Physical Security Safeguards Sample Clauses

Physical Security Safeguards. The Data Recipient's Information Security Safeguards shall include physical safety and security safeguards at any facilities where any Services are performed or received that meet or exceed reasonable best commercial practices.
AutoNDA by SimpleDocs
Physical Security Safeguards. Production data centers used to provide our Services have access control systems that permit only authorized personnel to have access to secure areas. These facilities are designed to withstand adverse weather and other reasonably predictable natural conditions, utilize redundant electrical and telecommunications systems, employ environmental systems that monitor temperature, humidity and other environmental conditions, and contain strategically placed heat, smoke and fire detection and suppression systems. The data center hosting Customer student data is compliant with the requirements as stated in the following standards: ISO9001:2015, ISO/IEC 27001:2013, ISO/IEC 27017:2015 and ISO/IEC 27018:2014 (or the Power: The data center electrical power systems are designed to be fully redundant and maintainable without impact to operations, 24 hours a day, and Uninterruptible Power Supply (UPS) units provide backup power in the event of an electrical failure for critical and essential loads in the facility. In the event of a power failure, UPS and continuous power supply solutions are used to provide power while transferring systems to on-site back-up generators. Access Restrictions: The data center facilities will have appropriate physical access restrictions and monitoring as well as fire detection and fire suppression systems. around-the-clock guards, interior and exterior surveillance cameras, two-factor access screening and escort-controlled access. Physical access is controlled both at the perimeter and at building ingress points by professional security staff utilizing video surveillance, intrusion detection systems, and other electronic means.
Physical Security Safeguards. Oracle employs measures designed to prevent unauthorized persons from gaining access to computing facilities in which Your Content is hosted such as the use of security personnel, secured buildings, and designated data center premises. Oracle provides secured computing facilities for both office locations and production cloud infrastructure. Common controls between office locations and Oracle controlled co-locations/data centers currently include, for example: • Physical access requires authorization and is monitored • All employees and visitors must visibly wear official identification while onsite • Visitors must sign a visitor's register and be escorted and/or observed while onsite • Possession of keys/access cards and the ability to access the locations is monitored. Staff leaving Oracle employment must return keys/cards Additional physical security safeguards are in place for Oracle-controlled Cloud data centers, which currently include safeguards such as: • Premises are monitored by CCTV • Entrances are protected by physical barriers designed to prevent unauthorized entry by vehicles • Entrances are manned 24 hours a day, 365 days a year by security guards who perform visual identity recognition and visitor escort management • Safeguards related to environmental hazards • Any physical movement of equipment is controlled by hand-delivered receipts and other authorized change control procedures • Network cables are protected by conduits and, where possible, avoid routes through public areas This section does not apply to Oracle Cloud at Customer Services. You must provide Your own secure computing facilities for the hosting and operation of the Oracle Cloud at Customer Services-related hardware (including the gateway equipment) and network connections required for Oracle to provide the Oracle Cloud at Customer Services.
Physical Security Safeguards. Hearsay shall use third-party data centers that have annual SSAE 16 (or comparable audit engagement performed. In the event that such data center(s) become non-compliant with the requirements, then Hearsay, in a reasonable time period, will discontinue using such third party and find an alternative third party that will meet the requirements. Upon Customer’s written request, subject to the data center’s requirements, Hearsay will either (i) provide to Customer a copy of its data centers’ audit report pursuant to the confidentiality restrictions stated in the Agreement, or (ii) facilitate for Customer to receive such report directly from the data center under a confidentiality agreement between Customer and such data center. In the event that such data center(s) become non-compliant with the requirements, then Hearsay, in a reasonable time period, will discontinue using such third party and find an alternative third party that will meet the requirements.
Physical Security Safeguards. Oracle employs measures designed to prevent unauthorized persons from gaining access to computing facilities in which Your Content is hosted such as the use of security personnel, secured buildings, and designated data center premises. Oracle provides secured computing facilities for both Oracle Cloud Hosting and Delivery Policies Page 5 of 18 office locations and production cloud infrastructure. Common controls between office locations and Oracle controlled co-locations/data centers currently include, for example: Additional physical security safeguards are in place for Oracle-controlled Cloud data centers, which currently include safeguards such as: This section does not apply to Oracle Cloud at Customer Services. You must provide Your own secure computing facilities for the hosting and operation of the Oracle Cloud at Customer Services-related hardware (including the gateway equipment) and network connections required for Oracle to provide the Oracle Cloud at Customer Services.

