Security Program Requirements Sample Clauses

Security Program Requirements. The Security Program includes industry-standard practices designed to protect Buyer Data from accidental or unlawful destruction, loss, alteration, unauthorized disclosure, or access. Supplier shall: (a) maintain, monitor, and enforce appropriate organizational, administrative, technical, and physical safeguards to protect the security, integrity, confidentiality, and availability of Buyer Data and Supplier information systems processing Buyer Data (“Supplier Information Systems”); and (b) protect against: (i) anticipated threats and hazards; and (ii)
AutoNDA by SimpleDocs
Security Program Requirements. Axcient will maintain a security program that contains organisational, technical, and physical safeguards appropriate to the complexity, nature, and scope of its activities. Axcient’s security program shall be appropriate to the risks that are presented by the processing and designed to protect the security and confidentiality of Customer Data against unlawful or accidental access to, or unauthorized processing, disclosure, destruction, damage or loss of Customer Data. At a minimum, Axcient’s security program shall include: (a) limiting access of Customer Data to Authorized Persons; (b) managing authentication and access controls of the system components that provide the services, back-up systems, operating systems, storage media and computing equipment (excluding Bring Your Own Device (BYOD) equipment of personnel of Customer, its Affiliates or its contractors); (c) implementing network, application, database, and platform security; (d) means for securing information transmission, storage, and disposal within Axcient’s possession or control; (e) means for encrypting Customer Data stored on media within Axcient’s possession or control by using modern acceptable xxxxxxx and key lengths, including backup media; (f) means for encrypting Customer Data transmitted by Axcient over public or wireless networks by using modern acceptable xxxxxxx and key lengths; and (g) means for keeping firewalls, routers, servers, personal computers, and all other resources current with appropriate security-specific system patches.
Security Program Requirements. MacStadium will maintain a program of physical security that contains administrative, technical, and physical safeguards appropriate to the complexity, nature, and scope of its activities. MacStadium’s physical security program shall be designed to protect the security and confidentiality of Customer Data against unlawful or accidental access to, or unauthorized processing, disclosure, destruction, damage or loss of Customer Data. Customer acknowledges and agrees that, other than physical security, Customer solely controls and is solely responsible for all other aspects of the security of Customer Data.
Security Program Requirements. Service Provider’s written information security program will require that Service Provider apply the same level of security to Personal Data as Service Provider would provide for its own proprietary, sensitive and confidential information. Such program will include, at a minimum, and Service Provider agrees to: (i) implement access controls, including appropriate authentication and credential protocols be maintained as well as limiting access to only authorized representatives who have a need to access in order to carry out their obligations under the Agreement; (ii) safeguard the physical location and infrastructure of any database or record storage area; (iii) safeguard the transmission or transport of any records, including appropriate encryption standards for electronic transmission; (iv) maintain a cyber-incident mitigation strategy, including identify root cause analysis, internal escalations and risk assessment and the ability to restore the availability and access to Personal Data in a timely manner in the event of a physical or technical incident; (v) maintain a cyber-incident response plan; (vi) maintain a records retention policy, which ensures secure storage and destruction, in accordance with the requirements of the Agreement or instructions from Customer; (vii) ensure the pseudonymization or encryption of Personal Data where appropriate. Service Provider shall de-identify all Personal Data prior to storing, accessing, or processing Personal Data in environments other than production environments. Duration of access shall be restricted to the minimum time for which access is required. Service Provider shall use safeguards to protect against any compromise, unauthorized access or other damage to Customer’s network and to secure its networks and IT environments associated with the services being provided to Customer.
Security Program Requirements. Without limiting any data security provisions in the Agreement, Representative shall implement and maintain a comprehensive documented information security program based on the NIST Standards contained in Publication 800-115, ISO 27001, or an equivalent standard (“Security Program”) that implements and maintains industry best practices physical, administrative, and technical safeguards which protect the confidentiality, integrity, availability, and security of Brightspeed Data,
Security Program Requirements. Axcient will maintain a security program that contains administrative, technical, and physical safeguards appropriate to the complexity, nature, and scope of its activities. Axcient’s security program shall be designed to protect the security and confidentiality of Customer Data against unlawful or accidental access to, or unauthorized processing, disclosure, destruction, damage or loss of Customer Data. At a minimum, Axcient’s security program shall include: (a) limiting access of Customer Data to Authorized Persons; (b) managing authentication and access controls of the system components that provide the services, back-up systems, operating systems, storage media and computing equipment (excluding Bring Your Own Device (BYOD) equipment of personnel of Customer, its Affiliates or its contractors); (c) implementing network, application, database, and platform security; (d) means for securing information transmission, storage, and disposal within Axcient’s possession or control; (e) means for encrypting Customer Data stored on media within Axcient’s possession or control by using modern acceptable xxxxxxx and key lengths, including backup media; (f) means for encrypting Customer Data transmitted by Axcient over public or wireless networks by using modern acceptable xxxxxxx and key lengths; and (g) means for keeping firewalls, routers, servers, personal computers, and all other resources current with appropriate security-specific system patches.

