Physical and Technical Security Sample Clauses

Physical and Technical Security. Provider will provide appropriate and adequate physical and technical security for the Application Services, including, but without limitation, the following: 1. Provider will have Representatives capable of identifying, categorizing, and responding to a security incident. 2. Provider will implement a security fix across the infrastructure in accordance with Provider’s regular updateprocess. 3. Provider will promptly shut down ALL access to the System, or any component of it associated with the Application Services, responding to a request by Company’s securitymanager. 4. Provider will not directly or indirectly subcontract, assign, or transfer, permit, or allow any portion of the Services, related support, or other activities under the Agreement offshore, meaning outside the continental United States, Canada or the United Kingdom, without the express prior written consent of the Company. 5. Provider will require all permitted subcontractors and/or third party service providers utilized either directly or indirectly by Provider in the performance of Services ("Third Party Service Provider") to adhere to, and with all requirements of the Agreement, including, but not limited to, the Company security requirements set forth in the Agreement. 6. Provider will conduct annual independent security reviews and audits by a reputable and nationally known independent third party audit firm to ensure that Provider is meeting all of the physical and technical security requirements of the Agreement. Provider’s audit agency will prepare a written audit report detailing audit findings. Provider will not store or transmit Company Data as clear text. Provider will store and transmit Company Data only in a secure and encrypted mode. 7. Provider will institute and maintain a separation of duties between application development, quality assurance, testing, and production environments.
AutoNDA by SimpleDocs
Physical and Technical Security. Provider will provide appropriate and adequate physical and technical security for the Application Services, including, but without limitation, the following: 1. Provider will have Representatives capable of identifying, categorizing, and responding to a security incident on duty and at its site 24X365. 2. Provider will promptly notify Company of any new potential security vulnerability that may affect the Services. This notification will include the probable risks and the time by which a security fix will likely occur. Provider will again notify Company upon the completion of the security fix. 3. Provider will implement a security fix across the infrastructure within 4 hours of approval from Company. 4. Provider will notify Company’s security manager within 15 minutes if it believes that an attack is in process. 5. If requested by Company, Provider will assist Company in preparing written responses to audit requirements or findings without additional charge. 6. Provider will shut down ALL access to the System, or any component of it associated with the Application Services, within 15 minutes upon request by Company’s security manager. 7. Provider will not directly or indirectly subcontract, assign, or transfer, permit, or allow any portion of the Services, related support, or other activities under the Agreement offshore, meaning outside the continental United States, without the express prior written consent of the Company. 8. Provider will require all permitted subcontractors and/or third party service providers utilized either directly or indirectly by Provider in the performance of Services (“Third Party Service Provider”) to adhere to, and agree in writing, to be bound by and comply with all requirements of the Agreement, including, but not limited to, the Company security requirements set forth in the Agreement. On an annual basis during the Term, Provider will provide Company with a written certification, signed by an officer of Provider and each Third Party Service Provider, certifying that the Third Party Service Provider is bound by and is complying with all requirements of the Agreement, including, but not limited to, the Company security requirements set forth in the Agreement. 9. Provider will begin testing new versions of software/hardware supporting the security infrastructure within 2 weeks of release by the third-party supplier and will complete the testing as quickly as commercially possible unless significant issues are discovered. If s...
Physical and Technical Security. Provider will provide appropriate and adequate physical and technical security for the Application Services, including, but without limitation, the following: 1. Provider will promptly notify Customer of any new potential security vulnerability that may affect the Services. This notification will include the probable risks and the time by which a security fix will likely occur. Provider will again notify Customer upon the completion of the security fix. 2. Provider will implement a security fix across the infrastructure within 4 hours of approval from Customer. 3. Provider will notify Customer's security manager within 24 hours if it believes that an attack is in process 4. If requested by Customer, Provider will assist Customer in preparing written responses to audit requirements or findings without additional charge. 5. Provider will shut down ALL access to the System, or any component of it associated with the Services, within 15 minutes upon request by Customer's security manager. 6. Provider will conduct annual independent security reviews and audits by a reputable and nationally known independent audit agency to ensure that Provider is meeting all of the physical and technical security requirements of the Agreement. 7. Provider will not store or transmit Customer Data as clear text. Provider will store and transmit Customer Data only in a secure and encrypted mode. 8. Provider will institute and maintain a separation of duties between application development, quality assurance, testing, and production environments, along with separation between systems, database, and application administration.

Related to Physical and Technical Security

  • Technical Safeguards 1. USAC and DSS will process the data matched and any data created by the match under the immediate supervision and control of authorized personnel to protect the confidentiality of the data, so unauthorized persons cannot retrieve any data by computer, remote terminal, or other means. 2. USAC and DSS will strictly limit authorization to these electronic data areas necessary for the authorized user to perform their official duties. All data in transit will be encrypted using algorithms that meet the requirements of the Federal Information Processing Standard (FIPS) Publication 140-2 or 140-3 (when applicable). 3. Authorized system users will be identified by User ID and password, and individually tracked to safeguard against the unauthorized access and use of the system. System logs of all user actions will be saved, tracked and monitored periodically. 4. USAC will transmit data to DSS via encrypted secure file delivery system. For each request, a response will be sent back to USAC to indicate success or failure of transmission.

  • Physical Security Contractor shall ensure that Medi-Cal PII is used and stored in an area that is physically safe from access by unauthorized persons during working hours and non- working hours. Contractor agrees to safeguard Medi-Cal PII from loss, theft or inadvertent disclosure and, therefore, agrees to: A. Secure all areas of Contractor facilities where personnel assist in the administration of the Medi-Cal program and use or disclose Medi-Cal PII. The Contractor shall ensure that these secure areas are only accessed by authorized individuals with properly coded key cards, authorized door keys or access authorization; and access to premises is by official identification. B. Ensure that there are security guards or a monitored alarm system with or without security cameras 24 hours a day, 7 days a week at Contractor facilities and leased facilities where a large volume of Medi-Cal PII is stored. C. Issue Contractor personnel who assist in the administration of the Medi-Cal program identification badges and require County Workers to wear the identification badges at facilities where Medi-Cal PII is stored or used. D. Store paper records with Medi-Cal PII in locked spaces, such as locked file cabinets, locked file rooms, locked desks or locked offices in facilities which are multi-use (meaning that there are personnel other than contractor personnel using common areas that are not securely segregated from each other.) The contractor shall have policies which indicate that Contractor and their personnel are not to leave records with Medi-Cal PII unattended at any time in vehicles or airplanes and not to check such records in baggage on commercial airlines. E. Use all reasonable measures to prevent non-authorized personnel and visitors from having access to, control of, or viewing Medi-Cal PII.

  • Technical Security Controls 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.

  • Personnel Security 6.1 Staff recruitment in accordance with government requirements for pre- employment checks; 6.2 Staff training and awareness of Departmental security and any specific contract requirements.

  • Contractor Security Clearance Customers may designate certain duties and/or positions as positions of “special trust” because they involve special trust responsibilities, are located in sensitive locations, or have key capabilities with access to sensitive or confidential information. The designation of a special trust position or duties is at the sole discretion of the Customer. Contractor or Contractor’s employees and Staff who, in the performance of this Contract, will be assigned to work in positions determined by the Customer to be positions of special trust, may be required to submit to background screening and be approved by the Customer to work on this Contract.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!