Organisational Security Sample Clauses

Organisational Security. 2.1 The Data Processor has implemented the following organisational security measures: (a) All employees of the Data Processor are subject to confidentiality obligations that apply to all processing of Personal Data. (b) The employee access to Personal Data is limited, so that only the relevant employees have access to the necessary Personal Data. (c) The employees of the Data Processor that have access to personal data or critical IT systems have undergone a security clearance before they were employed. (d) The processing of Personal Data done by the employees of the Data Processor is logged and can be checked as required. (e) The Data Processor has documentable process descriptions for the processing of Personal Data. (f) The Data Processor has an IT security policy. (g) The Data Processor has established procedures that ensure proper deletion or continuous confidentiality when hardware is repaired, serviced or disposed.
AutoNDA by SimpleDocs
Organisational Security. It is the responsibility of the individuals across ForgeRock’s organisation to comply with these practices and standards. To facilitate the corporate adherence to these practices and standards, the function of information security provides:
Organisational Security. The Platform Admin role on the Fabo Learning Platform is only given to two parties. The first party is staff in Fabo Learning Lab and only to staff that need it in order to complete their tasks related to their work on the platform. The second party is the developer from our service pro- vider, with whom we have a Data Processing Agreement in place.‌ Any other role (e.g. Organisational Learning Manager), is only given to specific people upon re- quest from the Member Organisation. In this section, we describe the relevant security settings employed on the Fabo Learning Plat- form. We have taken a point of departure in Google’s “Web application security questionnaire” as it encompasses the central elements relevant to the security on the platform. HTTPS: The web application is reachable exclusively over HTTPS. Even if the user manually edits the URL to start with http://, it won't work, or it will redirect to https://‌ Cookies: As there is no sensitive information in our cookie data, they have not been decorated with the “htttpOnly” special key mechanism.
Organisational Security. (a) Responsibility – Paperform will assign responsibility for information security management to appropriately skilled personnel. (b) ‘Need to Know’ Access – Paperform will restrict access to information systems used in connection with the Services to personnel who are reliable, have sufficient technical expertise for the role assigned and know his or her obligations.
Organisational Security. 1. When media are to be disposed of or reused, procedures must be implemented to prevent any subsequent retrieval of any Seagate Personal Information stored on them before they are withdrawn from the inventory. When media are to leave the premises at which the files are located as a result of maintenance operations, procedures must be implemented to prevent undue retrieval of Seagate Personal Information stored on them. 2. The Supplier must implement security policies and procedures to classify Sensitive Information assets, clarify security responsibilities and promote awareness for employees. 3. All Seagate Personal Information security incidents must be managed in accordance with appropriate incident response procedures. 4. Supplier must encrypt, using industry-standard encryption tools, all Sensitive Information in transit and at rest.
Organisational Security. The Supplier adopts TNT’s security policy. TNT’s Corporate Security department is responsible for an active and passive approach of incidents and risks, which can then be managed in a controlled manner. The department actively advises TNT Management on controlling incidents and risks. The employees working within Corporate Security and those security managers in the various countries reporting into Corporate Security, are responsible for registering and reporting on incidents so that preventative actions can be taken.
Organisational Security. 2.1 The Data Processor has implemented the following organisational security measures: a) All employees of the Data Processor are subject to confidentiality obligations that apply to all processing of Personal Data. b) The employee access to Personal Data is limited, so that only the relevant employees have access to the necessary Personal Data. c) The Data Processor has an IT security policy. d) The Data Processor has established procedures that ensure proper deletion or continuous confidentiality when hardware is repaired, serviced or disposed.
AutoNDA by SimpleDocs
Organisational Security. The Data Importer will implement security policies and procedures to classify sensitive information assets, clarify security responsibilities and promote awareness for employees. Incident Management. The Data Importer maintains an information security incident management program that provides timely response and notification as appropriate to security incidents to protect personal data.

Related to Organisational Security

  • Organizational Security It is the responsibility of the individuals across the organization to comply with these practices and standards. To facilitate the corporate adherence to these practices and standards, the function of information security provides:

  • National Security 28.01 The Canadian government, either directly or through its agencies, may instruct the Employer with respect to the security of information and materials and the personnel permitted to do certain work. The Union recognizes that the Employer is obliged to meet such instructions and that for such reason the Employer may refuse certain Employees access to the work or may transfer Employees covered by such instructions.

