Security Policies Sample Clauses

Security Policies. IBM maintains privacy and security policies that are communicated to IBM employees. IBM requires privacy and security training to personnel who support IBM data centers. We have an information security team. IBM security policies and standards are reviewed and re-evaluated annually. IBM security incidents are handled in accordance with a comprehensive incident response procedure.
AutoNDA by SimpleDocs
Security Policies. To the extent the Contractor or its subcontractors, affiliates or agents handles, collects, stores, disseminates or otherwise deals with State Data, the Contractor will have an information security policy that protects its systems and processes and media that may contain State Data from internal and external security threats and State Data from unauthorized disclosure, and will have provided a copy of such policy to the State. The Contractor shall provide the State with not less than thirty (30) days advance written notice of any material amendment or modification of such policies.
Security Policies a. Contractor’s security policy is documented, has obtained management approval, is reviewed no less frequently than annually and is maintained to ensure its continuing suitability, adequacy and effectiveness; and b. Contractor’s operational, technical and administrative policies, standards and guidelines are documented, have obtained management approval, are reviewed no less frequently than annually and are maintained to ensure their continuing suitability, adequacy and effectiveness.
Security Policies. The responsible party and the operator will each maintain and fully implement written security policies that apply to personal information processing.
Security Policies. Contractor shall comply at all times with Agency’s security policies as they are stated in this Contract or otherwise made available to Contractor.
Security Policies. The controller and processor will each maintain and fully implement written security policies that apply to personal data processing.
Security Policies. Vendor will maintain written security policies that are fully implemented and applied to the processing of Personal Data. At a minimum, these policies must include assignment of internal responsibility for information security management, devoting adequate personnel resources to information security, carrying out appropriate background checks on permanent staff who will have access to the Personal Data, requiring employees, vendors and others with access to Personal Data to enter into written confidentiality agreements, and conducting training to make employees and others with access to the Personal Data aware of information security risks presented by the processing.
AutoNDA by SimpleDocs
Security Policies. Consultant and Company agree that their personnel, while working at or visiting the premises of the other party, shall comply with all the internal rules and regulations of the other party, including security procedures, and all applicable federal, state, and local laws and regulations applicable to the location where said employees are working or visiting.
Security Policies. 2.1 Acoustic will maintain and follow information-technology ("IT") security policies and practices that are integral to Acoustic's business and mandatory for all Acoustic employees. The Chief Information Security Officer will maintain responsibility and executive oversight for such policies, including formal governance and revision management, employee education, and compliance enforcement. 2.2 Acoustic will review its IT security policies at least annually and amend such policies as Acoustic deems reasonable to maintain protection of SaaS Products and Content processed therein. 2.3 Acoustic will maintain and follow its standard mandatory employment verification requirements for all new hires and will extend such requirements to wholly owned Acoustic subsidiaries. In accordance with Acoustic internal process and procedures, these requirements will be periodically reviewed and may include criminal background checks, proof of identity validation, and additional checks as deemed necessary by Acoustic. Each Acoustic company is responsible for implementing such requirements in its hiring process as applicable and permitted under local Law. 2.4 Acoustic employees will complete security and privacy education annually and certify each year that they will comply with Acoustic's ethical business conduct, confidentiality, and security policies. Additional policy and process training may be provided to persons granted administrative access to SaaS Product Components that is specific to their role within Acoustic's operation and support of the SaaS Product, and as required to maintain compliance and any certifications stated in the relevant Attachment.
Security Policies. Business Associate shall maintain security policies that comply with all applicable laws and regulations. Company has the right to request a copy of Business Associate’s security policies.
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!