Security Awareness Program Sample Clauses

Security Awareness Program. Seller will implement a Security Awareness Program including awareness and understanding of the U.S. C-TPAT program, recognizing internal conspiracies, maintaining cargo integrity, and determining and addressing unauthorized access. The Security Awareness Program should encourage active employee participation in security controls. Seller shall ensure that key personnel receive regular training which shall be no less than once per year on security procedures and requirements. Seller shall submit evidence of such Security Awareness training upon Xxxxx’s request.
AutoNDA by SimpleDocs
Security Awareness Program. External Party shall implement and maintain an ongoing security awareness program to educate Employees regarding security issues and the requirements of this document. The program must include, but should not be limited to, education regarding the following: a. Email usage b. Password management c. Social Engineering, including phishing d. Mobile device usage e. Use of social media during job hours f. How to contact management to report a security concern External Party shall ensure that Employees are recertified annually and shall maintain documentation of Employee’s current training.
Security Awareness Program. The Receiving Party must have a Security Awareness Program. This program must:
Security Awareness Program. Seller will implement a Security Awareness Program including awareness and understanding of the U.S. C-TPAT program, recognizing internal conspiracies, maintaining cargo integrity, and determining and addressing unauthorized access. The Security Awareness Program should encourage active employee participation in security controls. Seller shall ensure that key personnel receive regular training which shall be no less than once per year on security procedures and requirements. Seller shall submit evidence of such Security Awareness training upon Boeing’s request.
Security Awareness Program. The Customer shall implement and maintain an ongoing security awareness program to educate its Authorised Users regarding security issues and the requirements of this document, and shall ensure that Authorised Users are recertified at least annually and shall maintain documentation evidencing such training. The program must include, but should not be limited to, education regarding the following: 9.5.1 Email usage 9.5.2 Password management 9.5.3 Social Engineering, including phishing

Related to Security Awareness Program

  • Wellness Program Nothing in this Agreement shall prevent a department or agency from recommending experimental “fitness” type programs and reward programs involving wellness promotion activities. Any such activities shall be funded from the department’s separate appropriation, after review by the Benefits Advisory Committee and approval by the Secretary of Administration, or designee.

  • Drug-Free Workplace Policy Consultant shall provide a drug-free workplace by complying with all provisions set forth in City’s Council Policy 100-5, attached hereto as Exhibit “D” and incorporated herein by reference. Consultant’s failure to conform to the requirements set forth in Council Policy 100-5 shall constitute a material breach of this Agreement and shall be cause for immediate termination of this Agreement by City.

  • Registration Data Directory Services Until ICANN requires a different protocol, Registry Operator will operate a WHOIS service available via port 43 in accordance with XXX 0000, and a web-­‐based Directory Service at <whois.nic.TLD> providing free public query-­‐based access to at least the following elements in the following format. ICANN reserves the right to specify alternative formats and protocols, and upon such specification, the Registry Operator will implement such alternative specification as soon as reasonably practicable. Registry Operator shall implement a new standard supporting access to domain name registration data (SAC 051) no later than one hundred thirty-­‐five (135) days after it is requested by ICANN if: 1) the IETF produces a standard (i.e., it is published, at least, as a Proposed Standard RFC as specified in RFC 2026); and 2) its implementation is commercially reasonable in the context of the overall operation of the registry. 1.1. The format of responses shall follow a semi-­‐free text format outline below, followed by a blank line and a legal disclaimer specifying the rights of Registry Operator, and of the user querying the database. 1.2. Each data object shall be represented as a set of key/value pairs, with lines beginning with keys, followed by a colon and a space as delimiters, followed by the value. 1.3. For fields where more than one value exists, multiple key/value pairs with the same key shall be allowed (for example to list multiple name servers). The first key/value pair after a blank line should be considered the start of a new record, and should be considered as identifying that record, and is used to group data, such as hostnames and IP addresses, or a domain name and registrant information, together. 1.4. The fields specified below set forth the minimum output requirements. Registry Operator may output data fields in addition to those specified below, subject to approval by ICANN, which approval shall not be unreasonably withheld.

  • Training Programs All employees shall successfully complete all necessary training prior to being assigned work (e.g., all employees will complete health and safety training prior to being assigned to task). Nothing in this Article or provision shall constitute a waiver of either party’s bargaining obligations or defenses. The Employer still has an obligation to notify and bargain changes in terms and conditions of employment with the exclusive representative.

  • Employee Assistance Program (EAP) Section 1. The Employer agrees to provide to the Union the statistical and program evaluation information provided to management concerning Employee Assistance Program(s). Section 2. No information gathered by an Employee Assistance Program may be used to discipline an employee. Section 3. Employees shall be entitled to use accrued sick leave for participation in an Employee Assistance Program. Section 4. Each university will offer training to local Union Stewards on the Employee Assistance Program available in their university, on university time, where an Employee Assistance Program is available.

  • Training Program It is agreed that there shall be an Apprenticeship Training Program, the provisions of which are set forth in Exhibit "D", which is attached hereto and forms part of this Agreement.

  • Anti-Money Laundering and Red Flag Identity Theft Prevention Programs The Trust acknowledges that it has had an opportunity to review, consider and comment upon the written procedures provided by USBFS describing various tools used by USBFS which are designed to promote the detection and reporting of potential money laundering activity and identity theft by monitoring certain aspects of shareholder activity as well as written procedures for verifying a customer’s identity (collectively, the “Procedures”). Further, the Trust and USBFS have each determined that the Procedures, as part of the Trust’s overall Anti-Money Laundering Program and Red Flag Identity Theft Prevention Program, are reasonably designed to: (i) prevent each Fund from being used for money laundering or the financing of terrorist activities; (ii) prevent identity theft; and (iii) achieve compliance with the applicable provisions of the Bank Secrecy Act, Fair and Accurate Credit Transactions Act of 2003 and the USA Patriot Act of 2001 and the implementing regulations thereunder. Based on this determination, the Trust hereby instructs and directs USBFS to implement the Procedures on the Trust’s behalf, as such may be amended or revised from time to time. It is contemplated that these Procedures will be amended from time to time by the parties as additional regulations are adopted and/or regulatory guidance is provided relating to the Trust’s anti-money laundering and identity theft responsibilities. USBFS agrees to provide to the Trust: (a) Prompt written notification of any transaction or combination of transactions that USBFS believes, based on the Procedures, evidence money laundering or identity theft activities in connection with the Trust or any Fund shareholder; (b) Prompt written notification of any customer(s) that USBFS reasonably believes, based upon the Procedures, to be engaged in money laundering or identity theft activities, provided that the Trust agrees not to communicate this information to the customer; (c) Any reports received by USBFS from any government agency or applicable industry self-regulatory organization pertaining to USBFS’ Anti-Money Laundering Program or the Red Flag Identity Theft Prevention Program on behalf of the Trust; (d) Prompt written notification of any action taken in response to anti-money laundering violations or identity theft activity as described in (a), (b) or (c) immediately above; and (e) Certified annual and quarterly reports of its monitoring and customer identification activities pursuant to the Procedures on behalf of the Trust. The Trust hereby directs, and USBFS acknowledges, that USBFS shall (i) permit federal regulators access to such information and records maintained by USBFS and relating to USBFS’ implementation of the Procedures, on behalf of the Trust, as they may request, and (ii) permit such federal regulators to inspect USBFS’ implementation of the Procedures on behalf of the Trust.

  • PayPal's Seller Protection Program What’s eligible

  • Cybersecurity; Data Protection To the Company’s knowledge, the Company and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (collectively, the “Personal Data”)) used in connection with their businesses, and there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same, except in each case as would not reasonably be expected to have a Material Adverse Effect. The Company and its subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification.

  • SUBSTANCE ABUSE POLICY See applicable administrative policy.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!