SECURITY AND CONTROL PROCESSES Sample Clauses

SECURITY AND CONTROL PROCESSES. 8.1 Service Provider hereby agrees to have sufficient security practices; control processes and checks in respect of the job/work/activity outsourced by IDBI Bank executed/handled at its premises or in IDBI Bank’s premises on a regular basis.
AutoNDA by SimpleDocs
SECURITY AND CONTROL PROCESSES. 5.5.1. The Freelancer must ensure the security, integrity and confidentiality of Confidential Information, to protect such Confidential Information against any anticipated threats or hazards to the security or integrity of such information, and to protect against unauthorized access to, or use of Confidential Information that could result in substantial harm or inconvenience to Company or any of its subsidiaries, affiliates, group companies, associates or licensees or otherwise. The obligation to maintain confidentiality of any documents and materials forming part of Confidential Information shall survive the termination of this Contract.

Related to SECURITY AND CONTROL PROCESSES

  • Security and Data Transfers Party shall comply with all applicable State and Agency of Human Services' policies and standards, especially those related to privacy and security. The State will advise the Party of any new policies, procedures, or protocols developed during the term of this agreement as they are issued and will work with the Party to implement any required. Party will ensure the physical and data security associated with computer equipment, including desktops, notebooks, and other portable devices, used in connection with this Agreement. Party will also assure that any media or mechanism used to store or transfer data to or from the State includes industry standard security mechanisms such as continually up-to-date malware protection and encryption. Party will make every reasonable effort to ensure media or data files transferred to the State are virus and spyware free. At the conclusion of this agreement and after successful delivery of the data to the State, Party shall securely delete data (including archival backups) from Party’s equipment that contains individually identifiable records, in accordance with standards adopted by the Agency of Human Services. Party, in the event of a data breach, shall comply with the terms of Section 7 above.

  • PERSONAL INFORMATION PRIVACY AND SECURITY CONTRACT 11 Any reference to statutory, regulatory, or contractual language herein shall be to such language as in 12 effect or as amended.

  • Security and Privacy 3. Security and privacy policies for the Genesys Cloud Service addressing use of Customer Data, which are incorporated by reference, are located at xxxxx://xxxx.xxxxxxxxxxx.xxx/articles/Genesys Cloud-security-compliance/.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!