Safeguarding Procedures. Treated fruit must be brought to an insect-free enclosure immediately after treatment, and must remain there until it is loaded into a clean and insect-proof means of conveyance. The designated enclosure is usually a screened room. Packing line equipment, hydrocooling equipment, if used, and a cold storage room should be located in this area.
Safeguarding Procedures. Supplier shall establish and maintain environmental, safety and facility procedures, data security procedures and other safeguards against the destruction, loss, unauthorized access or alteration of Kraft Data in the possession of Supplier which are (i) no less rigorous than those maintained by Kraft as of the Effective Date and made available to Supplier at its request (or implemented by Kraft in the future to the extent deemed necessary by Kraft), including the security and control requirements described in Schedule 17.1 and elsewhere in this Agreement; and (ii) no less rigorous than those maintained by Supplier for its own information of a similar nature where the Kraft Data is being maintained at a Supplier Facility, and, after completion of Transformation or Transition, as applicable, for Kraft Data maintained by Supplier at a Kraft Site, subject to Kraft’s responsibility for maintaining physical security at such Kraft Site; (iii) no less rigorous than accepted security standards in the industry (such as ISO 17799), and (iv) adequate to permit Supplier to meet its obligations under Section 13.3. Within 90 days following the Effective Date, Supplier shall evaluate the then-current Kraft security policy and shall prepare and submit for Kraft review and approval recommendations with respect to changes or modifications to such policy. Supplier shall maintain and enforce the then-current Kraft security policy until any changes or modifications are approved by Kraft in writing for implementation. The Parties acknowledge and agree that modifications or additions to the Kraft security or other policies or the information security requested by Kraft after the Effective Date may result in Supplier performing New Services to comply with such modifications or additions if such services meet the definition of New Services. Kraft shall have the right to establish backup security for Kraft Data and to keep backup copies of the Kraft Data in Kraft’s possession at Kraft’s expense if Kraft so chooses. Supplier shall provide Kraft with downloads of Kraft Data, as requested by Kraft, to enable Kraft to maintain such backup security or backup copies of Kraft Data. Supplier shall remove all Kraft Data from any media taken out of service and shall destroy or securely erase such media in accordance with the Policy and Procedures Manual. No media on which Kraft Data is stored may be used or re-used to store data of any other customer of Supplier or to deliver data to a third ...
Safeguarding Procedures. Provider shall establish and maintain environmental, safety and facility procedures, data security procedures and other safeguards against the destruction, loss, unauthorized access or alteration of Williams Data in the possession of Provider which are (i) no less rigorous than those maintained by Williams as of the Commencement Date (or implemented by Williams in the future to the extent deemed necessary by Williams), (ii) no less rigorous than those maintained by Provider for its own information of a similar nature, and (iii) adequate to meet the requirements of Williams's records retention policy and applicable Laws. Provider will revise and maintain such procedures and safeguards upon Williams's request. Williams shall have the right to establish backup security for Williams Data and to keep backup copies of the Williams Data in Williams's possession at Williams's expense if Williams so chooses. Provider shall remove all Williams Data from any media taken out of service and shall destroy or securely erase such media in accordance with the Policy and Procedures Manual. No media on which Williams Data is stored may be used or re-used to store data of any other customer of Provider or to deliver data to a third party, including another Provider customer, unless securely erased in accordance with the Policy and Procedures Manual. In the event Provider discovers or is notified of a breach or potential breach of security relating to Williams Data, Provider shall (i) expeditiously notify Williams of such breach or potential breach, (ii) investigate such breach or potential breach and perform a Root Cause Analysis thereon, (iii) remediate the effects of such breach or potential breach of security, and (iv) provide Williams with such assurances as Williams shall request that such breach or potential breach will not recur. Final Confidential and Proprietary Information of IBM and Williams
Safeguarding Procedures. HP-OMS shall establish and maintain environmental, safety and facility procedures, data security procedures and other safeguards against the destruction, loss, unauthorized access or alteration of Customer Data in the possession of HP-OMS which are in accordance with Customer's security policy to be established as described in Exhibit D-. HP-OMS shall provide to Customer backup copies of Customer Data, in accordance with Customer's backup procedures in effect as of the Commmencement Date, and Customer shall have the right to keep such backup copies of the Customer Data in Customer's or a third party's possession at Customer's expense if Customer so chooses. HP-OMS shall remove all Customer Data from any media taken out of service and shall destroy or securely erase such media. No media on which Customer Data is stored may be used or re-used to store data of any other customer of HP-OMS or to deliver data to a third party, including another HP-OMS customer, unless securely erased. In the event HP-OMS discovers or is notified of a breach or potential breach of security relating to Customer Data, HP-OMS will promptly notify Customer and investigate and remedy the effects of such breach or potential breach of security.
Safeguarding Procedures. (i) CSC shall establish and maintain environmental, safety and facility procedures, data security procedures and other safeguards against the destruction, loss, unauthorized access or alteration of Sears Data in the possession of CSC or the CSC Personnel that are no less rigorous than the most rigorous procedures and safeguards maintained by Sears or CSC from time to time, and at least adequate to meet the requirements of Sears’ records retention policy and applicable Laws. CSC shall revise and maintain such procedures and safeguards upon Sears’ request. Sears shall have the right to establish backup security for Sears Data and to keep backup copies of the Sears Data in Sears’ possession at Sears’ expense if Sears so chooses. If CSC, its Affiliates or their Subcontractors revoke access to any of its Systems for any CSC Personnel for any reason (e.g., resignation, termination, security purposes, etc.), and such Personnel have or in the past have been given access to Sears Provided Systems, CSC shall immediately (1) notify Sears’ designated security contact of such revocation of access rights, and (2) revoke such CSC Personnel’s access to all Sears Provided Systems for which CSC has operational responsibilities.
