Safeguarding Procedures Sample Clauses

Safeguarding Procedures. Supplier shall establish and maintain environmental, safety and facility procedures, data security procedures and other safeguards against the destruction, loss, unauthorized access or alteration of Kraft Data in the possession of Supplier which are (i) no less rigorous than those maintained by Kraft as of the Effective Date and made available to Supplier at its request (or implemented by Kraft in the future to the extent deemed necessary by Kraft), including the security and control requirements described in Schedule 17.1 and elsewhere in this Agreement; and (ii) no less rigorous than those maintained by Supplier for its own information of a similar nature where the Kraft Data is being maintained at a Supplier Facility, and, after completion of Transformation or Transition, as applicable, for Kraft Data maintained by Supplier at a Kraft Site, subject to Kraft’s responsibility for maintaining physical security at such Kraft Site; (iii) no less rigorous than accepted security standards in the industry (such as ISO 17799), and (iv) adequate to permit Supplier to meet its obligations under Section 13.3. Within 90 days following the Effective Date, Supplier shall evaluate the then-current Kraft security policy and shall prepare and submit for Kraft review and approval recommendations with respect to changes or modifications to such policy. Supplier shall maintain and enforce the then-current Kraft security policy until any changes or modifications are approved by Kraft in writing for implementation. The Parties acknowledge and agree that modifications or additions to the Kraft security or other policies or the information security requested by Kraft after the Effective Date may result in Supplier performing New Services to comply with such modifications or additions if such services meet the definition of New Services. Kraft shall have the right to establish backup security for Kraft Data and to keep backup copies of the Kraft Data in Kraft’s possession at Kraft’s expense if Kraft so chooses. Supplier shall provide Kraft with downloads of Kraft Data, as requested by Kraft, to enable Kraft to maintain such backup security or backup copies of Kraft Data. Supplier shall remove all Kraft Data from any media taken out of service and shall destroy or securely erase such media in accordance with the Policy and Procedures Manual. No media on which Kraft Data is stored may be used or re-used to store data of any other customer of Supplier or to deliver data to a third ...
AutoNDA by SimpleDocs
Safeguarding Procedures. (i) Provider shall establish and maintain safety and facility procedures, data security procedures and other safeguards against the destruction, loss, unauthorized access or alteration of Idearc Data in the possession of Provider that are no less rigorous than the greater of (i) those maintained by Idearc as of the Effective Date or as subsequently implemented by Idearc as such safeguards are set forth in the Policies and Procedures Manual or otherwise previously communicated (in writing or electronically) to Provider, (ii) those maintained by Provider for similarly situated customers receiving services of a similar nature, (iii) those safeguards utilized by Provider to protect its own similar data, or (iv) the information security requirements set forth in Exhibit C, Idearc’s Information Security Policy. Idearc will have the right to review and approve all such procedures (and any changes thereto) prior to implementation. (ii) Idearc will have the right to establish backup security for Idearc Data and to keep backup copies of the Idearc Data in Idearc’s possession at Idearc’s expense. Provider shall provide Idearc with downloads of Idearc Data, as reasonably requested by Idearc, to enable Idearc to maintain such backup security or backup copies of Idearc Data. Provider shall provide Idearc or its agents (subject to Provider’s reasonable security and confidentiality requirements) with prompt access to facilities and equipment under its control or for which it has the ability to provide such access upon reasonable notice (and, in any case, within five days of its receiving notice) for the purpose of allowing Idearc to copy and/or destroy any and all Idearc Data stored at such facilities and/or on such equipment. (iii) Provider shall remove all Idearc Data from any media taken out of service and shall destroy or securely erase such media in accordance with the Policies and Procedures Manual. No media on which Idearc Data is stored may be used or re-used to store data of any other customer of Provider or to deliver data to a third party, including another Provider customer, unless securely erased in accordance with the Policies and Procedures Manual. (iv) Provider shall not utilize any Idearc Data for any purpose other than the performance of Services under the Agreement, and Provider shall at all times comply with Idearc’s privacy policies to be set forth in the Policies and Procedures Manual or as otherwise previously communicated (in writing or electronica...
