Security Policy Requirements Sample Clauses

Security Policy Requirements. The Recipient shall comply with the requirements for the protection of the various classifications of information set out in the following documents: IPPR01-TAC09 - “Information Security Responsibilities for Contractors Handling ‘OFFICIAL’ Information outside NDA Premises” IPPR01-TAC10 - "Cyber Essentials in the NDA" IPPR01-TAC11 - "Contractors working in non-NDA locations" SCP03 - "Information Security Policy" SCP04 - "Clear Desk Policy" SCP07 - "Business Travel and Working With NDA Issued Equipment in Overseas Locations" SCP08 – “Mobile and Remote Working Policy” Further information on security markings is available from: The Recipient must comply with their legal obligations, including those defined in: The Data Protection Act 2018 (alongside EU GDPR) Computer Misuse Act 1990
AutoNDA by SimpleDocs
Security Policy Requirements. Contractor shall address, in policy, the following security related areas: a) Offender counts; b) Offender movement control; c) Key and tool control; d) Offender searches; e) Fire/life safety; f) Facility entrance procedures; and g) Logs and record keeping systems.
Security Policy Requirements. In the performance of the Services under the contract, the Recipient and any sub-contractor shall comply with the requirements for the protection of the various classifications of information set out in the following documents: IPPR01-TAC09 - “Information Security Responsibilities for Contractors Handling ‘OFFICIAL’ Information outside NDA Premises” IPPR01-TAC10 - "Cyber Essentials in the NDA" IPPR01-TAC11 - "Contractors working in non-NDA locations" SCP03 - "Information Security Policy" SCP04 - "Clear Desk Policy" SCP07 - "Business Travel and Working With NDA Issued Equipment in Overseas Locations" SCP08 – “Mobile and Remote Working Policy” Further information on security markings is available from: xxxxx://xxx.xxx.xx/government/publications/government-security-classifications The Recipient and their sub-contractors must comply with their legal obligations, including those defined in: The Data Protection Xxx 0000 (alongside EU GDPR) Computer Xxxxxx Xxx 0000
Security Policy Requirements. The Recipient shall comply with the requirements for the protection of the various classifications of information set out in the following documents: • IPPR01-TAC09 - “Information Security Responsibilities for Contractors Handling ‘OFFICIAL’ Information outside NDA Premises” • IPPR01-TAC10 - "Cyber Essentials in the NDA" • IPPR01-TAC11 - "Contractors working in non-NDA locations" • SCP03 - "Information Security Policy" • SCP04 - "Clear Desk Policy" • SCP07 - "Business Travel and Working With NDA Issued Equipment in Overseas Locations" • SCP08 – “Mobile and Remote Working Policy” Further information on security markings is available from: xxxxx://xxx.xxx.xx/government/publications/government-security-classifications

Related to Security Policy Requirements

  • Policy Requirements All of the policies of insurance referred to in this Article XIII shall be written in form reasonably satisfactory to Landlord and any Facility Mortgagee and issued by insurance companies with a minimum policyholder rating of “A-” and a financial rating of “VII” in the most recent version of Best’s Key Rating Guide, or a minimum rating of “BBB” from Standard & Poor’s or equivalent. If Tenant obtains and maintains the general liability insurance described in Section 13.1(e) above on a “claims made” basis, Tenant shall provide continuous liability coverage for claims arising during the Term. In the event such “claims made” basis policy is canceled or not renewed for any reason whatsoever (or converted to an “occurrence” basis policy), Tenant shall either obtain (a) “tail” insurance coverage converting the policies to “occurrence” basis policies providing coverage for a period of at least three (3) years beyond the expiration of the Term, or (b) an extended reporting period of at least three (3) years beyond the expiration of the Term. Tenant shall pay all of the premiums therefor, and deliver certificates thereof to Landlord prior to their effective date (and with respect to any renewal policy, prior to the expiration of the existing policy), and in the event of the failure of Tenant either to effect such insurance in the names herein called for or to pay the premiums therefor, or to deliver such certificates thereof to Landlord, at the times required, Landlord shall be entitled, but shall have no obligation, to effect such insurance and pay the premiums therefor, in which event the cost thereof, together with interest thereon at the Overdue Rate, shall be repayable to Landlord upon demand therefor. Tenant shall obtain, to the extent available on commercially reasonable terms, the agreement of each insurer, by endorsement on the policy or policies issued by it, or by independent instrument furnished to Landlord, that it will give to Landlord thirty (30) days’ (or ten (10) days’ in the case of non-payment of premium) written notice before the policy or policies in question shall be altered, allowed to expire or cancelled. Notwithstanding any provision of this Article XIII to the contrary, Landlord acknowledges and agrees that the coverage required to be maintained by Tenant may be provided under one or more policies with various deductibles or self-insurance retentions by Tenant or its Affiliates, subject to Landlord’s approval not to be unreasonably withheld. Upon written request by Xxxxxxxx, Tenant shall provide Landlord copies of the property insurance policies when issued by the insurers providing such coverage.

