Security Policies and Safeguards Sample Clauses

Security Policies and Safeguards. Infor shall establish and maintain administrative, technical, and physical safeguards designed to protect against the destruction, loss, unauthorized access or alteration of Licensee Data and Personal Information in the possession or under the control of Infor or to which Infor has access, which are: (i) no less rigorous than those maintained by Infor for its own information of a similar nature; (ii) no less rigorous than generally accepted industry standards; and (iii) required by applicable laws. The security procedures and safeguards implemented and maintained by Infor pursuant to this Section 6(b) shall include, without limitation: (i) User identification and access controls designed to limit access to Licensee’s Data to authorized users; (ii) the use of appropriate procedures and technical controls regulating data entering Infor’s network from any external source; (iii) the use of encryption techniques when Licensee’s Data is transmitted or transferred into or out of the hosted environment; (iv) physical security measures, including without limitation securing Licensee’s Data within a secure facility where only authorized personnel and agents will have physical access to Licensee Data; (v) operational measures, including without limitation IT Service Management (ITSM) processes designed to ensure the correct and secure operations of information processing activities;
AutoNDA by SimpleDocs
Security Policies and Safeguards. Ordering Activity shall agree that the following terms are sufficient for the protection of Ordering Activity Data and Personal Information.
Security Policies and Safeguards. Infor will establish and maintain administrative, technical, and physical safeguards designed to protect against the destruction, loss, unauthorized access or alteration of Ordering Activity Data and Personal Information in the possession or under the control of Infor or to which Infor has access in performance of Subscription Services, which are: (i) no less rigorous than those maintained by Infor for its own information of a similar nature; (ii) no less rigorous than generally accepted industry standards; and (iii) required by applicable laws. The security procedures and safeguards implemented and maintained by Infor pursuant to this Section shall include, without limitation: (i) User identification and access controls designed to limit access to Ordering Activity Data to authorized users; (ii) the use of appropriate procedures and technical controls regulating data entering Infor’s network from any external source; (iii) the use of encryption techniques when Ordering Activity Data is transmitted or transferred into or out of the hosted environment; (iv) physical security measures, including without limitation securing Ordering Activity Data within a secure facility where only authorized personnel and agents will have physical access to Ordering Activity Data; (v) operational measures, including without limitation IT Service Management (ITSM) processes designed to ensure the correct and secure operations of information processing activities; (vi) periodic employee training regarding the security programs referenced in this Section; and (vii) periodic testing of the systems and procedures outlined in this Section.
Security Policies and Safeguards. Ephesoft shall establish and maintain administrative, technical, and physical safeguards designed to protect against the destruction, loss, unauthorized access or alteration of Licensee Data and Personal Information in the possession or under the control of Ephesoft or to which Ephesoft has access, which are: (i) no less rigorous than those maintained by Ephesoft for its own information of a similar nature; (ii) no less rigorous than generally accepted industry standards; and (iii) required by applicable laws. The security procedures and safeguards implemented and maintained by Ephesoft pursuant to this Section 6(b) shall include, without limitation: (i) User identification and access controls designed to limit access to Licensee’s Data to authorized users; (ii) the use of appropriate procedures and technical controls regulating data entering Ephesoft’s network from any external source; (iii) the use of encryption techniques when Licensee’s Data is transmitted or transferred into or out of the hosted environment; (iv) physical security measures, including without limitation securing Licensee’s Data within a secure facility where only authorized personnel and agents will have physical access to Licensee Data; (v) operational measures, including without limitation IT Service Management (ITSM) processes designed to ensure the correct and secure operations of information processing activities;

Related to Security Policies and Safeguards

  • Security Policies IBM maintains privacy and security policies that are communicated to IBM employees. IBM requires privacy and security training to personnel who support IBM data centers. We have an information security team. IBM security policies and standards are reviewed and re-evaluated annually. IBM security incidents are handled in accordance with a comprehensive incident response procedure.

  • Security Safeguards Contractor shall store and process District Data in accordance with commercial best practices, including implementing appropriate administrative, physical, and technical safeguards that are no less rigorous than those outlined in SANS Top 20 Security Controls, as amended, to secure such data from unauthorized access, disclosure, alteration, and use. Contractor shall ensure that all such safeguards, including the manner in which District Data is collected, accessed, used, stored, processed, disposed of and disclosed, comply with all applicable federal and state data protection and privacy laws, regulations and directives, including without limitation C.R.S. § 00-00-000 et seq., as well as the terms and conditions of this Addendum. Without limiting the foregoing, and unless expressly agreed to the contrary in writing, Contractor warrants that all electronic District Data will be encrypted in transmission and at rest in accordance with NIST Special Publication 800-57, as amended.

  • Technical Safeguards 1. USAC and DSS will process the data matched and any data created by the match under the immediate supervision and control of authorized personnel to protect the confidentiality of the data, so unauthorized persons cannot retrieve any data by computer, remote terminal, or other means. 2. USAC and DSS will strictly limit authorization to these electronic data areas necessary for the authorized user to perform their official duties. All data in transit will be encrypted using algorithms that meet the requirements of the Federal Information Processing Standard (FIPS) Publication 140-2 or 140-3 (when applicable). 3. Authorized system users will be identified by User ID and password, and individually tracked to safeguard against the unauthorized access and use of the system. System logs of all user actions will be saved, tracked and monitored periodically. 4. USAC will transmit data to DSS via encrypted secure file delivery system. For each request, a response will be sent back to USAC to indicate success or failure of transmission.

  • Security Policy As part of PCI DSS, the Card Organizations require that you have a security policy that covers the security of credit card information.

  • Safeguards Business Associate, its Agent(s) and Subcontractor(s) shall implement and use appropriate safeguards to prevent the use or disclosure of PHI other than as provided for by this Agreement. With respect to any PHI that is maintained in or transmitted by electronic media, Business Associate or its Subcontractor(s) shall comply with 45 CFR sections 164.308 (administrative safeguards), 164.310 (physical safeguards), 164.312 (technical safeguards) and 164.316 (policies and procedures and documentation requirements). Business Associate or its Agent(s) and Subcontractor(s) shall identify in writing upon request from Covered Entity all of the safeguards that it uses to prevent impermissible uses or disclosures of PHI.

  • Contractor and Employee Security Precautions The security aspects of working at the Correctional Facility are critical. The following security precautions are part of the site conditions and are a part of this Contract. All persons coming on the site in any way connected with this Work shall be made aware of them, and it is the (General) Contractor’s responsibility to check and enforce them.

  • Violence Policies and Procedures The Employer agrees to have in place explicit policies and procedures to deal with violence. The policy will address the prevention of violence, the management of violent situations, provision of legal counsel and support to employees who have faced violence. The policies and procedures shall be part of the employee's health and safety policy and written copies shall be provided to each employee. Prior to implementing any changes to these policies, the employer agrees to consult with the Association.

  • Environmental and Social Safeguards All of the Projects will be implemented in compliance with the MCC Environmental Guidelines and the MCC Gender Policy, and any resettlement will be carried out in accordance with the World Bank’s Operational Policy on Involuntary Resettlement in effect as of July 2007 (“OP 4.12”) in a manner acceptable to MCC. In accordance with its policies, the Government will ensure that the Projects comply with all national environmental laws and regulations, licenses and permits, except to the extent such compliance would be inconsistent with this Compact. Specifically, the Government will: (a) cooperate with or complete, as the case may be, any ongoing environmental assessments, or if necessary undertake and complete any additional environmental assessments, social assessments, environmental management plans, environmental and social audits, resettlement policy frameworks, and resettlement action plans required under the laws of Indonesia, the MCC Environmental Guidelines, this Compact, the PIA, or any Supplemental Agreement, or as otherwise required by MCC, each in form and substance satisfactory to MCC; (b) ensure that Project-specific environmental and social management plans are developed and all relevant measures contained in such plans are integrated into project design, the applicable procurement documents and associated finalized contracts, in each case, in form and substance satisfactory to MCC; and (c) implement to MCC’s satisfaction appropriate environmental and social mitigation measures identified in such assessments or plans. Unless MCC agrees otherwise in writing, the Government will fund all necessary costs of environmental and social mitigation measures (including, without limitation, costs of resettlement) not specifically provided for, or that exceed the MCC Funding specifically allocated for such costs in, the Detailed Financial Plan for any Project. To maximize the positive social impacts of the Projects, address cross-cutting social and gender issues such as human trafficking, child and forced labor, and HIV/AIDS, and to ensure compliance with the MCC Gender Policy, the Government will: (x) develop a comprehensive social and gender integration plan which, at a minimum, identifies approaches for regular, meaningful and inclusive consultations with women and other vulnerable/underrepresented groups, consolidates the findings and recommendations of Project-specific social and gender analyses and sets forth strategies for incorporating findings of the social and gender analyses into final Project designs as appropriate (“Social and Gender Integration Plan”); and (y) ensure, through monitoring and coordination during implementation, that final Activity designs, construction tender documents and implementation plans are consistent with and incorporate the outcomes of the social and gender analyses and social and gender integration plan. To address gender concerns that impact women’s ability to participate across Projects, MCA- Indonesia will adopt a detailed workplan, subject to MCC approval, for gender work to be undertaken at the policy, institutional capacity building and community levels (the “Targeted Gender Activities”). Xxxxx XX sets forth the MCC Funding allocated for the performance of the Targeted Gender Activities. Prior to the second disbursement of MCC Funding for the Targeted Gender Activities, MCA-Indonesia shall have completed detailed action plans and provided evidence of demonstrated commitment of relevant stakeholders to addressing policy constraints identified in the workplan.

  • Appropriate Safeguards BA shall implement appropriate safeguards to prevent the use or disclosure of Protected Information other than as permitted by the Contract or Addendum, including, but not limited to, administrative, physical and technical safeguards in accordance with the Security Rule, including, but not limited to, 45 C.F.R. Sections 164.308, 164.310, and 164.312. [45 C.F.R. Section 164.504(e)(2)(ii)(B); 45 C.F.R. Section 164.308(b)]. BA shall comply with the policies and procedures and documentation requirements of the Security rule, including, but not limited to, 45 C.F.R. Section 164.316 [42 U.S.C. Section 17931].

  • Security Protocols Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!