Safeguarding Procedures. Supplier shall establish and maintain environmental, safety and facility procedures, data security procedures and other safeguards against the destruction, loss, unauthorized access or alteration of ABM Data in the possession of Supplier which are (i) no less rigorous than those maintained by ABM as of the Commencement Date (or implemented by ABM in the future to the extent deemed necessary by ABM and disclosed in writing to Supplier), and (ii) subject to Section 15.10, adequate to meet the requirements of ABM’s privacy, security and record retention policies and applicable Laws. ABM shall have the right to establish backup ABM/IBM Proprietary Information security for ABM Data and to keep backup copies of the ABM Data in ABM possession at ABM expense if ABM so chooses. Supplier shall remove all ABM Data from any media taken out of service and shall destroy or securely erase such media in accordance with the Policy and Procedures Manual. No media on which ABM Data is stored may be used or re-used to store data of any other customer of Supplier or to deliver data to, or store data of another Supplier customer, unless securely erased in accordance with the Policy and Procedures Manual.
Safeguarding Procedures. Children and Young People (under 18) Anyone who has concerns for the immediate safety of a child or young person must phone: • The Assessment and Intervention Team on 01925 446257 (Monday –Friday 8.45 am- 5pm) • Out of Hours Service (Emergency Duty Team) on 01925 444400 Do not hesitate. Seek support and advice immediately.
Safeguarding Procedures. 17.1 The Provider must adopt and implement a safeguarding policy which is compatible with the Council’s Councils Safeguarding Policies as issued and amended from time to time by the Council’s Safeguarding Committee. The Provider shall take note of the Councils safeguarding policies, (Appendix 1) depending on whether the services are for children or vulnerable adults.
Safeguarding Procedures. Service Provider shall establish and maintain environmental, safety and facility procedures, data security procedures and other safeguards against the destruction, loss, unauthorized access or alteration of Allegheny Data in the possession of Service Provider which are (i) no less rigorous than those maintained by Allegheny as of the Effective Date (or implemented by Allegheny in the future to the extent deemed necessary by Allegheny), including Allegheny’s privacy, security and records retention policies which have been provided or made available by Allegheny to Service Provider in writing (which may include electronic communications and notices of the applicable information contained on a website with directions to the relevant location on the website that contains such information) and the security and control requirements under this Agreement, and (ii) no less rigorous than those maintained by Service Provider for its own information of a similar nature, which shall be no less rigorous than accepted security standards in the industry (such as ISO 17799). Within sixty (60) days following the Effective Date, Service Provider shall evaluate the then-current Allegheny security policy and shall prepare and submit for Allegheny review and approval recommendations with respect to changes or modifications to such policy. Service Provider shall maintain and enforce the then-current Allegheny security policy until any changes or modifications are approved by Allegheny for implementation. *** Allegheny shall have the right to establish backup security for Allegheny Data and to keep backup copies of the Allegheny Data in Allegheny’s possession at Allegheny’s expense if Allegheny so chooses. Service Provider shall provide Allegheny with downloads of Allegheny Data, as requested and directed by Allegheny, to enable Allegheny to maintain such backup security or backup copies of Allegheny Data. Service Provider shall remove all Allegheny Data from any media taken out of service and shall destroy or securely erase such media in accordance with the Policy and Procedures Manual. No media on which Allegheny Data is stored may be used or re-used to store data of any other customer of Service Provider or to deliver data to a third party, including another Service Provider customer, unless securely erased in accordance with the Policy and Procedures Manual. In the event Service Provider discovers or is notified of a breach or potential breach of security relating to Alleghen...
Safeguarding Procedures. Amdocs shall establish and maintain environmental, safety and facility procedures, data security procedures and other safeguards against the destruction, loss, unauthorized access or alteration of SBC Data in the possession of Amdocs which are [**] as of the Commencement Date [**] and applicable Laws. Amdocs will revise and maintain such procedures and safeguards upon SBC's request. SBC shall have the right to establish backup security for SBC Data and to keep backup copies of the SBC Data in SBC possession at SBC expense if SBC so chooses. Amdocs shall remove all SBC Data from any media taken out of service and shall destroy or securely erase such media in accordance with the Policy and Procedures Manual. No media on which SBC Data is stored may be used or re-used to store data of any other customer of Amdocs or to deliver data to a third party, including another Amdocs customer, RESTRICTED - PROPRIETARY INFORMATION The information contained herein is for use by authorized employees of SBC, Amdocs, and their Affiliated Companies, only, and is not for general distribution within those companies or for distribution outside those companies except by written agreement. unless securely erased in accordance with the Policy and Procedures Manual. In the event Amdocs discovers or is notified of a breach or potential breach of security relating to SBC Data, Amdocs will expeditiously under the circumstances notify SBC and investigate and remediate the effects of such breach or potential breach of security and will provide SBC with such assurances as SBC shall request that such breach or potential breach will not recur.