Personnel Security Sample Clauses

Personnel Security. Google personnel are required to conduct themselves in a manner consistent with the company’s guidelines regarding confidentiality, business ethics, appropriate usage, and professional standards. Google conducts reasonably appropriate backgrounds checks to the extent legally permissible and in accordance with applicable local labor law and statutory regulations. Personnel are required to execute a confidentiality agreement and must acknowledge receipt of, and compliance with, Google’s confidentiality and privacy policies. Personnel are provided with security training. Personnel handling Customer Data are required to complete additional requirements appropriate to their role (e.g., certifications). Google’s personnel will not process Customer Data without authorization.
Personnel Security. As part of the employment process, employees undergo a screening process applicable per regional law. Dell’s annual compliance training includes a requirement for employees to complete an online course and pass an assessment covering information security and data privacy. The security awareness program may also provide materials specific to certain job functions.
Personnel Security. A. The Treasury will rely on the Financial Agent’s personnel security screening standards. The Financial Agent shall ensure that all of its employees and affiliate and contractor personnel who have access to nonpublic information have appropriate personnel security background checks. B. The Financial Agent shall provide the Treasury with a listing of all such background investigative requirements (e.g., FBI fingerprint check, police check, credit check, verification of lawful permanent resident status, etc.). The Treasury may request additional personnel security checks. C. Consistent with Section 3B, all Financial Agent employees and affiliate and contractor personnel who have access to nonpublic information must be U.S. citizens or lawful permanent residents performing their work in the continental United States.
Personnel Security. ServiceNow performs background screening on all employees and all contractors who have access to Customer Data in accordance with ServiceNow’s then-current applicable standard operating procedure and subject to Law.
Personnel Security. Please describe how you will comply with the requirements of Personnel Security.
AutoNDA by SimpleDocs
Personnel Security. The Board of Education acknowledges the need for its employees to perform their duties in a safe, secure, and non-threatening atmosphere. The Board recognizes, however, that a possibility of an on-the-job assault or battery or assault and battery on an employee exists. The following policy shall be effectuated in accordance with Oklahoma state law Assault on School District Employees.
Personnel Security. 4me staff members are required to conduct themselves in a manner consistent with the 4me’s guidelines regarding confidentiality, business ethics, appropriate usage, and professional standards. 4me conducts reasonably appropriate background checks to the extent legally permissible and in accordance with applicable local labor law and statutory regulations. Staff members are required to execute a confidentiality agreement and must acknowledge receipt of, and compliance with, 4me’s security and privacy policies. Staff members are provided with security training annually and privacy training bi-annually. 4me staff members will not process Customer Data without authorization.
Personnel Security. The Data Importer personnel are required to conduct themselves in a manner consistent with the company’s guidelines regarding confidentiality, business ethics, appropriate usage, and professional standards. The Data Importer conducts reasonably appropriate backgrounds checks to the extent legally permissible and in accordance with applicable local labor law and statutory regulations. Personnel are required to execute a confidentiality agreement and must acknowledge receipt of, and compliance with, the Data Importer’s confidentiality and privacy policies. Personnel are provided with security training. Personnel handling customer data are required to complete additional requirements appropriate to their role (e.g., certifications). The Data Importer’s personnel will not process customer data without authorization.
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!