Related to Physical Security Safeguards

  • Physical Security Contractor shall ensure that Medi-Cal PII is used and stored in an area that is physically safe from access by unauthorized persons during working hours and non- working hours. Contractor agrees to safeguard Medi-Cal PII from loss, theft or inadvertent disclosure and, therefore, agrees to: A. Secure all areas of Contractor facilities where personnel assist in the administration of the Medi-Cal program and use or disclose Medi-Cal PII. The Contractor shall ensure that these secure areas are only accessed by authorized individuals with properly coded key cards, authorized door keys or access authorization; and access to premises is by official identification. B. Ensure that there are security guards or a monitored alarm system with or without security cameras 24 hours a day, 7 days a week at Contractor facilities and leased facilities where a large volume of Medi-Cal PII is stored. C. Issue Contractor personnel who assist in the administration of the Medi-Cal program identification badges and require County Workers to wear the identification badges at facilities where Medi-Cal PII is stored or used. D. Store paper records with Medi-Cal PII in locked spaces, such as locked file cabinets, locked file rooms, locked desks or locked offices in facilities which are multi-use (meaning that there are personnel other than contractor personnel using common areas that are not securely segregated from each other.) The contractor shall have policies which indicate that Contractor and their personnel are not to leave records with Medi-Cal PII unattended at any time in vehicles or airplanes and not to check such records in baggage on commercial airlines. E. Use all reasonable measures to prevent non-authorized personnel and visitors from having access to, control of, or viewing Medi-Cal PII.

  • Security Safeguards (a) Each party acknowledges that it is solely responsible for determining and communicating to the other the appropriate technological, physical and organizational security measures required to protect Personal Data. (b) Each party will ensure that Personal Data is protected in accordance with the security safeguards communicated and agreed to by the other. (c) Each party will ensure that any third party to whom Personal Data is transferred is bound by the applicable terms of this section. (d) Additional or different services required to comply with the Laws will be deemed a request for new services.

  • Technical Security Controls 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.

  • Technical Safeguards 1. USAC and DSS will process the data matched and any data created by the match under the immediate supervision and control of authorized personnel to protect the confidentiality of the data, so unauthorized persons cannot retrieve any data by computer, remote terminal, or other means. 2. USAC and DSS will strictly limit authorization to these electronic data areas necessary for the authorized user to perform their official duties. All data in transit will be encrypted using algorithms that meet the requirements of the Federal Information Processing Standard (FIPS) Publication 140-2 or 140-3 (when applicable). 3. Authorized system users will be identified by User ID and password, and individually tracked to safeguard against the unauthorized access and use of the system. System logs of all user actions will be saved, tracked and monitored periodically. 4. USAC will transmit data to DSS via encrypted secure file delivery system. For each request, a response will be sent back to USAC to indicate success or failure of transmission.

  • Personnel Security 6.1 Staff recruitment in accordance with government requirements for pre- employment checks; 6.2 Staff training and awareness of Departmental security and any specific contract requirements.

  • Contractor Security Clearance Customers may designate certain duties and/or positions as positions of “special trust” because they involve special trust responsibilities, are located in sensitive locations, or have key capabilities with access to sensitive or confidential information. The designation of a special trust position or duties is at the sole discretion of the Customer. Contractor or Contractor’s employees and Staff who, in the performance of this Contract, will be assigned to work in positions determined by the Customer to be positions of special trust, may be required to submit to background screening and be approved by the Customer to work on this Contract.

  • Physical and Environmental Security DST shall: (i) restrict entry to DST’s area(s) where Fund Confidential Information is stored, accessed, or processed solely to DST’s personnel or DST authorized third party service providers for such access; and (ii) implement commercially reasonable practices for infrastructure systems, including fire extinguishing, cooling, and power, emergency systems and employee safety.

  • Safeguards Business Associate, its Agent(s) and Subcontractor(s) shall implement and use appropriate safeguards to prevent the use or disclosure of PHI other than as provided for by this Agreement. With respect to any PHI that is maintained in or transmitted by electronic media, Business Associate or its Subcontractor(s) shall comply with 45 CFR sections 164.308 (administrative safeguards), 164.310 (physical safeguards), 164.312 (technical safeguards) and 164.316 (policies and procedures and documentation requirements). Business Associate or its Agent(s) and Subcontractor(s) shall identify in writing upon request from Covered Entity all of the safeguards that it uses to prevent impermissible uses or disclosures of PHI.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!