Safeguarding of Keys Sample Clauses

Safeguarding of Keys. Procedures are in place to safeguard all cryptographic material, including certificates. IS Security is given copies of keys for safekeeping
AutoNDA by SimpleDocs

Related to Safeguarding of Keys

  • Safeguarding The Local Authority has overarching responsibility for safeguarding and promoting the welfare of all children and young people in their area. They have a number of statutory functions under the 1989 and 2004 Children Acts which make this clear, and the ‘Working Together to Safeguard Children’ 2015 guidance1 sets these out in detail.

  • Safeguarding requirements and procedures (1) The Contractor shall apply the following basic safeguarding requirements and procedures to protect covered contractor information systems. Requirements and procedures for basic safeguarding of covered contractor information systems shall include, at a minimum, the following security controls: (i) Limit information system access to authorized users, processes acting on behalf of authorized users, or devices (including other information systems). (ii) Limit information system access to the types of transactions and functions that authorized users are permitted to execute. (iii) Verify and control/limit connections to and use of external information systems. (iv) Control information posted or processed on publicly accessible information systems. (v) Identify information system users, processes acting on behalf of users, or devices. (vi) Authenticate (or verify) the identities of those users, processes, or devices, as a prerequisite to allowing access to organizational information systems. (vii) Sanitize or destroy information system media containing Federal Contract Information before disposal or release for reuse. (viii) Limit physical access to organizational information systems, equipment, and the respective operating environments to authorized individuals. (ix) Escort visitors and monitor visitor activity; maintain audit logs of physical access; and control and manage physical access devices. (x) Monitor, control, and protect organizational communications (i.e., information transmitted or received by organizational information systems) at the external boundaries and key internal boundaries of the information systems. (xi) Implement subnetworks for publicly accessible system components that are physically or logically separated from internal networks. (xii) Identify, report, and correct information and information system flaws in a timely manner. (xiii) Provide protection from malicious code at appropriate locations within organizational information systems. (xiv) Update malicious code protection mechanisms when new releases are available. (xv) Perform periodic scans of the information system and real-time scans of files from external sources as files are downloaded, opened, or executed.

  • Referral Procedures Section 1. For Local Unions now having a job referral system as contained in their Collective Bargaining Agreement, the Contractor agrees to utilize such system and it shall be used exclusively by such Contractor, except as it may be modified by this Article. Referrals shall not be affected by obligations of Union membership or the lack thereof. Where airport security clearance requirements apply to work to be performed, the Contractor shall inform the Union’s hiring hall dispatcher of those requirements when requesting workers. Section 2. In the event that Local Unions are unable to fill any request for employees within the time specified by the local CBAs the Contractor may employ applicants from any other available source. The Contractor shall inform the Union of the name and social security number of any applicants hired from other sources and shall refer the applicant to the Local Union for dispatch to the projects prior to the commencement of work. Section 3. There shall be no discrimination against any employee or applicant for employment because of his/her membership or non-membership in the union or based upon race, creed, color, sex, age or national origin, or any other legally protected class of such employee or applicant. Section 4. No employee covered by this Agreement shall be required to join any Union as a condition of being employed on the project; provided, however, that an employee who is a member of the referring union at the time of the referral shall maintain that membership while employed under the Agreement. All employees shall, however, be required to comply with the union security provision of the applicable Collective Bargaining Agreement, for the period during which they are performing on-site work, except as modified by this Agreement. The Contractor agrees to deduct union dues or representation fees, whichever is applicable, from the pay of any employee who executes a voluntary authorization for such deductions and to remit the dues to the Union or Council. Section 5. The parties agree that where a Contractor is not party to a current Collective Bargaining Agreement with the Union having jurisdiction over the affected work, the Contractor may request by name, and the Local will honor, referral of up to a maximum of five (5) persons per each contractor (“core” employees), provided that the Contractor first demonstrate that those persons possess the following qualifications: (1) Any license required by state or federal law for the project work to be performed; (2) Have worked a total of at least one thousand (1,000) hours in the construction craft during the prior three (3) years; (3) Were on the Contractor’s active payroll for at least sixty (60) out of the one hundred eighty (180) calendar days prior to the contract award; (4) Have the ability to perform the work safely. The Contractor may elect to hire its first “core” employee to be a xxxxxxx. After the contractor hires his first core employee, the Union will refer to such contractor one journeyman employee from the hiring hall out-of–work list for the affected trade or craft, then refer one of such Contractor’s “core” employees as a journeyman, and shall, alternate, one core employee and one employee from the out-of-work list, until such Contractor’s crew requirements are met or until such Contractor has hired five (5) “core” employees, whichever occurs first. Thereafter, all additional employees in the affected trade or craft shall be hired exclusively from the hiring hall out-of-work list(s). For the duration of the Contractor’s work the ratio of “core” employees to hiring hall referrals shall be maintained and when the Contractor’s workforce is reduced, employees shall be reduced in the same ratio as was applied in the initial hiring. All employees, core and union, shall be dispatched from the appropriate union. Trust benefits shall be paid on all employees, core and union. Section 6. Upon referral or dispatch from a Union, “turnaround” or refusal of any worker by the Contractors, requires written explanation from the Contractor that shall be communicated from the Prime Contractor to the Port and affected Union within 48 hours. Section 7. Individual seniority will not be recognized or applied to employees working on the project. This provision will not interfere with or supersede the use by individual Contractors of “call lists” maintained by such Contractor pursuant to addenda to the local Collective Bargaining Agreement between such Contractor and a Union signatory to this Agreement. Section 8. The selection of craft foremen and/or general foremen and the number of such foremen and/or general foremen required shall be entirely the responsibility of the Contractor. Craft foremen shall be designated working foremen at the request of the Contractor. Craft workers covered by this Agreement will, in the normal day- to-day operations, take their direction and supervision from their xxxxxxx.

  • Safeguards for Personal Information Supplier agrees to develop, implement, maintain, and use administrative, technical, and physical safeguards, as deemed appropriate by DXC, to preserve the security, integrity and confidentiality of, and to prevent intentional or unintentional non-permitted or violating use or disclosure of, and to protect against unauthorized access to or accidental or unlawful destruction, loss, or alteration of, the Personal Information Processed, created for or received from or on behalf of DXC in connection with the Services, functions or transactions to be provided under or contemplated by this Agreement. Such safeguards shall meet all applicable legal standards (including any encryption requirements imposed by law) and shall meet or exceed accepted security standards in the industry, such as ISO 27001/27002. Supplier agrees to document and keep these safeguards current and shall make the documentation available to DXC upon request. Supplier shall ensure that only Supplier’s employees or representatives who may be required to assist Supplier in meeting its obligations under this Agreement shall have access to the Personal Information.

  • Customer Information CPNI of a Customer and any other non-public, individually identifiable information about a Customer or the purchase by a Customer of the services or products of a Party.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!