SECURITY POLICIES AND STANDARDS Sample Clauses

SECURITY POLICIES AND STANDARDS. 8.1 The Contractor shall, and shall procure that any Sub-contractor (as applicable) shall, comply with the Security Policies and Standards set out Annex A and B. 8.2 Notwithstanding the foregoing, the Authority’s Security Requirements applicable to the Services may be subject to change following certain events including, but not limited to, any relevant Variation in the delivery of the Services. Any change in the Authority’s Security Requirements resulting from such Variation (if any) shall be agreed by the Parties in accordance with the CAEHRS Variation Procedure. 8.3 The Contractor shall, and shall procure that any Sub-contractor (as applicable) shall, maintain appropriate records and is otherwise able to demonstrate compliance with the Security Policies and Standards.
AutoNDA by SimpleDocs
SECURITY POLICIES AND STANDARDS. 8.1 The Supplier shall, and shall procure that any Sub-contractor (as applicable) shall, comply with the Security Policies and Standards set out Annex A and B. 8.2 Notwithstanding the foregoing, the Buyer’s Security Requirements applicable to the Services may be subject to change following certain events including, but not limited to, any relevant change in the delivery of the Services. Where any such change constitutes a Contract Change, any change in the Buyer’s Security Requirements resulting from such Contract Change (if any) shall be agreed by the Parties in accordance with the Contract Change Procedure. Where any such change constitutes an Operational Change, any change in the Buyer’s Security Requirements resulting from such Operational Change (if any) shall be agreed by the Parties and documented in the relevant Operational Change Confirmation. 8.3 The Supplier shall and shall procure that any Sub-contractor (as applicable) shall, maintain appropriate records and is otherwise able to demonstrate compliance with the Security Policies and Standards.
SECURITY POLICIES AND STANDARDS. 6.1 The Customer shall refrain from any actions likely to have an adverse impact on the Software, PRIMAVERA’s security systems and its connections to the Customer and the data therein, and undertakes to: (a) Promptly notify PRIMAVERA of any security incident that jeopardizes or is likely to jeopardize the confidentiality, integrity or availability of the Software, the data, or any information, or likely to affect the regular operation of the Software, further undertaking to cause any unauthorized use of the Software that it suspects or comes to its knowledge to stop; (b) Adopt any technical measures to avoid loss of data; (c) Adopt any measures required to prevent and deter any unauthorized access to the Software and provide to PRIMAVERA any information and the support required for latter to report, if it so wishes, any detected breach or unlawful access, breach of security, of privacy and of data protection rules to the proper authorities and to take legal action against any third parties based on the situations set out in the above paragraph. 6.2 PRIMAVERA shall also notify the Customer as soon as it becomes aware of any actual or threatened security failure likely to affect the Software or the Services.
SECURITY POLICIES AND STANDARDS. Avaya maintains formal written information security policies and standards that: (i) define the administrative, physical, and technological controls to protect the confidentiality, integrity, and availability of Confidential Information, Avaya Products and Avaya systems (including mobile devices) used in providing services; (ii) encompass secure access, retention, and transfer of Confidential Information; (iii) provide for disciplinary or legal action in the event of violation of such policies by Authorized Personnel; (iv) prevent unauthorized access to Avaya’s customer data, customer systems, and Avaya systems, including access by former employees; and (v) employ the requirements for assessment, monitoring and auditing procedures to ensure Avaya is compliant with the applicable policies. Upon request but no more than once a year, Avaya may make, at minimum, the table of contents from its security policy and/or standards available for Customer review.
SECURITY POLICIES AND STANDARDS. 7.1 The Supplier shall, and shall procure that any Sub-contractor (as applicable) shall, comply with the Buyer Security Policies and Standards set out below.
SECURITY POLICIES AND STANDARDS. All vendors agree to follow the University Information Security Policies and Standards in respect to systems and data access. These policies and standards are located at xxxxxxxx.xxxxxxxxxx.xxx
SECURITY POLICIES AND STANDARDS. Broker shall comply with the data security policy and standards attached hereto as Exhibit B. Broker shall make a reasonable and good faith effort to agree with such other data security policies as Equifax may from time to time make known to Broker in advance and in writing. To the extent Broker does not agree to comply any policy additional to Exhibit B, Broker will notify Equifax within five (5) business days of receipt of the additional policy, and the parties will thereafter discuss in good faith an alternative solution and/or resolution to satisfying the additional policy. If the parties do not mutually agree to an alternative solution or resolution, and Broker does not agree to comply with the additional policy, then Equifax may terminate this Agreement upon thirty (30) days prior written notice. For avoidance of doubt, Broker understands and agrees that its compliance with the Agreement and the data security policies and standards attached hereto will not relieve Broker of the obligation to observe any other or further contractual, legal, or regulatory requirements, rules or terms applicable to the security of the Equifax Information.
AutoNDA by SimpleDocs

