Security Programs Sample Clauses

Security Programs. You must comply with the Card Networkssecurity standards, requirements and programs (e.g., the Visa Account Information Security Program), and all Card Network Rules governing the privacy, protection, and your use, storage and disclosure of data.
Security Programs. Each Seller is in compliance in all material respects with all privacy and data security policies, procedures and Legal Requirements applicable to its business and the Purchased Assets. Each Seller maintains and is in compliance in all material respects with a written information security policy that implements commercially reasonable security programs that are designed to protect (a) the security, confidentiality, availability and integrity of transactions executed through its computer systems, including encryption and/or other security protocols and techniques when appropriate and (b) the security, confidentiality and integrity of all non-public personal information and other confidential and proprietary data. To the Knowledge of the Sellers, no Seller has suffered a security breach with respect to its data or systems and no Seller has notified any customer, policy holder, mortgage borrower or any employee or independent contractor of any information security breach involving such customer’s, policy holder’s or mortgage borrower’s confidential information or such employee’s or independent contractor’s confidential information.
Security Programs. Each of the Seller, the Purchased Subsidiary and its Subsidiaries is in compliance in all material respects with all privacy and data security policies, procedures and Legal Requirements applicable to its business and the Purchased Subsidiary, its Subsidiaries and the respective Assets thereof. The Seller, the Purchased Subsidiary and each of its Subsidiaries maintains and is in compliance in all material respects with a written information security policy that implements commercially reasonable security programs that are designed to protect (a) the security, confidentiality, availability and integrity of transactions executed through its computer systems, including encryption and/or other security protocols and techniques when appropriate and (b) the security, confidentiality and integrity of all non-public personal information and other confidential and proprietary data. To the Knowledge of the Seller, neither the Seller nor the Purchased Subsidiary nor any of its Subsidiaries has suffered a security breach with respect to its data or systems and neither the Seller nor the Purchased Subsidiary or its Subsidiaries has notified any customer, policy holder, mortgage borrower or any employee or independent contractor of any information security breach involving such customer's, policy holder's or mortgage borrower's confidential information or such employee's or independent contractor's confidential information.
Security Programs. (a) Vendor will, and will cause its agents, employees and subcontractors to comply with (i) all applicable laws, rules, and regulations and (ii) all safety and security requests, inspections and programs (“Security Programs”), whether mandatory or voluntary, made by any governmental entity or by Lowe’s and communicated to or otherwise made available to Vendor. Security Programs shall include but not be limited to those sponsored by the Department of Homeland Security and the United States Bureau of Customs and Border Protection (e.g., the Customs Trade Partnership Against Terrorism (“CTPAT”)). Upon notification and request by Lowe’s, Vendor agrees to comply with all Security Programs implemented by Lowe’s or by any governmental entity and provide documented proof of such compliance, in a form satisfactory to Lowe’s. From time to time, Lowe’s may inform Vendor of changes to the Security Programs, and Vendor agrees to comply with such changes. (b) For International Transactions, Vendor will comply with the Lowe’s corporate cargo security requirements as Lowe’s may advise or make available to Vendor from time to time and which shall apply in full at all factories that produce Products for sale by Vendor to Lowe’s. In addition, for International Transactions, each factory that produces Products for sale by Vendor to Lowe’s is required to complete a separate vendor security questionnaire and certification in such form as Lowe’s may advise or make available to Vendor from time to time, at least thirty (30) days prior to production of Products. Signed copies of each of the forgoing must be maintained with the Company Seal or Company Chop (as applicable) at each factory and made available for on-site inspections which will be conducted to verify that each factory complies with the security criteria. 15.7
Security Programs. Licensee shall maintain a strict, accurate and current inventory of all hangtags, labels and other like matter to preclude diversion. Licensee shall implement any security label program that Licensor may implement to protect the Marks and to help identify and/or prevent diverted and/or counterfeit product.
Security Programs. (1) The Under Sec- retary shall prescribe regulations under sub- section (b) of this section that require each op- erator of an airport regularly serving an air car- rier holding a certificate issued by the Secretary of Transportation to establish an air transpor- tation security program that provides a law en- forcement presence and capability at each of those airports that is adequate to ensure the safety of passengers. The regulations shall au- thorize the operator to use the services of quali- fied State, local, and private law enforcement personnel. When the Under Secretary decides, after being notified by an operator in the form the Under Secretary prescribes, that not enough qualified State, local, and private law enforce- ment personnel are available to carry out sub- section (b), the Under Secretary may authorize the operator to use, on a reimbursable basis, personnel employed by the Under Secretary, or by another department, agency, or instrumen- tality of the Government with the consent of the head of the department, agency, or instru- mentality, to supplement State, local, and pri- vate law enforcement personnel. When deciding whether additional personnel are needed, the Under Secretary shall consider the number of passengers boarded at the airport, the extent of anticipated risk of criminal violence or aircraft piracy at the airport or to the air carrier air- craft operations at the airport, and the avail- ability of qualified State or local law enforce- ment personnel at the airport.
Security Programs. (1) The Adminis- trator shall prescribe regulations under sub- section (b) of this section that require each op- erator of an airport regularly serving an air car- rier holding a certificate issued by the Secretary of Transportation to establish an air transpor- tation security program that provides a law en- forcement presence and capability at each of those airports that is adequate to ensure the safety of passengers. The regulations shall au- thorize the operator to use the services of quali- fied State, local, and private law enforcement personnel. When the Administrator decides, after being notified by an operator in the form the Administrator prescribes, that not enough qualified State, local, and private law enforce- ment personnel are available to carry out sub- section (b), the Administrator may authorize the operator to use, on a reimbursable basis, personnel employed by the Administrator, or by another department, agency, or instrumentality of the Government with the consent of the head of the department, agency, or instrumentality, to supplement State, local, and private law en- forcement personnel. When deciding whether ad- ditional personnel are needed, the Adminis- trator shall consider the number of passengers boarded at the airport, the extent of anticipated risk of criminal violence or aircraft piracy at the airport or to the air carrier aircraft oper- ations at the airport, and the availability of qualified State or local law enforcement per- sonnel at the airport. (A) The Administrator may approve a secu- rity program of an airport operator, or an amendment in an existing program, that incor- porates a security program of an airport tenant (except an air carrier separately complying with part 108 or 129 of title 14, Code of Federal Regu- lations) having access to a secured area of the airport, if the program or amendment incor- porates— (i) the measures the tenant will use, within the tenant’s leased areas or areas designated for the tenant’s exclusive use under an agree- ment with the airport operator, to carry out the security requirements imposed by the Ad- ministrator on the airport operator under the access control system requirements of section 107.14 of title 14, Code of Federal Regulations, or under other requirements of part 107 of title 14; and (ii) the methods the airport operator will use to monitor and audit the tenant’s compliance with the security requirements and provides that the tenant will be required to pay mone- tar...
Security Programs. Supplier shall comply with all requirements of the border security programs of the destination country (e.
Security Programs. Tenant shall reasonably comply with any security programs and with any commuter programs or special parking arrangements designed to reduce the number of automobiles traveling to and from the Building, such as (but not limited to) carpooling or variable work hour programs, if such programs are required by Landlord, in Landlord!s sole and absolute discretion, or by Law.

