Security Program. Contractor will develop and implement an effective security program for the Project Site, which program shall require the Contractor and subcontractors to take measures for the protection of their tools, materials, equipment, and structures. As between Contractor and Owner, Contractor shall be solely responsible for security against theft of and damage of all tools and equipment of every kind and nature and used in connection with the Work, regardless of by whom owned.
Security Program. DST shall maintain a comprehensive information security program under which DST documents, implements and maintains the physical, administrative, and technical safeguards reasonably designed and implemented to: (a) comply with U.S. laws applicable to DST’s business and (b) protect the confidentiality, integrity, availability, and security of Fund Confidential Information. Such program shall align with the National Institute of Security and Technology (“NIST”) security framework.
Security Program. Develop and implement an effective security program for the Project Site, which program shall require the Design-Builder and the Trade Contractors to take measures for the protection of their tools, materials, equipment, and structures. As between Design-Builder and Owner, Design-Builder shall be solely responsible for security against theft of and damage to all tools and equipment of every kind and nature used in connection with the Work, regardless of by whom owned.
Security Program. Licensor will, consistent with industry standard practices, implement and maintain a security program: (a) to maintain the security and confidentiality of Confidential Information; and (b) to protect Confidential Information from known or reasonably anticipated threats or hazards to its security, availability and integrity, including accidental loss, unauthorized use, access, alteration or disclosure. Licensor will safeguard Xxxxx’s Confidential Information with at least the degree of care it uses to protect its own confidential information of a like nature and no less than a reasonable degree of care. Without limitation, Licensor’s policies will require, and the safeguards to be implemented by Licensor, will include at a minimum, but without limitation to, the following:
1.1 appropriate administrative controls, such as communication of all applicable information security policies, information security and confidentiality training, and assignment of unique access credentials (which shall be revoked upon termination);
1.2 controls to ensure the physical safety and security of all facilities (including third party locations) where Confidential Information may be processed or stored, including, at a minimum, locked doors and keys/key cards to access any facility and a business continuity plan that is regularly reviewed and updated;
1.3 controls to limit access to Licensor’s systems and Confidential Information, including a password policy for all Personnel that access Confidential Information and a prohibition on the use of shared credentials for users and/or systems; and
1.4 regular testing and evaluation of the effectiveness of the safeguards for the protection of Confidential Information.
Security Program. The Transfer Agent shall maintain a comprehensive information security program under which the Transfer Agent documents, implements and maintains the physical, administrative, and technical safeguards reasonably designed and implemented to: (a) comply with U.S. laws applicable to the Transfer Agent’s business and (b) protect the confidentiality, integrity, availability, and security of Customer Confidential Information.
Security Program. We have implemented and will maintain an information security program that follows generally accepted system security principles embodied in the ISO 27001 standard designed to protect the Customer Data as appropriate to the nature and scope of the Services provided. PureCloud’s Security & Compliance Team maintaining the information security program includes experienced professionals holding a wide range of certifications in both security and privacy. The information security program includes at least the following elements:
Security Program. While providing the Subscription Service, ServiceNow will maintain a written information security program of policies, procedures and controls governing the processing, storage, transmission and security of Customer Data (the “Security Program”). The Security Program includes industry-standard practices designed to protect Customer Data from accidental or unlawful destruction, loss, alteration, unauthorized disclosure, or access. ServiceNow regularly tests, assesses, and evaluates the effectiveness of the Security Program and may periodically review and update the Security Program to address new and evolving security technologies, changes to industry standard practices, and changing security threats, although no such update will materially reduce the commitments, protections or overall level of service provided to Customer as described herein.
Security Program. We have implemented and will maintain an information security program that follows generally accepted system security principles embodied in the SOC-2 standard designed to protect the Customer Data as appropriate to the nature and scope of the Services provided. The information security program includes at least the following elements:
Security Program. Develop and implement an effective security program for the Project Site, which program shall require the CM/GC and the Trade Contractors to take measures for the protection of their tools, materials, equipment, and structures. As between CM/GC and Owner, CM/GC shall be solely responsible for security against theft of and damage to all tools and equipment of every kind and nature used in connection with the Work, regardless of by whom owned.
Security Program. Xxxxxx’x systems are designed according to established industry best security practices, and includes many technical and administrative security controls, including, without limitation: