Policies for Information Security Sample Clauses

Policies for Information Security ensure the Supplier and the Supplier Group has comprehensive policies for information security that are approved by management, published and effectively communicated to all employees and relevant external parties;
AutoNDA by SimpleDocs
Policies for Information Security. Company agrees to implement a set of policies for information security that are defined, approved by management, published and communicated to employees and relevant external parties.

Related to Policies for Information Security

  • Requests for Information The Grantee shall fully and promptly comply with all reporting requirements and requests for information issued by the Department or its authorized designee. The Grantee shall provide such information in the format requested by the Department. The Grantee shall ensure that its staff, interns, volunteers, and subcontractors comply in a timely and complete manner with all the Department’s requests for information. The Grantee shall comply in a timely manner with requests by the Department or its authorized designee for financial information, records, and documents related to evaluating costs of programs and ser vices provided by the Grantee’s probation department. The Grantee shall timely submit any files or records of the Grantee’s juvenile probation department, or any facility or program operated by or under the authority of the Grantee, requested by the Department or its authorized designee as a part of the monitoring, auditing, or investigatory process.

  • Requests for Information (RFI) In the event the Contract Documents are not complete, definite, and clear, the Contractor shall request the Design Professional in writing for additional instructions and shall furnish the Owner a copy of the RFI. With reasonable promptness but not more than five days thereafter, the Design Professional shall furnish complete, definite, and clear instructions in writing, or by means of drawings, or both. In the event such additional instructions are given orally for expediency, they shall be confirmed in writing or by drawings or both within five days following the oral instructions. Any such additional instructions shall be consistent with the Contract Documents and reasonably inferable therefrom. The Work shall be executed in conformity with the aforesaid instructions. The Design Professional shall furnish the Owner a copy of all additional instructions issued to the Contractor. If, because of events beyond its reasonable control, the Design Professional is not able to meet the specified time period, then it is entitled to ask for additional time from the Owner.

  • Request for Information (RFI) means a written request by Contractor directed to A/E or ODR for a clarification of the information provided in the Contract Documents or for direction concerning information necessary to perform the Work that may be omitted from the Contract Documents.

  • Information Security IET information security management practices, policies and regulatory compliance requirements are aimed at assuring the confidentiality, integrity and availability of Customer information. The UC Xxxxx Cyber-safety Policy, UC Xxxxx Security Standards Policy (PPM Section 310-22), is adopted by the campus and IET to define the responsibilities and key practices for assuring the security of UC Xxxxx computing systems and electronic data.

  • Subscriber Information Please print your individual or entity name and address. Joint subscribers should provide their respective names. Your name and address will be recorded exactly as printed below.

  • RESPONDING TO REQUESTS FOR INFORMATION To the extent authorized by the Participating Consumer(s) and to the extent such individual permission is required by law, the Competitive Supplier shall, during normal business hours (as set forth above), respond promptly and without charge therefore to reasonable requests of the Town for information or explanation regarding the matters covered by this ESA and the supply of electricity to Participating Consumers. Competitive Supplier agrees to designate a service representative or representatives (the “Service Contacts”) who shall be available for these purposes, and shall identify the office address and telephone number of such representative(s). Whenever necessary to comply with this Article 5.3, the Service Contacts shall call upon other employees or agents of the Competitive Supplier to obtain such information or explanation as may be reasonably requested. Nothing in this Article 5.3 shall be interpreted as limiting the obligation of the Competitive Supplier to respond to complaints or inquiries from Participating Consumers, or to comply with any regulation of the Department or AG regarding customer service.

  • Mobile Subscriber Information You authorize your wireless carrier to disclose information about your account, such as subscriber status, payment method and device details, if available, to support identity verification, fraud avoidance and other uses in support of transactions for the duration of your business relationship with us. This information may also be shared with other companies to support your transactions with us and for identity verification and fraud avoidance purposes.

  • Personal Information security breach Supplier/Service Provider’s Obligations

  • Member Information a. ODM, or its designee, will provide membership notices, informational materials, and instructional materials to members and eligible individuals in a manner and format that may be easily understood. At least annually, ODM or its designee will provide current MCP members with an open enrollment notice which describes the managed care program and includes information on the MCP options in the service area and other information regarding the managed care program as specified in 42 CFR 438.10.

  • Use of De-identified information De-identified information may be used by the Contractor for the purposes of development, research, and improvement of educational sites, services, or applications, as any other member of the public or party would be able to use de-identified data pursuant to 34 CFR 99.31(b). Contractor agrees not to attempt to re-identify de-identified Student Data.

Time is Money Join Law Insider Premium to draft better contracts faster.