Security Policies IBM maintains privacy and security policies that are communicated to IBM employees. IBM requires privacy and security training to personnel who support IBM data centers. We have an information security team. IBM security policies and standards are reviewed and re-evaluated annually. IBM security incidents are handled in accordance with a comprehensive incident response procedure.
Contractor and Employee Security Precautions A. The security aspects of working at the Correctional Facility are critical. The following security precautions are part of the site conditions and are a part of this Contract. All persons coming on the site in any way connected with this Work shall be made aware of them, and it is the (General) Contractor’s responsibility to check and enforce them.
WORK UNIFORMS Employees who are required to wear uniforms as a condition of employment shall be furnished such uniforms by the Appointing Authority. Proper maintenance of uniforms is an employee responsibility unless they are currently maintained by the Employer or unless required by statute or other regulatory agencies because of contamination (see Article 22). Uniforms shall not be used for off-duty activity by the employee.
Security Protocols Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.
Security Policy for Contractors 1. The Department for Work and Pensions treats its information as a valuable asset and considers that it is essential that information must be protected, together with the systems, equipment and processes which support its use. These information assets may include data, text, drawings, diagrams, images or sounds in electronic, magnetic, optical or tangible media, together with any Personal Data for which the Department for Work and Pensions is the Data Controller.
Contractor Personnel Contractor's staff is expected to present a professional appearance. All personnel of the Contractor will be neat, well groomed, properly uniformed in industry standard uniforms and are expected to conduct themselves at all times in a responsible and courteous manner while performing any work under this Agreement and/or whenever they are on District property. The following code of conduct will be adhered to by the Contractor, his agent(s) and/or his employees. If Contractor fails to ensure that its employees or other agents comply with these requirements, then Contractor may be terminated for cause under this Agreement:
Security Safeguards (1) Each party acknowledges that it is solely responsible for determining and communicating to the other the appropriate technological, physical, and organizational security measures required to protect Personal Data.
Technical Safeguards 1. USAC and the Department will process the data matched and any data created by the match under the immediate supervision and control of authorized personnel to protect the confidentiality of the data, so unauthorized persons cannot retrieve any data by computer, remote terminal, or other means.
Personnel Equipment and Material Engineer shall furnish and maintain, at its own expense, quarters for the performance of all Engineering Services, and adequate and sufficient personnel and equipment to perform the Engineering Services as required. All employees of Engineer shall have such knowledge and experience as will enable them to perform the duties assigned to them. Any employee of Engineer who, in the reasonable opinion of County, is incompetent or whose conduct becomes detrimental to the Engineering Services shall immediately be removed from association with the Project when so instructed by County. Engineer certifies that it presently has adequate qualified personnel in its employment for performance of the Engineering Services required under this Contract, or will obtain such personnel from sources other than County. Engineer may not change the Project Manager without prior written consent of County.
Security Practices A. Protected data provided to the contractor will be stored: (include where and how) B. The security protections taken to ensure data will be protected that align with the NIST Cybersecurity Framework and industry best practices include: