Security Practices and Procedures Sample Clauses

Security Practices and Procedures. Screencastify has implemented the following security controls intended to provide reasonable administrative, technical, and physical safeguards to protect the security, confidentiality, and integrity of the PII in its custody: a. Screencastify has designated a privacy officer responsible for information security governance and maintains privacy policies and practices that support compliance with the Family Educational Rights and Privacy Act (“FERPA”), the Children's Online Privacy Protection Act (“COPPA”) and other applicable laws. b. PII is hosted in Google Cloud data centers located in the United States that maintain their own rigorous industry standard certifications and compliance offerings. c. Screencastify will comply with its privacy policy at xxxxx://xxx.xxxxxxxxxxxxx.xxx/privacy/policy. d. All provisions of the Customer’s Parents’ Bill of Rights for data privacy and security as required by New York Ed Law 2d are incorporated into this Plan. e. Screencastify provides regular privacy and security awareness training, including training on applicable laws that govern the handling of PII, to its employees who will have access to PII. f. Screencastify limits internal access to education records and PII to those individuals that are determined to have legitimate educational interests within the meaning of §2-d and FERPA; e.g., the individual needs access to the PII in order to fulfill his or her responsibilities in performing services to the Customer; g. Screencastify uses encryption technology and other suitable means to protect the PII in Screencastify’s custody, whether in motion or at rest, from unauthorized disclosure using a technology or methodology specified by the secretary of the U.S. Department of Health and Human Services in guidance issued under P.L. 111-5, Section 13402(H)(2), or any other technology or methodology specifically authorized by applicable statute, regulation or the New York State Education Department; h. If Screencastify becomes aware of any breach of security resulting in an unauthorized release of Customer’s PII by Screencastify or its subcontractors, Screencastify will notify Customer as required by applicable law or otherwise where Screencastify deems necessary to protect the safety and security of PII. i. Screencastify uses a minimum encryption of AES256 for all data at rest and a minimum of TLS 1.3 for all data in transit.
AutoNDA by SimpleDocs
Security Practices and Procedures. 1.1. Company shall implement and maintain a security management policy that is in compliance with the standards and controls of ISO 27000 (or subsequent version) or an equivalent industry standard for information security management. 1.2. The Company shall maintain security practices and standards designed to secure the organization’s environment, protect the confidentiality, integrity, and availability of the organization’s information and computing environment from a wide range of threats, and minimize the impact on the business.
Security Practices and Procedures. Seller and Seller’s employees and subcontractors who perform under this Agreement shall comply with the security practices and procedures prescribed for Buyer’s Facilities, which shall be consistent with industry practices. Seller shall advise its employees and subcontractors and their employees of these practices and procedures and secure their consent to abide by these procedures.

Related to Security Practices and Procedures

  • Policies and Procedures i) The policies and procedures of the designated employer apply to the employee while working at both sites. ii) Only the designated employer shall have exclusive authority over the employee in regard to discipline, reporting to the College of Nurses of Ontario and/or investigations of family/resident complaints. iii) The designated employer will ensure that the employee is covered by WSIB at all times, regardless of worksite, while in the employ of either home. iv) The designated employer will ensure that the employee is covered by liability insurance at all times, regardless of worksite, while in the employ of either home. v) The designated employer shall have exclusive authority over the employee’s personnel files and health records. These files will be maintained on the site of the designated employer.

  • Security Procedures The Fund shall comply with data access operating standards and procedures and with user identification or other password control requirements and other security procedures as may be issued from time to time by State Street for use of the System on a remote basis and to access the Data Access Services. The Fund shall have access only to the Fund Data and authorized transactions agreed upon from time to time by State Street and, upon notice from State Street, the Fund shall discontinue remote use of the System and access to Data Access Services for any security reasons cited by State Street; provided, that, in such event, State Street shall, for a period not less than 180 days (or such other shorter period specified by the Fund) after such discontinuance, assume responsibility to provide accounting services under the terms of the Custodian Agreement.

  • Policy and Procedures If the resident leaves the facility due to hospitalization or a therapeutic leave, the facility shall not be obligated to hold the resident’s bed available until his or her return, unless prior arrangements have been made for a bed hold pursuant to the facility’s “Bed Reservation Policy and Procedure” and pursuant to applicable law. In the absence of a bed hold, the resident is not guaranteed readmission unless the resident is eligible for Medicaid and requires the services provided by the facility. However, the resident may be placed in any appropriate bed in a semi-private room in the facility at the time of his or her return from hospitalization or therapeutic leave provided a bed is available and the resident’s admission is appropriate and meets the readmission requirements of the facility.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!