Security Policies and Practices Sample Clauses

Security Policies and Practices. Contractor and its personnel shall comply with all of Owner's written security requirements, procedures and practices provided by Owner to Contractor, including mandatory identification badges for all personnel and visitors to the Site. Contractor shall properly protect the Completed Work and the Work in progress, when required, with barricades or fences in a manner acceptable to Owner's Representative. All excavations are to be left at all times in a safe condition, to the satisfaction of Owner's Representative.
AutoNDA by SimpleDocs
Security Policies and Practices. The following is not intended to be an all inclusive list of security services and obligations necessary to comply with Security Best Practices, but is intended to capture key elements of such a program. American reserves the right to modify the obligations in this Section or add new obligations, and any such modified or new security requirement, specification or event reporting procedures shall become effective * after written notice thereof from American, **. Notwithstanding the foregoing, if such modification or addition is required by applicable law, Supplier will implement and adhere to such modification or addition and such procedures will become effective in time to comply with such law and Supplier will not have the right to terminate this Agreement.

Related to Security Policies and Practices

  • Policies and Practices The employment relationship between the Parties shall be governed by this Agreement and the policies and practices established by the Company and the Board of Directors (hereinafter referred to as the “Board”). In the event that the terms of this Agreement differ from or are in conflict with the Company’s policies or practices or the Company’s Employee Handbook, this Agreement shall control.

  • Security Policies IBM maintains privacy and security policies that are communicated to IBM employees. IBM requires privacy and security training to personnel who support IBM data centers. We have an information security team. IBM security policies and standards are reviewed and re-evaluated annually. IBM security incidents are handled in accordance with a comprehensive incident response procedure.

  • Security Practices Dell has implemented corporate information security practices and standards that are designed to safeguard the Dell’s corporate environment and to address: (1) information security; (2) system and asset management; (3) development; and (4) governance. These practices and standards are approved by the Dell CIO and undergo a formal review on an annual basis.

  • Security Policy As part of PCI DSS, the Card Organizations require that you have a security policy that covers the security of credit card information.

  • Data Practices The Parties acknowledge that this Agreement is subject to the requirements of Minnesota’s Government Data Practices Act, Minnesota Statutes, Section 13.01

  • Safety Policy The City agrees to maintain in safe working condition all facilities and equipment furnished by the City to carry out the duties of each bargaining unit position, but reserves the right to determine what those facilities and equipment shall be. The Association agrees to work cooperatively in maintaining safety in the Xenia/Xxxxxx Central Communications Center.

  • Policies and Procedures i) The policies and procedures of the designated employer apply to the employee while working at both sites. ii) Only the designated employer shall have exclusive authority over the employee in regard to discipline, reporting to the College of Nurses of Ontario and/or investigations of family/resident complaints. iii) The designated employer will ensure that the employee is covered by WSIB at all times, regardless of worksite, while in the employ of either home. iv) The designated employer will ensure that the employee is covered by liability insurance at all times, regardless of worksite, while in the employ of either home. v) The designated employer shall have exclusive authority over the employee’s personnel files and health records. These files will be maintained on the site of the designated employer.

  • SAFETY PRACTICES (a) i Employees requiring glasses must wear glasses, preferably with safety lenses instead of contact lenses while on the job site. ii W.C.B. approved safety footwear must be worn at all times while on the job site. iii Employee attire will be in conformance with W.C.B. Regulation and the Employer’s policy.

  • Privacy Policies Each party will make available a Privacy Policy that complies with Law. Xxxxxx’s Privacy Policy explains how and for what purposes Stripe collects, uses, retains, discloses and safeguards the Personal Data you provide to Stripe.

  • Compliance Policies and Procedures To assist the Fund in complying with Rule 38a-1 of the 1940 Act, BBH&Co. represents that it has adopted written policies and procedures reasonably designed to prevent violation of the federal securities laws in fulfilling its obligations under the Agreement and that it has in place a compliance program to monitor its compliance with those policies and procedures. BBH&Co will upon request provide the Fund with information about our compliance program as mutually agreed.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!