  • Security Policies IBM maintains privacy and security policies that are communicated to IBM employees. IBM requires privacy and security training to personnel who support IBM data centers. We have an information security team. IBM security policies and standards are reviewed and re-evaluated annually. IBM security incidents are handled in accordance with a comprehensive incident response procedure.

  • Security Policy As part of PCI DSS, the Card Organizations require that you have a security policy that covers the security of credit card information.

  • Security Requirements 7.1 The Authority will review the Contractor’s Security Plan when submitted by the Contractor in accordance with the Schedule (Security Requirements and Plan) and at least annually thereafter.

  • E-Verify Requirements To the extent applicable under ARIZ. REV. STAT. § 41- 4401, the Contractor and its subcontractors warrant compliance with all federal immigration laws and regulations that relate to their employees and their compliance with the E-verify requirements under ARIZ. REV. STAT. § 23-214(A). Contractor’s or its subcontractor’s failure to comply with such warranty shall be deemed a material breach of this Agreement and may result in the termination of this Agreement by the City.

  • Residency Requirements 1. All single first-year freshmen students are required to live in University housing for at least two academic semesters. All single students who have earned less than 30 credit hours and have not resided in University housing for two academic semesters are required to live on campus for two academic semesters. This policy does not apply to single first-year students who have been out of high school for more than one year, or to single first-year freshmen who live with their parents in Miami-Dade or Broward Counties. Neither does it apply to those students who, for disciplinary or administrative reasons, may be denied the privilege of continued residency on campus. 2. Undergraduate students residing in University housing must be regularly enrolled students of the University, taking a minimum of 12 credit hours each semester. Graduate students (when housed by exception) must carry a minimum of nine credit hours per semester. To apply and sign-up for University Village apartments, students must have 45 or more completed academic credits. In order to move into University Village, students must have 60 or more completed academic credits or have completed 4 academic semesters at the University and be achieving satisfactory academic progress as defined by the University Bulletin.

  • Safety Requirements The Contractor shall comply with all Federal, State, and local safety laws and regulations applicable to the Work performed under this Agreement.

  • Security Practices Dell has implemented corporate information security practices and standards that are designed to safeguard the Dell’s corporate environment and to address: (1) information security; (2) system and asset management; (3) development; and (4) governance. These practices and standards are approved by the Dell CIO and undergo a formal review on an annual basis.

  • Facility Requirements 1. Maintain wheelchair accessibility to program activities according to governing law, including the Americans With Disabilities Act (ADA), as applicable. 2. Provide service site(s) that will promote attainment of Contractor’s program objectives. Arrange the physical environment to support those activities. 3. Decrease program costs when possible by procuring items at no cost from County surplus stores and by accepting delivery of such items by County.

  • Data Security Requirements Without limiting Contractor’s obligation of confidentiality as further described in this Contract, Contractor must establish, maintain, and enforce a data privacy program and an information and cyber security program, including safety, physical, and technical security and resiliency policies and procedures, that comply with the requirements set forth in this Contract and, to the extent such programs are consistent with and not less protective than the requirements set forth in this Contract and are at least equal to applicable best industry practices and standards (NIST 800-53).

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!