  • Additional Security This guarantee is in addition to and is not in any way prejudiced by any other guarantee or security now or subsequently held by any Finance Party.

  • Personnel Security 6.1 Staff recruitment in accordance with government requirements for pre- employment checks; 6.2 Staff training and awareness of Departmental security and any specific contract requirements.

  • Safety; Security Contractor’s failure to comply with any of the requirements in this Section shall be cause for termination.

  • Technical Security Controls 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.

  • Further Assurances; Additional Security (a) Execute any and all further documents, financing statements, agreements and instruments, and take all such further actions (including the filing and recording of financing statements, fixture filings, Mortgages and other documents), that the Administrative Agent may reasonably request (including, without limitation, those required by applicable law), to satisfy the Collateral and Guarantee Requirement and to cause the Collateral and Guarantee Requirement to be and remain satisfied, all at the expense of the Loan Parties and provide to the Collateral Agent, from time to time upon reasonable request by the Administrative Agent, evidence reasonably satisfactory to the Administrative Agent as to the perfection and priority of the Liens created or intended to be created by the Security Documents. (b) If any asset (other than Real Property) that has an individual fair market value (as determined in good faith by the Borrower) in an amount greater than $10,000,000 is acquired by the Borrower or any Subsidiary Loan Party after the Closing Date or owned by an entity at the time it becomes a Subsidiary Loan Party (in each case other than (x) assets constituting Collateral under a Security Document that become subject to the Lien of such Security Document upon acquisition thereof and (y) assets constituting Excluded Property), the Borrower or such Subsidiary Loan Party, as applicable, will (i) notify the Collateral Agent of such acquisition or ownership and (ii) cause such asset to be subjected to a Lien (subject to any Permitted Liens) securing the Obligations by, and take, and cause the Subsidiary Loan Parties to take, such actions as shall be reasonably requested by the Administrative Agent to grant and perfect such Liens, including actions described in clause (a) of this Section 5.10, all at the expense of the Loan Parties, subject to clause (g) below. (i) Grant and cause each of the Subsidiary Loan Parties to grant to the Collateral Agent security interests in, and Mortgages on, any Material Real Property of the Borrower or such Subsidiary Loan Parties, as applicable, that are acquired after the Closing Date, within 120 days after the acquisition thereof (or such later date as the Administrative Agent may agree in its reasonable discretion) in a customary form for Affiliates of the Fund and otherwise reasonably satisfactory to the Administrative Agent and the Borrower, which security interest and mortgage shall constitute valid and enforceable Liens subject to no other Liens except Permitted Liens, (ii) record or file, and cause each such Subsidiary to record or file, the Mortgage or instruments related thereto in such manner and in such places as is required by law to establish, perfect, preserve and protect the Liens in favor of the Collateral Agent (for the benefit of the Secured Parties) required to be granted pursuant to the Mortgages and pay, and cause each such Subsidiary to pay, in full, all Taxes, fees and other charges required to be paid in connection with such recording or filing, in each case subject to clause (g) below, and (iii) deliver to the Collateral Agent an updated Schedule 1.01(E) reflecting such Mortgaged Properties. Unless otherwise waived by the Administrative Agent, with respect to each such Mortgage, the Borrower shall cause the requirements set forth in clauses (f) and (g) of the definition of “Collateral and Guarantee Requirement” to be satisfied with respect to such Material Real Property. (d) If any additional direct or indirect Subsidiary of the Borrower is formed or acquired after the Closing Date (with any Subsidiary Redesignation resulting in an Unrestricted Subsidiary becoming a Subsidiary being deemed to constitute the acquisition of a Subsidiary) and if such Subsidiary is a Subsidiary Loan Party, within 15 Business Days after the date such Subsidiary is formed or acquired (or such longer period as the Administrative Agent may agree in its reasonable discretion), notify the Collateral Agent thereof and, within 20 Business Days after the date such Subsidiary is formed or acquired or such longer period as the Administrative Agent may agree in its reasonable discretion (or, with respect to clauses (f), (g) and (h) of the definition of “Collateral and Guarantee Requirement,” within 120 days after such formation or acquisition or