Personnel Security Controls Sample Clauses

Personnel Security Controls. TCS Personnel Security policy covers pre and post-employment security measures apart from the measure while being in employment including but not limited to Acceptable Usage Policies. All associates are required to sign and abide by, • Confidentiality and IPR Agreement • Associate Declaration • Tata Code of Conduct Mandatory third-party background verification checks are done for all associates who join TCS. This check is performed subject to the laws of the land. All associates undergo security awareness orientation as part of their induction to TCS. All new joiners in TCS are required to mandatorily complete information security awareness course within 30 days of joining and thereafter every year. Security Awareness program is used to sensitize the associate on the following. The Security awareness training program includes but not limited to the following contents • Security practices - Do’s and Don’ts • Acceptable usage of IT resources which includes email, network, systems, application, and internet • Password ManagementIntellectual Property RightsSocial Engineering • Security incident reporting process and associate’s responsibility towards it • Consequence of Security, Privacy breaches, etc. The security awareness training program is followed up periodically with methods like email broadcasts, town- halls, posters, refresher training, etc. Also, annually game, and fun based events are carried out with theme as Information security to maintain and improve the security awareness of the users in the organization. When joining an engagement, additional induction training is conducted to brief the joiners about the contractual requirements and customer specific information security requirements. TCS has an internal repository of training material and has also signed up with external training provider platforms. Role-based training, with different competency levels, is handled by the project teams for associates handling roles that require security implementation as part of their job function or project, e.g., software security assurance, network security, firewall security administration, data-base security administration, external security certifications, etc. All employees and contract staff are required to sign Confidentiality and Non-Disclosure Agreement and the security declaration form at the time of joining the organization where they confirm that they have understood the requirements of TCS Security Policy and that they accept to abide by i...
AutoNDA by SimpleDocs

Related to Personnel Security Controls

  • Technical Security Controls 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.

  • Security Controls Annually, upon Fund’s reasonable request, Transfer Agent shall provide Fund’s Chief Information Security Officer or his or her designee with a copy of its corporate information security controls that form the basis for Transfer Agent’s Security Policy and an opportunity to discuss Transfer Agent’s information security measures, and a high level summary of any vulnerability testing conducted by Transfer Agent on its information security controls, with a qualified member of Transfer Agent’s information technology management team. Transfer Agent shall review its Security Policy annually.

  • Personnel Controls The County Department/Agency agrees to advise County Workers who have access to Pll, of the confidentiality of the information, the safeguards required to protect the information, and the civil and criminal sanctions for non- compliance contained in applicable federal and state laws. For that purpose, the County Department/Agency shall implement the following personnel controls:

  • Personnel Security 6.1 Staff recruitment in accordance with government requirements for pre- employment checks;

  • Audit Controls P. Contractor agrees to an annual system security review by the County to assure that systems processing and/or storing Medi-Cal PII are secure. This includes audits and keeping records for a period of at least three (3) years. A routine procedure for system review to catch unauthorized access to Medi-Cal PII shall be established by the Contractor.

  • Paper Document Controls In order to comply with the following paper document controls, the Contractor agrees to:

  • Management and Control Systems Grantee will:

  • Security Controls for State Agency Data In accordance with Senate Bill 475, Acts 2021, 87th Leg., R.S., pursuant to Texas Government Code, Section 2054.138, Contractor understands, acknowledges, and agrees that if, pursuant to this Contract, Contractor is or will be authorized to access, transmit, use, or store data for System Agency, Contractor is required to meet the security controls the System Agency determines are proportionate with System Agency’s risk under the Contract based on the sensitivity of System Agency’s data and that Contractor must periodically provide to System Agency evidence that Contractor meets the security controls required under the Contract.

  • Supervisory Control and Data Acquisition (SCADA) Capability The wind plant shall provide SCADA capability to transmit data and receive instructions from the ISO and/or the Connecting Transmission Owner for the Transmission District to which the wind generating plant will be interconnected, as applicable, to protect system reliability. The Connecting Transmission Owner for the Transmission District to which the wind generating plant will be interconnected and the wind plant Developer shall determine what SCADA information is essential for the proposed wind plant, taking into account the size of the plant and its characteristics, location, and importance in maintaining generation resource adequacy and transmission system reliability in its area.

  • Financial Controls At all times, the Charter School shall maintain appropriate governance and managerial procedures and financial controls which procedures and controls shall include, but not be limited to: (1) commonly accepted accounting practices and the capacity to implement them (2) a checking account; (3) adequate payroll procedures; (4) procedures for the creation and review of monthly and quarterly financial reports, which procedures shall specifically identify the individual who will be responsible for preparing such financial reports in the following fiscal year; (5) internal control procedures for cash receipts, cash disbursements and purchases; and (6) maintenance of asset registers and financial procedures for grants in accordance with applicable state and federal law.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!