Security Practices and Policies Sample Clauses

Security Practices and Policies. We will implement and maintain appropriate technical and organizational measures to protect Your Data and Personal Data. Those measures shall be set forth in our Security Policy. Upon Your request We will arrange a walkthrough of that policy with You, along with descriptions of the security controls in place for the Services and other information reasonably requested by You regarding Our security practices and policies.
AutoNDA by SimpleDocs
Security Practices and Policies. Customer acknowledges and agrees that, taking into account the state of the art, the costs of implementation, and the nature, scope, context and purposes of the Processing of its Personal Data as well as the risks to Individuals, the security practices and policies implemented and maintained by Provider provide a level of security appropriate to the risk with respect to Personal Data for which Customer is the Controller.
Security Practices and Policies. Altia has implemented and maintains appropriate technical and organisational measures to protect Customer Data and Personal Data against accidental or unlawful destruction, loss, alteration, unauthorised disclosure of or access to, Personal Data transmitted, stored or otherwise processed. Controls and security models for Altia Service(s) and Altia’s internal security programs & polices may be made available to Customer(s) under nondisclosure agreement upon a heavily justified written request. Altia reserve the right not to disclose, or control disclosure of internal security program, policy information and Altia Service(s) control and security models, to protect the overall security posture of Altia and the Altia Service(s).

Related to Security Practices and Policies

  • Security Practices A. Protected data provided to the contractor will be stored: (include where and how) B. The security protections taken to ensure data will be protected that align with the NIST Cybersecurity Framework and industry best practices include:

  • SAFETY PRACTICES (a) The employer will take reasonable measures to prevent and eliminate any present or potential job hazards which the employees may encounter at their places of work.

  • Pay Practices The Employer recognizes the importance of regularity in pay practices and to the greatest extent possible the Employer will not alter the payment routines. Nurses will be notified in writing by the Employer not less than sixty (60) days in advance of a change to the pay practices.

  • Security Policies IBM maintains privacy and security policies that are communicated to IBM employees. IBM requires privacy and security training to personnel who support IBM data centers. We have an information security team. IBM security policies and standards are reviewed and re-evaluated annually. IBM security incidents are handled in accordance with a comprehensive incident response procedure.

  • Data Practices The Parties acknowledge that this Agreement is subject to the requirements of Minnesota’s Government Data Practices Act, Minnesota Statutes, Section 13.01

  • Procedures and Practices (a) The members of the Works Committee may:

  • All Policies Each insurance policy required by this Agreement shall be endorsed and state the coverage shall not be suspended, voided, cancelled by the insurer or either party to this Agreement, reduced in coverage or in limits except after 30 days' prior written notice by Certified mail, return receipt requested, has been given to District

  • Notice of Privacy Practices Business Associate shall abide by the limitations of Covered Entity’s Notice of which it has knowledge. Any use or disclosure permitted by this Agreement may be amended by changes to Covered Entity’s Notice; provided, however, that the amended Notice shall not affect permitted uses and disclosures on which Business Associate relied prior to receiving notice of such amended Notice.

  • Good industry practices 12.1.1. SAP warrants that: a) its Services will be performed in a professional xxxxxxx-like manner by Consultants with the skills reasonably required for the Services; and

  • Best Practices The Recipient acknowledges they may or may not have access to the Owner’s Confidential Information and agrees that it shall not directly or indirectly divulge, disclose, or communicate any of the Confidential Information to any third party, except as may be required during any formal business association or dealings on behalf of the Owner for any event, with the prior written approval of the Owner. The Recipient acknowledges that no license of the Confidential Information, by implication or otherwise, is granted to the Recipient by reason of this Agreement. Additionally, the Recipient acknowledges that it may only use the Confidential Information in connection with its business dealings with the Owner and for no other purpose without the prior written consent of the Owner.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!