Policing and Security Programs Branch Sample Clauses

Policing and Security Programs Branch. (a) Police Services Division - by location (b) Security Programs Division - by location
AutoNDA by SimpleDocs

Related to Policing and Security Programs Branch

  • DATA HANDLING AND SECURITY It will always be the responsibility of the selected Contractor to manage data transfer and to secure all data appropriately during the project to prevent unauthorized access to all data, products, and deliverables.

  • Security Program Contractor will develop and implement an effective security program for the Project Site, which program shall require the Contractor and subcontractors to take measures for the protection of their tools, materials, equipment, and structures. As between Contractor and Owner, Contractor shall be solely responsible for security against theft of and damage of all tools and equipment of every kind and nature and used in connection with the Work, regardless of by whom owned.

  • Information Security Program (1) DTI shall implement and maintain a comprehensive written information security program applicable to the Personal Information ("Information Security Program") which shall include commercially reasonable measures, including, as appropriate, policies and procedures and technical, physical, and administrative safeguards that are consistent with industry standards, providing for (i) the security and confidentiality of the Personal Information, (ii) protection of the Personal Information against reasonably foreseeable threats or hazards to the security or integrity of the Personal Information, (iii) protection against unauthorized access to or use of or loss or theft of the Personal Information, and (iv) appropriate disposal of the Personal Information. Without limiting the generality of the foregoing, the Information Security Program shall provide for (i) continual assessment and re-assessment of the risks to the security of Personal Information acquired or maintained by DTI and its agents, contractors and subcontractors in connection with the Services, including but not limited to (A) identification of internal and external threats that could result in unauthorized disclosure, alteration or destruction of Personal Information and systems used by DTI and its agents, contractors and subcontractors, (B) assessment of the likelihood and potential damage of such threats, taking into account the sensitivity of such Personal Information, and (C) assessment of the sufficiency of policies, procedures, information systems of DTI and its agents, contractors and subcontractors, and other arrangements in place, to control risks; and (ii) appropriate protection against such risks.

  • Background Screening and Security 14 These General Contract Conditions supersede and replace in their entirety all General Contract Conditions, Form PUR 1000, which is incorporated by reference in Rule 60A-1.002, Florida Administrative Code (F.A.C.)

  • Procurement of Goods and Services (a) If the HSP is subject to the procurement provisions of the BPSAA, the HSP will abide by all directives and guidelines issued by the Management Board of Cabinet that are applicable to the HSP pursuant to the BPSAA.

  • SECURITY PROCESSES If requested by an Authorized User as part the Request for Quote process, Contractor shall complete a Consensus Assessment Initiative Questionnaire (CAIQ) including on an annual basis thereafter, if requested by the Authorized User. The CAIQ is available at Cloud Security Alliance (xxxxx://xxxxxxxxxxxxxxxxxxxxx.xxx/). The CAIQ may be used to assist the Authorized User in building the necessary assessment processes when engaging with Contractors. In addition to a request for a CAIQ, Contractor shall cooperate with all reasonable Authorized User requests for a Written description of Contractor’s physical/virtual security and/or internal control processes. The Authorized User shall have the right to reject any Contractor’s RFQ response or terminate an Authorized User Agreement when such a request has been denied. For example, Federal, State and local regulations and/or laws may require that Contractors operate within the Authorized User’s regulatory environment. In order to ensure that security is adequate and free of gaps in control coverage, the Authorized User may require information from the Contractor’s Service Organization Controls (SOC) audit report.

  • Credit Cards About 93% of graduating students report they have at least one credit card, including 29% who say they have two or more. Among those students who have credit cards, about 79% report they pay off their balance each month and, as such, their current credit card balance is zero; however, when asked what their current credit card balance is, just 37% say it is zero. Among those with an unpaid balance, the average credit card debt students have is $2,771. Table 47: Credit cards All students (n=14,760) Group University of Victoria (n=339) 1 (n=3,531) 2 (n=6,238) 3 (n=4,991) Number of credit cards (FIN1) None 7% 8% 7% 7% 4% One 64% 65% 62% 66% 65% Two 21% 19% 22% 20% 24% Three or more 8% 7% 8% 7% 8% Regularly pay off balance each month* (FIN2) Yes 79% 70% 81% 80% 77% Total credit card balance* (FIN3) Zero 37% 34% 37% 38% 39% $500 or less 14% 14% 13% 14% 12% $501 to $1,000 6% 6% 6% 7% 5% Over $1,000 10% 14% 8% 10% 10% Don't know 33% 32% 36% 31% 34% Average (those with credit card) $792 $1,176 $655 $753 $639 Average (those with unpaid balance) $2,771 $3,366 $2,395 $2,745 $2,334 * Total credit card balance and payment of the balance were asked of those who had at least one credit card.

  • Security Protocols Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.

  • Data and Security If Contractor is granted access to Court Data, Confidential Information or Court Work Locations in the performance of the Work;

  • Mobile Banking Services Mobile Banking is a personal financial information management service that allows you to access account information and conduct transactions using compatible and supported mobile phones and/or other compatible and supported wireless devices (including phones, "Wireless Devices"). We reserve the right to modify the scope of the Mobile Banking services at any time. We reserve the right to refuse to make any transaction you request through Mobile Banking. You agree and understand that Mobile Banking may not be accessible or may have limited utility over some mobile telephone networks, such as while roaming.

Time is Money Join Law Insider Premium to draft better contracts faster.