Related to Security Program Requirements

  • Security Program Contractor will develop and implement an effective security program for the Project Site, which program shall require the Contractor and subcontractors to take measures for the protection of their tools, materials, equipment, and structures. As between Contractor and Owner, Contractor shall be solely responsible for security against theft of and damage of all tools and equipment of every kind and nature and used in connection with the Work, regardless of by whom owned.

  • Program Requirements The parties shall comply with the Disadvantaged Business Enterprise Program requirements established in 49 CFR Part 26.

  • Security Protocols Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.

  • Match Requirements There is no match required on the part of the Grantee under this Agreement.

  • Federal Medicaid System Security Requirements Compliance Party shall provide a security plan, risk assessment, and security controls review document within three months of the start date of this Agreement (and update it annually thereafter) in order to support audit compliance with 45 CFR 95.621 subpart F, ADP System Security Requirements and Review Process.

  • System Requirements Apple Software is supported only on Apple-branded hardware that meets specified system requirements as indicated by Apple.

  • Security Procedures The Fund shall comply with data access operating standards and procedures and with user identification or other password control requirements and other security procedures as may be issued from time to time by State Street for use of the System on a remote basis and to access the Data Access Services. The Fund shall have access only to the Fund Data and authorized transactions agreed upon from time to time by State Street and, upon notice from State Street, the Fund shall discontinue remote use of the System and access to Data Access Services for any security reasons cited by State Street; provided, that, in such event, State Street shall, for a period not less than 180 days (or such other shorter period specified by the Fund) after such discontinuance, assume responsibility to provide accounting services under the terms of the Custodian Agreement.

  • Contractor Requirements The Firm shall be construed, during the entire term of this contract, to be an independent contractor. Nothing in this contract is intended to nor shall be construed to create an employer- employee relationship, or a joint venture relationship. The Firm represents that it is qualified to perform the duties to be performed under this contract and that it has, or will secure, if needed, at its own expense, applicable personnel who are qualified to perform the duties required under this contract. Such personnel shall not be deemed in any way, directly or indirectly, expressly or by implication, to be employees of the District. Any person assigned by the firm to perform the services hereunder shall be the employee or a subcontractor of the Firm, who shall have the sole right to hire and discharge its employee or subcontractors. The Firm or its subcontractors shall pay, when due, all salaries and wages of their employees and accepts exclusive responsibility for the payment of federal income tax, social security, unemployment compensation and any other withholdings that may be required. Neither the Firm, its subcontractors nor their employees are entitled to state retirement or leave benefits. It is further understood that the consideration expressed herein constitutes full and complete compensation for all services and performance hereunder, and that any sum due and payable to the Firm shall be paid as a gross sum with no withholdings or deductions being made by the District for any purpose from said contract sum, except as permitted in paragraphs 16, 17 and 18.

  • Subcontractor Requirements The Supplier must ensure that any subcontract entered into for the purpose of this Agreement contains an equivalent clause granting the rights specified in this clause.

  • Security Practices Dell has implemented corporate information security practices and standards that are designed to safeguard the Dell’s corporate environment and to address: (1) information security; (2) system and asset management; (3) development; and (4) governance. These practices and standards are approved by the Dell CIO and undergo a formal review on an annual basis.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!