We use cookies on our site to analyze traffic, enhance your experience, and provide you with tailored content.

For more information visit our privacy policy.

Other Security Requirements Sample Clauses

Other Security Requirements. 8.1 Premises - Please provide details of the security measures in place for restricting access to your premises including alarm systems and security staff etc.
Other Security RequirementsThe Company shall maintain all technologies, policies, procedures and practices necessary to secure and protect the confidentiality and integrity of WSD Student Information, including procedures to (a) establish user IDs and passwords as necessary to protect such information; (b) protect all such user passwords from detection and unauthorized use; (c) prevent hostile or unauthorized intrusion that could result in data corruption, or deny service; (d) prevent and detect computer viruses from spreading to disks, attachments to e-mail, downloaded files, and documents generated by word processing and spreadsheet programs; (e) minimize system downtime; (f) notify WSD of planned system changes that may impact the security of WSD data; (g) return or destroy WSD data that exceed specified retention schedules or upon the request of WSD; (h) notify WSD of any data storage outside the United States; (i) in the event of system failure, enable immediate recovery of WSD Student Information to the previous business day. The Company guarantees that WSD Student Information shall not be sold to, accessed by, or moved by third parties.
Other Security RequirementsThe Company shall maintain all technologies, policies, procedures and practices necessary to secure and protect the confidentiality and integrity of CCS student information, including procedures to (a) establish user IDs and passwords as necessary to protect such information; (b) protect all such user passwords from detection and unauthorized use; (c) prevent hostile or unauthorized intrusion that could result in data corruption, or deny service; (d) prevent and detect computer viruses from spreading to disks, attachments to e-mail, downloaded files, and documents generated by word processing and spreadsheet programs; (e) minimize system downtime; (f) notify CCS of planned system changes that may impact the security of CCS data; (g) return or destroy CCS data that exceed specified retention schedules; (h) notify CCS of any data storage outside the US; (i) in the event of system failure, enable immediate recovery of CCS information to the previous business day. The Company should guarantee that CCS data will not be sold to, accessed by, or moved by third parties. In the event of a security breach, the Company shall (a) immediately take action to close the breach; (b) notify CCS within 24 hours of Company's first knowledge of the breach, the reasons for or cause of the breach, actions taken to close the breach, and identify the CCS student information compromised by the breach; (c) return compromised CCS data for review; (d) provide communications on the breach to be shared with affected parties and cooperate with CCS efforts to communicate to affected parties by providing CCS with prior review of press releases and any communications to be sent to affected parties; (e) take all legally required, reasonable, and customary measures in working with CCS to remediate the breach which may include toll free telephone support with informed customer services staff to address questions by affected parties and/or provide monitoring services if necessary given the nature and scope of the disclosure; (f) cooperate with CCS by providing information, records and witnesses needed to respond to any government investigation into the disclosure of such records or litigation concerning the breach; and (g) provide CCS with notice within 24 hours of notice or service on Company, whichever occurs first, of any lawsuits resulting from, or government investigations of, the Company's handling of CCS data of any kind, failure to follow security requirements and/or failure to safeguar...
Other Security Requirements. The Independent Contractor shall maintain all technologies, policies, procedures and practices necessary to secure and protect the confidentiality and integrity of PSD Student/employee Information, including procedures to (a) establish user IDs and passwords as necessary to protect such information;
Other Security Requirements. 8.1 Premises - Please provide details of the security measures in place for restricting access to your premises including alarm systems and security staff etc. 8.2 Portable media – Please provide details of the policies you have in place for the use of portable media and storage devices including the level of encryption and controlled access procedures exceptionally loaded with Client Data.
Other Security RequirementsThe Company shall maintain all technologies, policies, procedures and practices necessary to secure and protect the confidentiality and integrity of ACS student information, including procedures to (a) establish user IDs and passwords as necessary to protect such information;
Other Security RequirementsThe Company shall maintain all technologies, policies, procedures and practices necessary to secure and protect the confidentiality and integrity of BCS student information, including procedures to (a) establish user IDs and passwords as necessary to protect such information; (b) protect all such user passwords from detection and unauthorized use; (c) prevent hostile or unauthorized intrusion that could result in data corruption, or deny service; (d) prevent and detect computer viruses from spreading to disks, attachments to e-mail, downloaded files, and documents generated by word processing and spreadsheet programs; (e) minimize system downtime; (f) notify BCS of planned system changes that may impact the security of BCS data; (g) return or destroy BCS data that exceed specified retention schedules;
Other Security RequirementsThe Company shall maintain all technologies, policies, procedures and practices necessary to secure and protect the confidentiality and integrity of MBS student information, including procedures to
Other Security RequirementsThe Company shall maintain all technologies, policies, procedures and practices necessary to secure and protect the confidentiality and integrity of GCS student information, including procedures to
Other Security Requirements. Premises - Please provide details of the security measures in place for restricting access to your premises including alarm systems and security staff etc. Our premises are all very secure with access to each office via a card or key pad. We also have alarms at each office and security staff at our Leeds and London offices.