Security and Proprietary Information Sample Clauses

Security and Proprietary Information. (a) The Back Office interface of the SCREEN system is confidential, to be used solely by Province staff and Summer Company Providers with “Head Office” and “Officer” accounts. (b) Access to and use of SCREEN shall be limited solely to the administration of the Summer Company Initiative. (c) Personal Information contained in SCREEN shall be used and disclosed only in accordance with the notification provided by the individual to whom the Personal Information relates, or in accordance with any other authorization provided by the individual. All notices of collection for the Summer Company Initiative shall state that Personal Information is collected for the purposes of administering, advertising and promoting the Summer Company Initiative and contacting Participants about other programs of the Province. (d) All End Users are responsible for the security of their SCREEN passwords and accounts, and for ensuring that their accounts are never shared. (e) All End Users are responsible for ensuring that the computers that they use to access the SCREEN Back Office are inaccessible to the public and are either locked, logged off or shut down when unattended. (f) All End Users must adhere to the following SCREEN password rules: (i) A password must have a minimum length of 8 characters. (ii) A password must consist of one or more numbers, one or more upper or lower case letters, and one punctuation character (e.g. “!”). (iii) Passwords must be changed following each Summer Company Initiative launch date. (g) Summer Company Providers must ensure that security safeguards, such as anti- virus and anti-spyware software, are installed and kept current on the computers that they use to access SCREEN. (h) All End Users are responsible for reporting immediately any known or suspected security or privacy breach, loss and theft of computerized devices and Personal Information stored on those devices to the following individual: Attention: Manager, Relationship and Contract Management, Commercialization and Scale–up Networks Branch Ministry of Economic Development, Job Creation and Trade 0 Xxxxx Xxxx, 0xx Xxxxx Xxxxxxx, Xxxxxxx, X0X 0X0 E-mail: xxxxxx.xxxxxxx@xxxxxxx.xx
AutoNDA by SimpleDocs
Security and Proprietary Information. 1. Anyone responsible for entering information into a database or have access to database information used by any Diocesan entity, whether clergy, religious, employee or volunteer, must be FBI fingerprinted and background checked and cleared. 2. The appropriate IT authority of each Diocesan entity does everything possible to ensure the Diocesan entity network is properly maintained and adequate security measures are operational. To assist the appropriate IT authority of each Diocesan entity in sustaining this goal, authorized users, through their supervisor, should notify their IT authority when software and hardware modifications are necessary on any Diocesan computer workstation. At no time should a computer be connected to a Diocesan entity network without knowledge of the IT authority of the Diocesan entity. 3. Passwords will be created by each authorized users for their own use, with the exception of students, volunteers, and temporary/contractual personnel. Authorized user passwords shall not be shared. It is the responsibility of each authorized user to keep his/her password confidential. Anyone whose password becomes known to any other person should notify the appropriate authority immediately and a new password will be created. Anyone who becomes aware of anyone else’s password should contact the appropriate authority immediately and a new password will be created. Temporary passwords used by students, volunteers or temporary/contractual personnel may be known by the appropriate authority. However, temporary passwords should not be shared. System passwords should be changed quarterly; user level passwords should be changed every six months. 4. All PCs, laptops and workstations should be secured with a password-protected screensaver with the automatic activation feature set at 10 minutes or less, or by logging-off (control-alt-delete for Win2K users) when the host will be unattended. 5. Because information contained on external media is especially vulnerable, special care should be exercised to protect it in accordance to this policy. 6. Postings by authorized users from any Diocesan email address to on-line bulletin boards, forums, chat rooms, web logs ("blogs")" and any other similar non-work-related discussion groups is prohibited, unless it is specifically work related. 7. All hosts used by the authorized user that are connected to any Diocesan Internet/Intranet/Extranet shall be continually executing approved virus-scanning software with a cur...
Security and Proprietary Information. System level and user level passwords must have complexity (employee and secondary students). Complexity is the use of uppercase and lowercase lettering, numbers and symbols. Providing access to another individual, either deliberately or through failure to secure its access, is prohibited. • All computing devices must be secured with a password-protected screensaver with the automatic activation feature set to 30 minutes or less. You must lock the screen or log off when the device is unattended. • All computing devices must be secured with a password-protected screensaver with the automatic activation feature set to 30 minutes or less. You must lock the screen or log off when the device is unattended.
Security and Proprietary Information. 4.2.1 All mobile and computing devices that connect to the internal network must comply with the Password Protection Policy. 4.2.2 System level and user level passwords must comply with the Password Protection Policy. Providing access to another individual, either deliberately or through failure to secure its access, is prohibited. 4.2.3 All computing devices must be secured with a password-protected screensaver with the automatic activation feature set to 10 minutes or less. You must lock the screen or log off when the device is unattended. 4.2.4 Postings by employees from a Labster email address to newsgroups should contain a disclaimer stating that the opinions expressed are strictly their own and not necessarily those of Labster, unless posting is in the course of business duties. 4.2.5 Employees must use extreme caution when opening e-mail attachments received from unknown senders, which may contain malware.
Security and Proprietary Information. 1. The user interface for information contained on Internet/Intranet/Extranet-related systems should be classified as public, internal or confidential as defined guidelines, details of which can be found in this series of documents. Examples of confidential information include but are not limited to: student information (grades, transcripts, enrollment, identification numbers, etc.) financial information, identification information of employees, and research data, etc. Employees should take all necessary steps to prevent unauthorized access to this information. 2. Keep passwords secure and do not share accounts. Authorized users are responsible for the security of their passwords and accounts. System level passwords should be changed at least annually and user level passwords should be changed every four months. 3. All PCs, laptops and workstations should be secured with a password-protected screensaver with the automatic activation feature set at 30 minutes or less, or by logging- off (control-alt-delete for Win2K users) when the host will be unattended. 4. Use encryption of information in compliance with the Office of Information Technology Security's Acceptable Encryption Use policy (IT Standard-023). 5. Because information contained on portable computers, PDA’s and portable storage devices are especially vulnerable, special care should be exercised. Internal or private information must be encrypted. (IT-Policy-014). 6. Postings by employees from a University of Louisiana at Lafayette email address to newsgroups should contain a disclaimer stating that the opinions expressed are strictly their own and not necessarily those of University of Louisiana at Lafayette, unless posting is in the course of business duties. 7. All hosts used by the employee that are connected to the University of Louisiana at Lafayette Internet/Intranet/Extranet, whether owned by the employee or University of Louisiana at Lafayette, shall be continually executing approved virus-scanning software with a current virus database. 8. Employees must use extreme caution when opening e-mail attachments received from unknown senders, which may contain viruses, e-mail bombs, or Trojan horse code.
Security and Proprietary Information. 1. The user interface for information contained on Internet/Intranet/Extranet-related systems should be classified as either confidential or not confidential, as defined by corporate confidentiality guidelines, details of which can be found in Human Resources policies. Examples of confidential information include but are not limited to: company private, corporate strategies, competitor sensitive, trade secrets, specifications, customer lists, and research data. End Users should take all necessary steps to prevent unauthorized access to this information. 2. Keep passwords secure and do not share accounts. End Users are responsible for the security of their passwords and accounts. System level passwords shall be changed quarterly; user level passwords should be changed every 60 days. 3. All PCs, laptops and workstations should be secured with a password-protected screensaver with the automatic activation feature set at 10 minutes or less, or by logging- off (control-alt-delete for Win2K users) when the host will be unattended. 4. Use encryption of information in compliance with InfoSec Acceptable Encryption Use policy. 5. Because information contained on portable computers is especially vulnerable, special care should be exercised. Protect laptops in accordance with the “Laptop Security Tips”. 6. Postings by End Users from an Allscripts email address to newsgroups should contain a disclaimer stating that the opinions expressed are strictly their own and not necessarily those of Allscripts Healthcare Systems, unless posting is in the course of business duties. 7. All hosts used by the End User that are connected to the Allscripts Internet/Intranet/Extranet, whether owned by the End User or Allscripts, shall be continually executing approved virus-scanning software with a current virus database, unless overridden by departmental or group policy. 8. End Users must use extreme caution when opening e-mail attachments received from unknown senders, which may contain viruses, e-mail bombs, or Trojan horse code.
Security and Proprietary Information. As directed and authorized by Employer, UnitedHealthcare may receive information from Employer regarding other group health plans for purposes of performing data analysis. UnitedHealthcare may also use PHI to report violations of law to appropriate Federal and State authorities, consistent with 45 CFR 164.502(j)(1).
AutoNDA by SimpleDocs
Security and Proprietary Information. 2.1 Information contained on Information Technology systems shall be classified as either confidential or not confidential. Departments are responsible for the classification of information under their management. Information contained on the Information Technology systems shall be classified according to the Department's classification requirements or policies. 2.2 Users are responsible for the security of their passwords and accounts. Keep passwords secure and do not share accounts. User level passwords must be changed every four months or sooner if required by Departmental Policy. 2.3 All computers, laptops, and workstations should be secured with a password-protected screensaver or by logging-off when leaving such equipment unattended. 2.4 Information must be encrypted when required by Departmental Policy. 2.5 Information contained on laptops and other portable devices are especially vulnerable, and special security measures shall be exercised. SmartPhones and tablets must have the County's mobile device management software installed on the device and it must be enabled and operational. Devices must be secured with a strong passcode, encrypted and be approved for use by County Information Systems. County IS encryption standard is 128 bit or 256- Advanced Encryption Standard (AES) encryption and is applied at time of configuration of device by County IS.
Security and Proprietary Information. 1. All users, staff and students, are given an account upon their entry into the district. Any person to whom an account is given is the only person to use that account. Each user is responsible for the security of the system. 2. Passwords should not be shared. Authorized users are responsible for the security of their passwords and accounts. If a user shares a password with another, that user is as responsible for any ensuing action as the person actually performing the action, and will be held accountable. 3. System level and user level passwords may be changed as needed. 4. All PCs, laptops, iPads, and Chromebooks should be logged-off or locked when left unsupervised. 5. Users must use extreme caution when opening e-mail attachments received from unknown senders, which may contain viruses, e-mail bombs, or Trojan horse code.
Security and Proprietary Information. All mobile and computing devices that connect to the internal network must comply with this policy.
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!