Our Security Practices Clause Samples

Our Security Practices. We implement and follow an enterprise security program, with the policies, plans, and procedures set forth here ▇▇▇.▇▇▇▇▇▇.▇▇▇/▇▇▇▇-▇▇▇▇-▇▇▇. Our Personnel will be subject to the data protection and confidentiality obligations set forth in these General Terms with respect to any of your data that we may have access to in connection with the C&I Services.
Our Security Practices. We maintain a security program that is designed to protect the security, privacy, confidentiality and integrity of the student personal information that is submitted to our Site, including by using SSL and secure firewalls and storing our data in highly secure AWS data centers. We collect only limited amounts of personal information and our limited use of outside services helps to secure against unintended transfer of personal information. Although we take great measures to ensure the security of the personal information entrusted to us, no company can guarantee that there will never be a security breach. However, if there ever is such a security breach, we will do everything we can to protect your personal information. Should a breach occur, DBQ will work with the school to notify parents of all affected student users. DBQ’s response to a breach is fully detailed in its Data Breach Policy. DBQ may make changes to this policy from time to time. Any changes to our privacy policy will be posted on the Site so that you are always aware of what information we collect and how we use it. We encourage you to review this privacy policy on a regular basis so you can see any changes that we make. Any changes become effective immediately once we notify you by posting the new policy. Because we take student data protection very seriously, no material changes to the collection, use and sharing of student data will be made without the school agreeing to it in writing. DBQ takes the privacy of student data very seriously. It is DBQ’s policy to comply with all applicable state and federal laws, including the Children’s Online Privacy Protection Act (COPPA). We work in partnership with our schools and our parents to ensure that any consent provisions that may be applicable are met and our hope is that schools will diligently safeguard the personal information of each student having access to DBQ Online and will not post or otherwise communicate personal information of students on the DBQ Online.

Related to Our Security Practices

  • Security Practices Dell has implemented corporate information security practices and standards that are designed to safeguard the Dell’s corporate environment and to address: (1) information security; (2) system and asset management; (3) development; and (4) governance. These practices and standards are approved by the Dell CIO and undergo a formal review on an annual basis.

  • SAFETY PRACTICES (a) i Employees requiring glasses must wear glasses, preferably with safety lenses instead of contact lenses while on the job site. ii W.C.B. approved safety footwear must be worn at all times while on the job site. iii Employee attire will be in conformance with W.C.B. Regulation and the Employer’s policy.

  • Safety and Security Procedures Contractor shall maintain and enforce, at the Contractor Work Locations, industry-standard safety and physical security policies and procedures. While at each JBE Work Location, Contractor shall comply with the safety and security policies and procedures in effect at such JBE Work Location.

  • Pay Practices The Employer recognizes the importance of regularity in pay practices and to the greatest extent possible the Employer will not alter the payment routines. Nurses will be notified in writing by the Employer not less than sixty (60) days in advance of a change to the pay practices.

  • Data Practices Supplier and Sourcewell acknowledge Sourcewell is subject to the Minnesota Government Data Practices Act, Minnesota Statutes Chapter 13. As it applies to all data created and maintained in performance of this Agreement, Supplier may be subject to the requirements of this chapter.