SECURITY POLICIES AND NOTIFICATIONS State Security Policies and Procedures The Contractor and its personnel shall review and be familiar with all State security policies, procedures and directives currently existing or implemented during the term of the Contract, including ITS Policy NYS-P03-002 Information Security Policy (or successor policy). Security Incidents Contractor shall address any Security Incidents in the manner prescribed in ITS Policy NYS-P03-002 Information Security Policy (or successor policy), including the New York State Cyber Incident Reporting Procedures incorporated therein or in such successor policy.
Security Policies IBM maintains privacy and security policies that are communicated to IBM employees. IBM requires privacy and security training to personnel who support IBM data centers. We have an information security team. IBM security policies and standards are reviewed and re-evaluated annually. IBM security incidents are handled in accordance with a comprehensive incident response procedure.
General Guidelines 1. Conduct yourself in a responsible manner at all times in the laboratory.
Use Guidelines 3.3.1. The JAGGAER Applications are provided to Client for use only as expressly set forth in the Agreement, and Client will not use the JAGGAER Applications in whole or in part for any other use or purpose. In particular, Client will not, and will not allow any third party to: (i) decompile, disassemble, reverse engineer or attempt to reconstruct, identify or discover any source code, underlying ideas, underlying user interface techniques or algorithms of the JAGGAER Applications by any means, or disclose any of the foregoing; (ii) except as expressly set forth in the Agreement, provide, rent, lease, lend, or use the JAGGAER Applications for timesharing, subscription, or service bureau purposes; (iii) sublicense, transfer or assign the JAGGAER Applications or any of the rights or licenses granted under the Agreement; or remove or obscure any trademark, product identification, proprietary marking, copyright or other notices provided with the JAGGAER Applications or related documentation.
Practice Guidelines 37.1. CONTRACTOR shall adopt practice guidelines (or adopt COUNTY’S practice guidelines) that meet the following requirements:
Policies, Guidelines, Directives and Standards Either the LHIN or the MOHLTC will give the HSP Notice of any amendments to the manuals, guidelines or policies identified in Schedule C. An amendment will be effective in accordance with the terms of the amendment. By signing a copy of this Agreement the HSP acknowledges that it has a copy of the documents identified in Schedule C.
Security Policy As part of PCI DSS, the Card Organizations require that you have a security policy that covers the security of credit card information.
Safety Policy Each employer is required by law to have a safety policy and program. TIR will ask for and may require a copy of that policy and program.
Program Guidelines The goal for this program is to help small businesses expand their market reach by investing in greater hardware and software applications. In the age of technology, there are many innovative ways that business can offer their goods and services to an e-commerce online customer base. The following eligible items are permitted, based on business type: Hardware: • Computers • Printer, scanner, copier (All in one) Software: • Internet service (1 year)Website – Turnkey website landing page package • Virus Protection • Microsoft Office 365 • Remote Client Software (Team Viewer) Other services: Virtual Training courses (Gotomeeting, Zoom, other virtual meetings – Max 3 month service) Tech Support with set up and remote trouble shooting The Process The following identifies the steps in the application process:
Policies and Procedures i) The policies and procedures of the designated employer apply to the employee while working at both sites.