Related to Security Programs

  • Security Program Contractor will develop and implement an effective security program for the Project Site, which program shall require the Contractor and subcontractors to take measures for the protection of their tools, materials, equipment, and structures. As between Contractor and Owner, Contractor shall be solely responsible for security against theft of and damage of all tools and equipment of every kind and nature and used in connection with the Work, regardless of by whom owned.

  • Security Protocols Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.

  • Information Security Program (1) DTI shall implement and maintain a comprehensive written information security program applicable to the Personal Information ("Information Security Program") which shall include commercially reasonable measures, including, as appropriate, policies and procedures and technical, physical, and administrative safeguards that are consistent with industry standards, providing for (i) the security and confidentiality of the Personal Information, (ii) protection of the Personal Information against reasonably foreseeable threats or hazards to the security or integrity of the Personal Information, (iii) protection against unauthorized access to or use of or loss or theft of the Personal Information, and (iv) appropriate disposal of the Personal Information. Without limiting the generality of the foregoing, the Information Security Program shall provide for (i) continual assessment and re-assessment of the risks to the security of Personal Information acquired or maintained by DTI and its agents, contractors and subcontractors in connection with the Services, including but not limited to (A) identification of internal and external threats that could result in unauthorized disclosure, alteration or destruction of Personal Information and systems used by DTI and its agents, contractors and subcontractors, (B) assessment of the likelihood and potential damage of such threats, taking into account the sensitivity of such Personal Information, and (C) assessment of the sufficiency of policies, procedures, information systems of DTI and its agents, contractors and subcontractors, and other arrangements in place, to control risks; and (ii) appropriate protection against such risks. (2) The Information Security Program shall require encryption of any Personal Information in electronic format while in transit or in storage, and enhanced controls and standards for transport and disposal of physical media containing Personal Information. DTI shall, and shall require its agents, contractors and subcontractors who access or use Personal Information or Confidential Information to, regularly test key controls, systems and procedures relating to the Information Security Program ("ISP Tests"). DTI shall advise the Funds of any material issues identified in the ISP Tests potentially affecting the Information Security Program. (3) DTI shall comply with its Information Security Program.

  • Security Procedures The Fund shall comply with data access operating standards and procedures and with user identification or other password control requirements and other security procedures as may be issued from time to time by State Street for use of the System on a remote basis and to access the Data Access Services. The Fund shall have access only to the Fund Data and authorized transactions agreed upon from time to time by State Street and, upon notice from State Street, the Fund shall discontinue remote use of the System and access to Data Access Services for any security reasons cited by State Street; provided, that, in such event, State Street shall, for a period not less than 180 days (or such other shorter period specified by the Fund) after such discontinuance, assume responsibility to provide accounting services under the terms of the Custodian Agreement.

  • Security Procedure The Client acknowledges that the Security Procedure it has designated on the Selection Form was selected by the Client from Security Procedures offered by State Street. The Client agrees that the Security Procedures are reasonable and adequate for its wire transfer transactions and agrees to be bound by any payment orders, amendments and cancellations, whether or not authorized, issued in its name and accepted by State Street after being confirmed by any of the selected Security Procedures. The Client also agrees to be bound by any other valid and authorized payment order accepted by State Street. The Client shall restrict access to confidential information relating to the Security Procedure to authorized persons as communicated in writing to State Street. The Client must notify State Street immediately if it has reason to believe unauthorized persons may have obtained access to such information or of any change in the Client’s authorized personnel. State Street shall verify the authenticity of all instructions according to the Security Procedure.

  • Security Policies IBM maintains privacy and security policies that are communicated to IBM employees. IBM requires privacy and security training to personnel who support IBM data centers. We have an information security team. IBM security policies and standards are reviewed and re-evaluated annually. IBM security incidents are handled in accordance with a comprehensive incident response procedure.

  • Security Practices Dell has implemented corporate information security practices and standards that are designed to safeguard the Dell’s corporate environment and to address: (1) information security; (2) system and asset management; (3) development; and (4) governance. These practices and standards are approved by the Dell CIO and undergo a formal review on an annual basis.

  • Security Plan The Business Continuity Plan and the Disaster Recovery Plan may be combined into one document. Additionally, at the beginning of each State Fiscal Year, if the MCO modifies the following documents, it must submit the revised documents and corresponding checklists for HHSC’s review and approval:

  • Security Policy As part of PCI DSS, the Card Organizations require that you have a security policy that covers the security of credit card information.

  • Security Safeguards Contractor shall maintain a comprehensive security program that is reasonably designed to protect the security, privacy, confidentiality, and integrity of District Data. Contractor shall store and process District Data in accordance with industry standards and best practices, including implementing appropriate administrative, physical, and technical safeguards that are no less rigorous than those outlined in CIS Critical Security Controls (CIS Controls), as amended, to secure such data from unauthorized access, disclosure, alteration, and use. Contractor shall ensure that all such safeguards, including the manner in which District Data is collected, accessed, used, stored, processed, disposed of and disclosed, comply with all applicable federal and state data protection and privacy laws, regulations and directives, including without limitation the Act, as well as the terms and conditions of this Addendum. Without limiting the foregoing, and unless expressly agreed to the contrary in writing, Contractor warrants that all electronic District Data will be encrypted in transmission and at rest in accordance with NIST Special Publication 800-57, as amended, or such other standard as the District’s Chief Privacy Officer or designee may agree to in writing. Contractor shall also encrypt any backup, backup media, removable media, tape, or other copies. In addition, Contractor shall fully encrypt disks and storage for all laptops and mobile devices.