Related to SECURITY POLICIES AND STANDARDS

  • Policies, Guidelines, Directives and Standards Either the Funder or the Ministry will give the HSP Notice of any amendments to the manuals, guidelines or policies identified in Schedule C. An amendment will be effective in accordance with the terms of the amendment. By signing a copy of this Agreement the HSP acknowledges that it has a copy of the documents identified in Schedule C.

  • Security Policies IBM maintains privacy and security policies that are communicated to IBM employees. IBM requires privacy and security training to personnel who support IBM data centers. We have an information security team. IBM security policies and standards are reviewed and re-evaluated annually. IBM security incidents are handled in accordance with a comprehensive incident response procedure.

  • Policies and Practices The employment relationship between the Parties shall be governed by this Agreement and the policies and practices established by the Company and the Board of Directors (hereinafter referred to as the “Board”). In the event that the terms of this Agreement differ from or are in conflict with the Company’s policies or practices or the Company’s Employee Handbook, this Agreement shall control.

  • Security Policy As part of PCI DSS, the Card Organizations require that you have a security policy that covers the security of credit card information.

  • Safety Policy The City agrees to maintain in safe working condition all facilities and equipment furnished by the City to carry out the duties of each bargaining unit position, but reserves the right to determine what those facilities and equipment shall be. The Association agrees to work cooperatively in maintaining safety in the Xenia/Xxxxxx Central Communications Center.

  • Specifications and Standards a) All articles supplied shall strictly conform to the specifications, trademark laid down in the bidding document and wherever articles have been required according to ISI/ ISO/ other applicable specifications/ certifications/ standards, those articles should conform strictly to those specifications/ certifications/ standards. The supply shall be of best quality and description. The decision of the competent authority/ purchase committee whether the articles supplied conforms to the specifications shall be final and binding on the supplier/ selected bidder.

  • General Guidelines Conduct yourself in a responsible manner at all times in the laboratory.

  • Security Standards The Provider shall implement and maintain commercially reasonable security procedures and practices that otherwise meet or exceed industry standards designed to protect Student Data from unauthorized access, destruction, use, modification, or disclosure, including but not limited to the unauthorized acquisition of computerized data that compromises the security, confidentiality, or integrity of the Student Data (a "Security Breach"). For purposes of the DPA and this Exhibit G, "Security Breach" does not include the good faith acquisition of Student Data by an employee or agent of the Provider or LEA for a legitimate educational or administrative purpose of the Provider or LEA, so long as the Student Data is used solely for purposes permitted by SOPPA and other applicable law, and so long as the Student Data is restricted from further unauthorized disclosure.

  • Policies and Procedures i) The policies and procedures of the designated employer apply to the employee while working at both sites. ii) Only the designated employer shall have exclusive authority over the employee in regard to discipline, reporting to the College of Nurses of Ontario and/or investigations of family/resident complaints. iii) The designated employer will ensure that the employee is covered by WSIB at all times, regardless of worksite, while in the employ of either home. iv) The designated employer will ensure that the employee is covered by liability insurance at all times, regardless of worksite, while in the employ of either home. v) The designated employer shall have exclusive authority over the employee’s personnel files and health records. These files will be maintained on the site of the designated employer.

  • Changes in Insurance Requirements Not more frequently than once annually, if in the opinion of District the amount of the foregoing insurance coverages is not adequate or the type of insurance or its coverage adequacy is deemed insufficient, Contractor shall amend the insurance coverage as required by District's Risk Manager or designee.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!