Practical Security Measures Sample Clauses

Practical Security Measures. While the Contract imposes the obligation on the Processor to take “such Technical and Organisation Security Measures as are required under its own National Law to protect personal data processed on behalf of the Data Controller against unlawful forms of processing” many businesses may find it difficult to ascertain what this obligation means in practice. The obligation is a broad one and businesses will need to break this down into the classes of security measures identified in the appendix. These classes will require further practical consideration. Many international IT groups and standards bodies have looked at the area of information security and guidance of general application is available from many of the bodies referred to below (see Sources). An example of appropriate basic information security measures are set out in Annex 1 of this Implementation Guide.
AutoNDA by SimpleDocs
Practical Security Measures 

Related to Practical Security Measures

  • Security Measures Lessee hereby acknowledges that the rental payable to Lessor hereunder does not include the cost of guard service or other security measures, and that Lessor shall have no obligation whatsoever to provide same. Lessee assumes all responsibility for the protection of the Premises, Lessee, its agents and invitees and their property from the acts of third parties.

  • Safety Measures Awarded vendor shall take all reasonable precautions for the safety of employees on the worksite, and shall erect and properly maintain all necessary safeguards for protection of workers and the public. Awarded vendor shall post warning signs against all hazards created by the operation and work in progress. Proper precautions shall be taken pursuant to state law and standard practices to protect workers, general public and existing structures from injury or damage.

  • Emergency Measures Additional measures and/or other special requirements necessary during periods of critical fire-weather conditions shall be included in the fire prevention and presuppression plan.

  • Technical Security Controls 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.

  • Security Safeguards Contractor shall store and process District Data in accordance with commercial best practices, including implementing appropriate administrative, physical, and technical safeguards that are no less rigorous than those outlined in SANS Top 20 Security Controls, as amended, to secure such data from unauthorized access, disclosure, alteration, and use. Contractor shall ensure that all such safeguards, including the manner in which District Data is collected, accessed, used, stored, processed, disposed of and disclosed, comply with all applicable federal and state data protection and privacy laws, regulations and directives, including without limitation C.R.S. § 00-00-000 et seq., as well as the terms and conditions of this Addendum. Without limiting the foregoing, and unless expressly agreed to the contrary in writing, Contractor warrants that all electronic District Data will be encrypted in transmission and at rest in accordance with NIST Special Publication 800-57, as amended.

  • Safeguard Measures The Parties note the multilateral negotiations pursuant to Article X of GATS on the question of emergency safeguard measures based on the principle of non-discrimination. Upon the conclusion of such multilateral negotiations, the Parties shall conduct a review for the purpose of discussing appropriate amendments to this Agreement so as to incorporate the results of such multilateral negotiations.

  • Temporary Safeguard Measures 1. A Contracting Party may adopt or maintain measures not conforming with its obligations under Article 2 relating to cross- border capital transactions and Article 15: (a) in the event of serious balance-of-payments and external financial difficulties or threat thereof; or (b) in cases where, in exceptional circumstances, Movements of capital cause or threaten to cause serious difficulties for macroeconomic management, in particular, monetary and exchange rate policies. 2. Measures referred to in paragraph 1: (a) shall be consistent with the Articles of Agreement of the International Monetary Fund, so long as the Contracting Party taking the measures is a party to the said Articles; (b) shall not exceed those necessary to deal with the circumstances set out in paragraph 1; (c) shall be temporary and shall be eliminated as soon as conditions permit; (d) shall be promptly notified to the other Contracting Party; and (e) shall avoid unnecessary damages to the commercial, economic and financial interests of the other Contracting Party. 3. Nothing in this Agreement shall be regarded as altering the rights enjoyed and obligations undertaken by a Contracting Party as a party to the Articles of Agreement of the International Monetary Fund.

  • Technical Safeguards 1. USAC and DSS will process the data matched and any data created by the match under the immediate supervision and control of authorized personnel to protect the confidentiality of the data, so unauthorized persons cannot retrieve any data by computer, remote terminal, or other means. 2. USAC and DSS will strictly limit authorization to these electronic data areas necessary for the authorized user to perform their official duties. All data in transit will be encrypted using algorithms that meet the requirements of the Federal Information Processing Standard (FIPS) Publication 140-2 or 140-3 (when applicable). 3. Authorized system users will be identified by User ID and password, and individually tracked to safeguard against the unauthorized access and use of the system. System logs of all user actions will be saved, tracked and monitored periodically. 4. USAC will transmit data to DSS via encrypted secure file delivery system. For each request, a response will be sent back to USAC to indicate success or failure of transmission.

  • Contractor Security Clearance Customers may designate certain duties and/or positions as positions of “special trust” because they involve special trust responsibilities, are located in sensitive locations, or have key capabilities with access to sensitive or confidential information. The designation of a special trust position or duties is at the sole discretion of the Customer. Contractor or Contractor’s employees and Staff who, in the performance of this Contract, will be assigned to work in positions determined by the Customer to be positions of special trust, may be required to submit to background screening and be approved by the Customer to work on this Contract.

  • Measures SAP protects its assets and facilities using the appropriate means based on the SAP Security Policy • In general, buildings are secured through access control systems (e.g., smart card access system). • As a minimum requirement, the outermost entrance points of the building must be fitted with a certified key system including modern, active key management. • Depending on the security classification, buildings, individual areas and surrounding premises may be further protected by additional measures. These include specific access profiles, video surveillance, intruder alarm systems and biometric access control systems. • Access rights are granted to authorized persons on an individual basis according to the System and Data Access Control measures (see Section 1.2 and 1.3 below). This also applies to visitor access. Guests and visitors to SAP buildings must register their names at reception and must be accompanied by authorized SAP personnel. • SAP employees and external personnel must wear their ID cards at all SAP locations.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!