such longer period as set forth therein or as the Administrative Agent may agree in its reasonable discretion, as applicable), cause the Collateral and Guarantee Requirement to be satisfied with respect to such Subsidiary and with respect to any Equity Interest in or Indebtedness of such Subsidiary owned by or on behalf of any Loan Party, subject to clause (g) below. (e) If any additional Foreign Subsidiary of the Borrower is formed or acquired after the Closing Date (with any Subsidiary Redesignation resulting in an Unrestricted Subsidiary becoming a Subsidiary being deemed to constitute the acquisition of a Subsidiary) and if such Subsidiary is a “first tier” Foreign Subsidiary of a Loan Party, within 15 Business Days after the date such Foreign Subsidiary is formed or acquired (or such longer period as the Administrative Agent may agree in its reasonable discretion), notify the Collateral Agent thereof and, within 50 Business Days after the date such Foreign Subsidiary is formed or acquired or such longer period as the Administrative Agent may agree in its reasonable discretion, cause the Collateral and Guarantee Requirement to be satisfied with respect to any Equity Interest in such Foreign Subsidiary owned by or on behalf of any Loan Party, subject to clause (g) below. (f) Furnish to the Collateral Agent prompt written notice of any change (A) in any Loan Party’s corporate or organization name, (B) in any Loan Party’s identity or organizational structure, (C) in any Loan Party’s organizational identification number, (D) in any Loan Party’s jurisdiction of organization or (E) in the location of the chief executive office of any Loan Party that is not a registered organization; provided, that the Borrower shall not effect or permit any such change unless all filings have been made, or will have been made within 30 days following such change (or such longer period as the Administrative Agent may agree in its reasonable discretion), under the Uniform Commercial Code that are required in order for the Collateral Agent to continue at all times following such change to have a valid, legal and perfected security interest in all the Collateral in which a security interest may be perfected by such filing, for the benefit of the Secured Parties. (g) The Collateral and Guarantee Requirement and the other provisions of this Section 5.10 and the other Loan Documents with respect to Collateral need not be satisfied with respect to any of the following (collectively, the “Excluded Property”): (i) any Real Property other than Material Real Property, (ii) motor vehicles and other assets subject to certificates of title, letter of credit rights (in each case, other than to the extent a Lien on such assets or such rights can be perfected by filing a UCC-1) and commercial tort claims with a value of less than $10,000,000, (iii) pledges and security interests prohibited by applicable law, rule, regulation or contractual obligation (with respect to any such contractual obligation, only to the extent such restriction is permitted under Section 6.09(c) and such restriction is binding on such assets (1) on the Closing Date or (2) on the date of the acquisition thereof and not entered into in contemplation thereof (other than in connection with the incurrence of Indebtedness of the type contemplated by Section 6.01(i))) (in each case, except to the extent such prohibition is unenforceable after giving effect to the applicable anti-assignment provisions of Article 9 of the Uniform Commercial Code) or which could require governmental (including regulatory) consent, approval, license or authorization to be pledged (unless such consent, approval, license or authorization has been received), (iv) assets to the extent a security interest in such assets could reasonably be expected to result in material adverse tax consequences as determined in good faith by the Borrower, (v) any lease, license or other agreement to the extent that a grant of a security interest therein would violate or invalidate such lease, license or agreement or create a right of termination in favor of any other party thereto (other than the Borrower or any Guarantor) after giving effect to the applicable anti-assignment provisions of Article 9 of the Uniform Commercial Code, (vi) those assets as to which the Administrative Agent and the Borrower reasonably agree that the cost or other consequence of obtaining such a security interest or perfection thereof are excessive in relation to the value afforded thereby, (vii) any governmental licenses or state or local licenses, franchises, charters and authorizations, to the extent security interests in such licenses, franchises, charters or authorizations are prohibited or restricted thereby after giving effect to the applicable anti-assignment provisions of Article 9 of the Uniform Commercial Code, (viii) any “intent-to-use” applications for trademark or service xxxx registrations filed pursuant to Section 