Security Procedures and Practices Sample Clauses

Security Procedures and Practices. The Company agrees that at it will implement and maintain security procedures and practices that, at a minimum, are designed to protect covered information from unauthorized access, destruction, use, modification, or disclosure that based on the sensitivity of the data and the risk from unauthorized access: (i) use technologies and methodologies that are consistent with the U.S. Department of Commerce’s National Institute of Standards and Technology’s Framework for Improving Critical Infrastructure Cybersecurity Version 1.1. and any updates to it; or (ii) maintain technical safeguards as they relate to the possession of covered information in a manner consistent with the provisions of 45 C.F.R. 164.312.
AutoNDA by SimpleDocs
Security Procedures and Practices. The Company agrees that at it will implement and maintain security procedures and practices that, at a minimum, are designed to protect covered information from unauthorized access, destruction, use, modification, or disclosure that based on the sensitivity of the data and the risk from unauthorized access: (i) use technologies and methodologies that are consistent
Security Procedures and Practices. The Company agrees that at it will implement and maintain security procedures and practices that, at a
Security Procedures and Practices. The Company agrees that it will implement and maintain security procedures and practices that, at a minimum, are designed to protect covered information School District Data from unauthorized access, destruction, use, modification, or disclosure that, based on the sensitivity of the data and the risk from unauthorized access, will: (i) use technologies and methodologies that are consistent with the U.S. Department of Commerce’s National Institute of Standards and Technology’s Framework for Improving Critical Infrastructure Cybersecurity Version 1.1. and any updates to it; or (ii) maintain technical safeguards as they relate to the possession of covered information in a manner consistent with the provisions of 45

Related to Security Procedures and Practices

  • Security Procedures The Fund shall comply with data access operating standards and procedures and with user identification or other password control requirements and other security procedures as may be issued from time to time by State Street for use of the System on a remote basis and to access the Data Access Services. The Fund shall have access only to the Fund Data and authorized transactions agreed upon from time to time by State Street and, upon notice from State Street, the Fund shall discontinue remote use of the System and access to Data Access Services for any security reasons cited by State Street; provided, that, in such event, State Street shall, for a period not less than 180 days (or such other shorter period specified by the Fund) after such discontinuance, assume responsibility to provide accounting services under the terms of the Custodian Agreement.

  • Security Practices Dell has implemented corporate information security practices and standards that are designed to safeguard the Dell’s corporate environment and to address: (1) information security; (2) system and asset management; (3) development; and (4) governance. These practices and standards are approved by the Dell CIO and undergo a formal review on an annual basis.

  • Safety and Security Procedures Contractor shall maintain and enforce, at the Contractor Work Locations, industry-standard safety and physical security policies and procedures. While at each Court Work Location, Contractor shall comply with the safety and security policies and procedures in effect at such Court Work Location.

  • Violence Policies and Procedures The Employer agrees to have in place explicit policies and procedures to deal with violence. The policy will address the prevention of violence, the management of violent situations, provision of legal counsel and support to employees who have faced violence. The policies and procedures shall be part of the employee's health and safety policy and written copies shall be provided to each employee. Prior to implementing any changes to these policies, the employer agrees to consult with the Association.

  • Safety Procedures The Contractor shall: (a) comply with all applicable safety regulations according to Attachment H; (b) take care for the safety of all persons entitled to be on the Site; (c) use reasonable efforts to keep the Site and Works clear of unnecessary obstruction so as to avoid danger to these persons; (d) provide fencing, lighting, guarding and watching of the Works until completion and taking over under clause 10 [Employer's Taking Over]; and (e) provide any Temporary Works (including roadways, footways, guards and fences) which may be necessary, because of the execution of the Works, for the use and protection of the public and of owners and occupiers of adjacent land.

  • Administrative Claims Requirements and Procedures No suit or arbitration shall be brought arising out of this Agreement against City unless a claim has first been presented in writing and filed with City and acted upon by City in accordance with the procedures set forth in Chapter 1.34 of the Chula Vista Municipal Code, as same may be amended, the provisions of which, including such policies and procedures used by City in the implementation of same, are incorporated herein by this reference. Upon request by City, Consultant shall meet and confer in good faith with City for the purpose of resolving any dispute over the terms of this Agreement.

  • Security Procedure The Client acknowledges that the Security Procedure it has designated on the Selection Form was selected by the Client from Security Procedures offered by State Street. The Client agrees that the Security Procedures are reasonable and adequate for its wire transfer transactions and agrees to be bound by any payment orders, amendments and cancellations, whether or not authorized, issued in its name and accepted by State Street after being confirmed by any of the selected Security Procedures. The Client also agrees to be bound by any other valid and authorized payment order accepted by State Street. The Client shall restrict access to confidential information relating to the Security Procedure to authorized persons as communicated in writing to State Street. The Client must notify State Street immediately if it has reason to believe unauthorized persons may have obtained access to such information or of any change in the Client’s authorized personnel. State Street shall verify the authenticity of all instructions according to the Security Procedure.

  • Security Protocols Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.

  • Compliance Policies and Procedures To assist the Fund in complying with Rule 38a-1 of the 1940 Act, BBH&Co. represents that it has adopted written policies and procedures reasonably designed to prevent violation of the federal securities laws in fulfilling its obligations under the Agreement and that it has in place a compliance program to monitor its compliance with those policies and procedures. BBH&Co will upon request provide the Fund with information about our compliance program as mutually agreed.

  • Endorsements and Procedures You agree to restrictively endorse any item transmitted through our RDC service by either: • Signing the back of the item with your name and the words “For Mobile Deposit Only” • Following other instructions provided by us. You agree to follow any and all further procedures and instructions for use of our RDC service that we may communicate to you through changes to this agreement or through other notice we provide to you. You agree to securely retain each item for no fewer than 90 days after deposit. Then, no fewer than 90 days after deposit, you agree to mark each item submitted via our RDC service as “Void” and dispose of it using a high degree of care to ensure the item cannot be transmitted, deposited, or presented again. We reserve the right to impose daily limits on the aggregate amount of and/or number of deposits you may make using our RDC service. We may modify these limits at any time and without notice. Current limits are presented to you in our RDC service interface. Your enrollment in our RDC services generally occurs when you become an account owner; however, we reserve the right to deny your enrollment in and terminate your access to RDC service at our sole discretion. You warrant to us that: • You will only transmit eligible items that are properly endorsed. • You will not transmit duplicate items. • All information you provide to us when using our RDC service is accurate and true. • We will not sustain a loss because you have deposited an item. • You will indemnify us from any loss for breach of this warranty provision. In general, if an image of an item you transmit using RDC is received and accepted before 4:00 p.m. ET on a business day we are open, we consider that day to be the day of that deposit, subject to the other terms and conditions herein. Otherwise, we may consider the deposit to be made on the next Business Day we are open. Funds deposited using our RDC service will generally be made available by the third business day from the day of deposit. However, we generally make the first $225 of the aggregate of your checks deposited through our RDC service on each business day available by the next business day. We may delay the availability of your funds for a longer period of time at our discretion if we deem it appropriate in accordance with our policies and procedures.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!