Safeguarding Procedures. Vendor shall establish and maintain environmental, safety and facility procedures, data security procedures and other safeguards against the destruction, loss or unauthorized access, use or alteration of TXUED Data in the possession of Vendor which are (i) no less rigorous than those maintained by TXUED as of the applicable Services Agreement Commencement Date (or implemented by TXUED in the future to the extent deemed necessary by TXUED), as the same may be amended or modified from time to time, and (ii) adequate to meet the requirements of TXUED’s then current records retention policy. Vendor will revise and maintain such procedures and safeguards upon TXUED’s request, and any Material Change resulting from additions or modifications to such procedures or safeguards shall be addressed through the Change Control Process. TXUED shall have the right to establish backup security for TXUED Data and to keep in its possession backup copies of TXUED Data at TXUED’s expense. Vendor shall remove all TXUED Data from any of its media, or media for which it is operationally responsible, taken out of service and shall destroy or securely erase such media in accordance with the Policy and Procedures Manual. No media on which TXUED Data is stored may be used or re-used to store data of any other customer of Vendor or to deliver data to a third party, including another Vendor customer, unless securely erased in accordance with the Policy and Procedures Manual. In the event Vendor discovers or is notified of a breach or potential breach of security relating to TXUED Data, Vendor shall (i) immediately notify TXUED of such breach or potential breach and perform a Root Cause Analysis thereon, (ii) investigate such breach or potential breach, (iii) if the breach is attributable to Vendor, remediate the effects of such breach or potential breach and (iv) if the breach is attributable to Vendor, provide TXUED with such assurances as TXUED shall request that such breach or potential breach will not recur.
Safeguarding Procedures. HP-OMS shall establish and maintain environmental, safety and facility procedures, data security procedures and other safeguards against the destruction, loss, unauthorized access or alteration of Customer Data in the possession of HP-OMS which are in accordance with Customer's security policy to be established as described in Exhibit D-. HP-OMS shall provide to Customer backup copies of Customer Data, in accordance with Customer's backup procedures in effect as of the Commmencement Date, and Customer shall have the right to keep such backup copies of the Customer Data in Customer's or a third party's possession at Customer's expense if Customer so chooses. HP-OMS shall remove all Customer Data from any media taken out of service and shall destroy or securely erase such media. No media on which Customer Data is stored may be used or re-used to store data of any other customer of HP-OMS or to deliver data to a third party, including another HP-OMS customer, unless securely erased. In the event HP-OMS discovers or is notified of a breach or potential breach of security relating to Customer Data, HP-OMS will promptly notify Customer and investigate and remedy the effects of such breach or potential breach of security.
Safeguarding Procedures. Supplier shall establish and maintain environmental, safety and facility procedures, data security procedures and other safeguards against the destruction, loss, unauthorized access or alteration of ABM Data in the possession of Supplier which are (i) no less rigorous than those maintained by ABM as of the Commencement Date (or implemented by ABM in the future to the extent deemed necessary by ABM and disclosed in writing to Supplier), and (ii) subject to Section 15.10, adequate to meet the requirements of ABM’s privacy, security and record retention policies and applicable Laws. ABM shall have the right to establish backup security for ABM Data and to keep backup copies of the ABM Data in ABM possession at ABM expense if ABM so chooses. Supplier shall remove all ABM Data from any media taken out of service and shall destroy or securely erase such media in accordance with the Policy and Procedures Manual. No media on which ABM Data is stored may be used or re-used to store data of any other customer of Supplier or to deliver data to, or store data of another Supplier customer, unless securely erased in accordance with the Policy and Procedures Manual.
Safeguarding Procedures. Treated fruit must be brought to an insect-free enclosure immediately after treatment, and must remain there until it is loaded into a clean and insect-proof means of conveyance. The designated enclosure is usually a screened room. Packing line equipment, hydrocooling equipment, if used, and a cold storage room should be located in this area. a) Ordinary window screen or mosquito netting (at least 100 meshes per square inch or 24 meshes per linear inch) is sufficient to exclude fruit flies. It must be inspected regularly and repaired as often as needed. b) Facilities must have a double door la instalación de tratamiento hidrotérmico que un tratamiento ha sido completado para una canasta (jaula) en particular. Este sistema puede ser un ruido perceptible (tal como una bocina o un timbre) o una xxx xxxx visible, junto al controlador de tiempo ubicado en el equipo que indica la hora y la temperatura.
Safeguarding Procedures. Vendor shall establish and maintain environmental, safety and facility procedures, data security procedures and other safeguards against the destruction, loss, unauthorized access, use or alteration of Oncor Data in the possession of Vendor which are (i) no less rigorous than those maintained by Oncor as of the applicable Services Agreement Commencement Date (or implemented by Oncor in the future to the extent deemed necessary by Oncor), as the same may be amended or modified from time to time, and (ii) adequate to meet the requirements of Oncor's then current records retention policy, as the same may be amended or modified from time to time (provided that any such amendment or modification is in accordance with the Adjustment Process and applicable laws). Vendor will revise and maintain such procedures and safeguards upon Oncor's reasonable request and in accordance with the Adjustment Process. Oncor shall have the right to establish backup security for Oncor Data and to keep in its possession backup copies of the Oncor Data at Oncor's expense. Vendor shall remove all Oncor Data from any media taken out of service and shall destroy or securely erase such media in accordance with the Policy and Procedures Manual. No media on which Oncor Data is stored may be used or re-used to store data of any other customer of Vendor or to deliver data to a third party, including another Vendor customer, unless securely erased in accordance with the Policy and Procedures Manual. In the event Vendor discovers or is notified of a breach or potential breach of security relating to Oncor Data, Vendor shall (i) immediately notify Oncor of such breach or potential breach and perform a Root Cause Analysis thereon, (ii) investigate such breach or potential breach, (iii) if the breach is attributable to Vendor, remediate the effects of such breach or potential breach, and (iv) if the breach is attributable to Vendor, provide Oncor with such assurances as Oncor shall request that such breach or potential breach will not recur.
AutoNDA by SimpleDocs
Safeguarding Procedures. The pharmacy must ensure all vaccines are stored in accordance with manufacturer’s instructions and national guidance including Chapter 3 Immunisation against infectious diseases: xxxxx://xxx.xxx.xx/government/collections/immunisation-against-infectious- disease-the-green-book Any breaches in vaccine cold chain must be reported to the vaccine manufacturer for advice.
Safeguarding Procedures. 17.1 The Provider must adopt and implement a safeguarding policy which is compatible with the Council’s Councils Safeguarding Policies as issued and amended from time to time by the Council’s Safeguarding Committee. The Provider shall take note of the Councils safeguarding policies, (Appendix 1) depending on whether the services are for children or vulnerable adults. 17.2 The Provider shall ensure that all staff, subcontractors and independent visitors know the procedure and what action to take if they observe, suspect or have reported to them, possible evidence of abuse to a service user and that they follow the Providers procedure. 17.3 The Authorised Officer shall be entitled, (but not unreasonably) following notice in writing, (such notice to give full reasons) to require the Provider to remove any member of staff from the provision of the service if a safeguarding issue has been identified. The Provider shall have the right to make representations to the Authorised Officer concerning the notice relating to such member of staff. After considering such representations the Authorised Officer shall give due consideration as to whether to withdraw such notice or ask that the notice is complied with. 17.4 The Council shall in no circumstances be liable either to the Provider or to the staff member in respect of any liability; loss or damage occasioned by any such removal in accordance with Sub-Clause 17.3 (above) and the Provider shall fully indemnify the Council against any claim made by any such employee. 17.5 The Provider will have a whistleblower policy which will be made available to all staff. 17.6 The Providers whistleblower policy shall state that all reports of suspected abuse are taken seriously and that staff can report legitimate concerns without prejudice to their employment or fear of any criticism or recrimination. For the avoidance of doubt this Sub-Clause 17.6 will also apply to senior managers and directors of the Provider and any visitors or subcontractors on site. 17.7 In the event of a manager being suspected of or implicated in the abuse of a service user, the Provider's policies should identify who within the Providers business structure staff should report any concerns to. 17.8 The Provider shall ensure that prompt and appropriate action is taken in the event of the suspected abuse of a service user by another adult or another service user, including the invoking of the Councils Safeguarding Procedures (see Appendix B). 17.9 Failure ...
Safeguarding Procedures. Amdocs shall establish and maintain environmental, safety and facility procedures, data security procedures and other safeguards against the destruction, loss, unauthorized access or alteration of AT&T Data in the possession of Amdocs which are [**] as of the Commencement Date [**] and applicable Laws. Amdocs will revise and maintain such procedures and safeguards upon AT&T's request. AT&T shall have the right to establish backup security for AT&T Data and to keep backup copies of the AT&T Data in AT&T's possession at AT&T's expense if AT&T so chooses. Amdocs shall remove all AT&T Data from any media taken out of service and shall destroy or securely erase such media in accordance with the Policy and Procedures Manual. No media on which AT&T Data is stored may be used or re-used to store data of any other customer of Amdocs or to deliver data to a third party, including another Amdocs customer, unless securely erased in accordance with the Policy and Procedures Manual. In the event Amdocs discovers or is notified of a breach or potential breach of security relating to AT&T Data, Amdocs will expeditiously under the circumstances notify AT&T and investigate and remediate the effects of such breach or potential breach of security and will provide AT&T with such assurances as AT&T shall request that such breach or potential breach will not recur.
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!