1(b) of the Xxxxxx Xxx, 00 X.X.X. §0000, unless and until an Amendment to Allege Use or a Statement of Use under Section 1(c) or 1(d) of the Xxxxxx Act has been filed, (ix) other customary exclusions under applicable local law or in applicable local jurisdictions set forth in any applicable Security Documents or otherwise separately agreed in writing between the Administrative Agent and the Borrower, (x) Securitization Assets sold to any Special Purpose Securitization Subsidiary or otherwise pledged, factored, transferred or sold in connection with any Permitted Securitization Financing, and any other assets subject to Liens securing Permitted Securitization Financings, (xi) any Excluded Securities, (xii) any Third Party Funds, (xiii) any equipment or other asset that is subject to a Lien permitted by any of clauses (c), (i), (j), (aa), (mm) or (oo) of Section 6.02 or is otherwise subject to a purchase money debt or a Capitalized Lease Obligation, in each case, as permitted by Section 6.01, if the contract or other agreement providing for such debt or Capitalized Lease Obligation prohibits or requires the consent of any person (other than the Borrower or any Guarantor) as a condition to the creation of any other security interest on such equipment or asset and, in each case, such prohibition or requirement is permitted hereunder (after giving effect to the applicable anti-assignment provisions of Article 9 of the Uniform Commercial Code or other applicable law), (xiv) all assets of Holdings other than, prior to a Qualified IPO, Equity Interests of the Borrower directly held by Holdings and pledged pursuant to the Holdings Guarantee and Pledge Agreement and (xv) any other exceptions mutually agreed upon between the Borrower and the Administrative Agent; provided, that the Borrower may in its sole discretion elect to exclude any property from the definition of “Excluded Property.” Notwithstanding anything herein to the contrary, (A) the Administrative Agent may grant extensions of time or waiver of requirement for the creation or perfection of security interests in or the obtaining of insurance (including title insurance) or surveys with respect to particular assets (including extensions beyond the Closing Date for the perfection of security interests in the assets of the Loan Parties on such date) where it reasonably determines, in consultation with the Borrower, that perfection or obtaining of such items cannot be accomplished without undue effort or expense by the time or times at which it would otherwise be required by this Agreement or the other Loan Documents, (B) no control agreement or control, lockbox or similar arrangement shall be required with respect to any deposit accounts, securities accounts or commodities accounts, (C) no landlord, mortgagee or bailee waivers shall be required, (D) no foreign-law governed security documents or perfection under foreign law shall be required, (E) no notice shall be required to be sent to account debtors or other contractual third parties prior to an Event of Default, (F) Liens required to be granted from time to time pursuant to, or any other requirements of, the Collateral and Guarantee Requirement and the Security Documents shall be subject to exceptions and limitations set forth in the Security Documents and (G) to the extent any Mortgaged Property is located in a jurisdiction with mortgage recording or similar tax, the amount secured by the Security Document with respect to such Mortgaged Property shall be limited to the fair market value of such Mortgaged Property as determined in good faith by the Borrower (subject to any applicable laws in the relevant jurisdiction or such lesser amount agreed to by the Administrative Agent).

  • E7 Security The Authority shall be responsible for maintaining the security of the Authority premises in accordance with its standard security requirements. The Contractor shall comply with all security requirements of the Authority while on the Authority premises, and shall ensure that all Staff comply with such requirements.

  • Lobbying Activities - Standard Form - LLL No response Do not upload this form unless Vendor has reportable lobbying activities. There are Attributes entitled, “2 CFR Part 200 or Federal Provision - Xxxx Anti-Lobbying Amendment – Continued.” Properly respond to those Attributes and only upload this form if applicable/instructed. If upload is required based on your response to those Attributes, the Disclosure of Lobbying Activities – Standard Form - LLL must be downloaded from the “Attachments” section of the IonWave eBid System, reviewed, properly completed, and uploaded to this location.

  • JOB SECURITY 23.01 Subject to the willingness and capacity of individual employees to accept relocation and retraining, the Employer will make every reasonable effort to ensure that any reduction in the work force will be accomplished through attrition.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!