Security Practices. Dell has implemented corporate information security practices and standards that are designed to safeguard the Dell’s corporate environment and to address: (1) information security; (2) system and asset management; (3) development; and (4) governance. These practices and standards are approved by the Dell CIO and undergo a formal review on an annual basis.
Security Practices. A. Protected data provided to the contractor will be stored: (include where and how) B. The security protections taken to ensure data will be protected that align with the NIST Cybersecurity Framework and industry best practices include:
Security Practices. The Provider that creates, receives, maintains, or transmits electronic protected health information in its role as a provider shall undertake the following acts regarding such information:
a. Ensure the information’s confidentiality, integrity, and availability. 45 C.F.R. 164.308 (administrative safeguards), 164.310 (physical safeguards), 164.312 (technical safeguards), and 164.316 (policies, procedures and documentation requirements) shall apply to the Provider in the same manner that such sections apply to DHSS, and shall be implemented in accordance with HIPAA, the HITECH Act, and the Privacy and Security Rule. The additional requirements of Title XIII of the HITECH Act contained in Public Law 111-5 that relate to security and that are made applicable to covered entities shall also apply to the Provider and are incorporated into this Privacy and Security Procedures.
b. Protect against any reasonably anticipated threats or hazards to the security or integrity of such information, including during its transmission to and from the provider.
c. Protect against reasonably anticipated uses or disclosures of such information when the use or disclosure is not required or permitted by law.
d. Implement protections that govern the receipt, removal, disposition, and re-use of hardware and electronic media (which includes, but is not limited to hard disks, magnetic tapes, compact disks, videotapes, audiotapes, handheld electronic devices and removable storage devices such as floppy disks, zip disks, and memory cards) that contain or have contained electronic protected health information. In particular, the provider shall:
i. Ensure that all hardware used or electronic media developed by the provider through the provision of services under the agreement be cleaned with a wipe utility that prevents the recovery of any information from the device, prior to the hardware or device being re-used, salvaged, surplussed, or disposed.
ii. For each piece of hardware or electronic media to be re-used, salvaged, surplused, or disposed, furnish a Disposal Assurance Form (attached as Exhibit 1 to these procedures) to the contact person named in the Provider Agreement.
e. Ensure that its workforce protect the security of such information.
Security Practices. Confidential Data provided to Contractor by the School District will be stored [insert location]. The measures that Contractor takes to protect Confidential Data will align with the NIST Cybersecurity Framework, including but not necessarily limited to, disk encryption, file encryption, firewalls, and password protection.
Security Practices. IBM implements and maintains practices and procedures, which may be revised periodically, regarding the systems used to host and operate the IBM SaaS. These practices and procedures are designed to reduce the vulnerability of our systems to accidental loss, unlawful intrusions, unauthorized access, disclosure or alteration, or wrongful conduct that may interfere with, misappropriate, or otherwise damage the Content or Customer's use of the IBM SaaS. A description of the practices and procedures applicable to the IBM SaaS, including applicable technical and operational measures, is available to Customer upon request. Customer is responsible for determining whether these practices and procedures are appropriate to meet Customer's requirements. By using the IBM SaaS, Customer acknowledges its acceptance of the IBM practices and procedures and their adequacy for Customer's purposes. Except as specifically provided in the Security Practices for the IBM SaaS, IBM makes no representations or warranties regarding any security functions.
Security Practices. Confidential Data provided to Contractor by the School District will be stored physically in the Office of the SRO at the School District and/or electronically on the School District’s computer system. The measures that Contractor takes to protect Confidential Data will align with the NIST Cybersecurity Framework, including but not necessarily limited to, disk encryption, file encryption, firewalls, and password protection.
Security Practices. IBM maintains practices and procedures, which may be revised periodically, regarding the systems used to host and operate the IBM SaaS, which practices and procedures are designed to reduce the vulnerability of our systems to intrusions or wrongful conduct that may interfere with, misappropriate, or otherwise damage the Content or Customer's use of the IBM SaaS. A description of the practices and procedures applicable to the IBM SaaS, including applicable technical and operational measures, is available to Customer upon request. Customer is responsible for determining whether these practices and procedures are adequate to meet Customer's requirements. By using the IBM SaaS, Customer acknowledges its acceptance of the IBM practices and procedures and their adequacy for Customer's purposes. Except as specifically provided in the Security Practices for the IBM SaaS, IBM makes no representations or warranties regarding any security functions or that the IBM SaaS or Customer's content are secure from any intrusions or wrongful conduct.
Security Practices. During the Term, LogicMonitor will implement and maintain administrative, physical and technical safeguards and measures designed to protect against unauthorized access to Customer Data as more fully described on Exhibit A hereto (“Security Practices”). During the Term, LogicMonitor will not materially diminish the protections provided by the Security Practices.
Security Practices. Secureworks has implemented corporate information security practices and standards that are designed to safeguard the Secureworks’ corporate environment and to address: (1) information security; (2) system and asset management; (3) development; and (4) governance. These practices and standards are approved by the Secureworks CIO and undergo a formal review on an annual basis.
Security Practices. Arista has implemented corporate information security practices and standards that are designed to safeguard Arista’s corporate environment and to address business objectives across the following areas: