten (10) full-time employees; (c) this contract has a value of at least $100,000 that is paid wholly or partly from public funds; (d) the contract is not excepted under Tex. Gov’t Code § 2274.003 of SB 19 (87th leg.); and (e) governmental entity has determined that company is not a sole-source provider or governmental entity has not received any bids from a company that is able to provide this written verification, the following certification shall apply; otherwise, this certification is not required. Pursuant to Tex. Gov’t Code Ch. 2274 of SB 19 (87th session), the company hereby certifies and verifies that the company, or association, corporation, partnership, joint venture, limited partnership, limited liability partnership, or limited liability company, including a wholly owned subsidiary, majority-owned subsidiary parent company, or affiliate of these entities or associations, that exists to make a profit, does not have a practice, policy, guidance, or directive that discriminates against a firearm entity or firearm trade association and will not discriminate during the term of this contract against a firearm entity or firearm trade association. For purposes of this contract, “discriminate against a firearm entity or firearm trade association” shall mean, with respect to the entity or association, to: “(1) refuse to engage in the trade of any goods or services with the entity or association based solely on its status as a firearm entity or firearm trade association; (2) refrain from continuing an existing business relationship with the entity or association based solely on its status as a firearm entity or firearm trade association; or (3) terminate an existing business relationship with the entity or association based solely on its status as a firearm entity or firearm trade association. See Tex. Gov’t Code § 2274.001(3) of SB 19. “Discrimination against a firearm entity or firearm trade association” does not include: “(1) the established policies of a merchant, retail seller, or platform that restrict or prohibit the listing or selling of ammunition, firearms, or firearm accessories; and (2) a company’s refusal to engage in the trade of any goods or services, decision to refrain from continuing an existing business relationship, or decision to terminate an existing business relationship to comply with federal, state, or local law, policy, or regulations or a directive by a regulatory agency, or for any traditional business reason that is specific to the customer or potential customer and not based solely on an entity’s or association’s status as a firearm entity or firearm trade association.” See Tex. Gov’t Code § 2274.001(3) of SB 19.

  • Contact Information for Privacy and Security Officers and Reports 2.1 Business Associate shall provide, within ten (10) days of the execution of this Agreement, written notice to the Contract or Grant manager the names and contact information of both the HIPAA Privacy Officer and HIPAA Security Officer of the Business Associate. This information must be updated by Business Associate any time these contacts change.

  • Confidentiality and Safeguarding of University Records; Press Releases; Public Information Under this Agreement, Contractor may (1) create, (2) receive from or on behalf of University, or (3) have access to, records or record systems (collectively, University Records). Among other things, University Records may contain social security numbers, credit card numbers, or data protected or made confidential or sensitive by Applicable Laws. [Option (Include if University Records are subject to FERPA.): Additional mandatory confidentiality and security compliance requirements with respect to University Records subject to the Family Educational Rights and Privacy Act, 20 United States Code (USC) §1232g (FERPA) are addressed in Section 12.41.] [Option (Include if University is a HIPAA Covered Entity and University Records are subject to HIPAA.): Additional mandatory confidentiality and security compliance requirements with respect to University Records subject to the Health Insurance Portability and Accountability Act and 45 Code of Federal Regulations (CFR) Part 160 and subparts A and E of Part 164 (collectively, HIPAA) are addressed in Section 12.26.] Contractor represents, warrants, and agrees that it will: (1) hold University Records in strict confidence and will not use or disclose University Records except as (a) permitted or required by this Agreement, (b) required by Applicable Laws, or (c) otherwise authorized by University in writing; (2) safeguard University Records according to reasonable administrative, physical and technical standards (such as standards established by the National Institute of Standards and Technology and the Center for Internet Security [Option (Include if Section 12.39 related to Payment Card Industry Data Security Standards is not include in this Agreement.):, as well as the Payment Card Industry Data Security Standards]) that are no less rigorous than the standards by which Contractor protects its own confidential information; (3) continually monitor its operations and take any action necessary to assure that University Records are safeguarded and the confidentiality of University Records is maintained in accordance with all Applicable Laws and the terms of this Agreement; and (4) comply with University Rules regarding access to and use of University’s computer systems, including UTS165 at xxxx://xxx.xxxxxxxx.xxx/board-of-regents/policy-library/policies/uts165-information-resources-use-and-security-policy. At the request of University, Contractor agrees to provide University with a written summary of the procedures Contractor uses to safeguard and maintain the confidentiality of University Records.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!