Physical and Environment Security Sample Clauses

Physical and Environment Security. Entrust facilities hosting technology information assets are equipped with appropriate controls to restrict physical access to the facility. Physical entry controls include a means to identify personnel and visitors, and ensure the individual is authorized to access the secured area prior to entry. All entry to secured areas are logged and logs are reviewed periodically. Personnel are informed of, and subject to, the guidelines established for working within secured areas. Access points such as delivery or loading areas, and other points where unauthorized persons may enter the facility, are controlled to restrict further entry, and, to the extent it is practical, isolated from information processing areas. Physical security measures include the capability to monitor company facilities to detect unauthorized or unlawful use. Entrust has a physical security plan that incorporates a defined procedure to report suspicious activity, identified security weaknesses, or potential security events, as well as an escalation procedure to communicate events to local law enforcement as appropriate. Facility staff and visitors are informed regarding these physical security procedures and their responsibility to report security events. Information Transfer Policy: Information to be transferred shall at all times be properly secured, in accordance with its classification, regardless of the media employed to carry the information or the transmission mechanism. All information to be transferred shall be subject to inspection for malicious software code and other potential hazards to confidentiality, integrity or availability. When the use of encryption is required for safekeeping, such use shall be subject to all applicable security controls as well as legal or regulatory requirements. Information to be transferred shall be subject to established retention and disposal requirements. Information transfer facilities shall comply with all applicable laws and regulations. Information and software shall not be transferred with external parties until all relevant contractual and security requirements are satisfied, including formal written agreements where required.
AutoNDA by SimpleDocs
Physical and Environment Security. 7.1. Physical access to Agent’s on-site data centers will be strictly controlled by proximity card access groups that are limited to the operations staff who require access to perform their contracted roles.
Physical and Environment Security a. Medallia products and customer data are hosted at providers who have demonstrated compliance with one or more of the following standards (or a reasonable equivalent): International Organization for Standardization (“ISO”) 27001 and/or American Institute of Certified Public Accountants (“AICPA”) Service Organization Controls (“SOC”) Reports for Services Organizations. These providers provide Internet connectivity, physical security, power, and environmental systems and services for the Medallia cloud platform used for the Products.
Physical and Environment Security. Entrust Datacard facilities hosting technology information assets are equipped with appropriate controls to restrict physical access to the facility. Physical entry controls include a means to identify personnel and visitors, and ensure the individual is authorized to access the secured area prior to entry. All entry to secured areas are logged and logs reviewed periodically. Personnel are informed of, and subject to, the guidelines established for working within secured areas. Access points such as delivery or loading areas, and other points where unauthorized persons may enter the facility, are controlled to restrict further entry, and, to the extent it is practical, isolated from information processing areas. Physical security measures include the capability to monitor company facilities to detect unauthorized or unlawful use. Entrust Datacard has a physical security plan that incorporates a defined procedure to report suspicious activity, identified security weaknesses, or potential security events, as well as an escalation procedure to communicate events to local law enforcement as appropriate. Facility staff and visitors are informed regarding these physical security procedures and their responsibility to report security events. Information Transfer Policy:
Physical and Environment Security x. Xxxx products and customer data are hosted at providers who have demonstrated compliance with one or more of the following standards (or a reasonable equivalent): International Organization for Standardization (“ISO”) 27001 and/or American Institute of Certified Public Accountants (“AICPA”) Service Organization Controls (“SOC”) Reports for Services Organizations. These providers provide Internet connectivity, physical security, power, and environmental systems and services for the Voci cloud platform used for the Products.

Related to Physical and Environment Security

  • Government Securities 12 guarantee.......................................................... 13 Guarantee.......................................................... 13 Guarantor.......................................................... 13

  • Collateral and Security Section 10.01.

  • Deposited Money and Government Securities to be Held in Trust; Other Miscellaneous Provisions Subject to Section 8.06 hereof, all money and non-callable Government Securities (including the proceeds thereof) deposited with the Trustee (or other qualifying trustee, collectively for purposes of this Section 8.05, the "Trustee") pursuant to Section 8.04 hereof in respect of the outstanding Notes will be held in trust and applied by the Trustee, in accordance with the provisions of such Notes and this Indenture, to the payment, either directly or through any Paying Agent (including the Company acting as Paying Agent) as the Trustee may determine, to the Holders of such Notes of all sums due and to become due thereon in respect of principal, premium and Liquidated Damages, if any, and interest, but such money need not be segregated from other funds except to the extent required by law. The Company will pay and indemnify the Trustee against any tax, fee or other charge imposed on or assessed against the cash or non-callable Government Securities deposited pursuant to Section 8.04 hereof or the principal and interest received in respect thereof other than any such tax, fee or other charge which by law is for the account of the Holders of the outstanding Notes. Notwithstanding anything in this Article 8 to the contrary, the Trustee will deliver or pay to the Company from time to time upon the request of the Company any money or non-callable Government Securities held by it as provided in Section 8.04 hereof which, in the opinion of a nationally recognized firm of independent public accountants expressed in a written certification thereof delivered to the Trustee (which may be the opinion delivered under Section 8.04(1) hereof), are in excess of the amount thereof that would then be required to be deposited to effect an equivalent Legal Defeasance or Covenant Defeasance.

Time is Money Join Law Insider Premium to draft better contracts faster.