Security Protocols and Tool Control Policy Sample Clauses

Security Protocols and Tool Control Policy. Contractor shall be responsible for Contractor’s, Contractor’s personnel’s, Subcontractors’, and Subcontractors’ personnel’s knowledge and compliance with all Judicial Council and Court required security protocols in the performance of the work. Such protocols include, but are not limited to, the then-current Judicial Council Tool Control Policy. Violation of the Judicial Council’s security protocols and tool control policy shall be considered a material breach of this Contract. The version of the Judicial Council Tool Control Policy in effect as of the Effective Date is attached as Attachment D. The Judicial Council Tool Control Policy is subject to change.
AutoNDA by SimpleDocs
Security Protocols and Tool Control Policy. Licensee shall be responsible for Licensee’s, Licensee’s personnel, subcontractors’, and subcontractors’ personnel knowledge and compliance with all Judicial Council and Court required security protocols in the performance of the work. Such protocols include, but are not limited to, the then-current Judicial Council Tool Control Policy. Violation of the Judicial Council’s security protocols and Tool Control Policy shall be considered a material breach of this SLA. The version of the Judicial Council Tool Control Policy in effect as of the Effective Date is attached as Exhibit R. The Judicial Council Tool Control Policy is subject to change.
Security Protocols and Tool Control Policy. Consultant personnel must comply with all Judicial Council- and Court-required security protocols in the performance of the Work. Such protocols include, but are not limited to, the then-current Judicial Council Tool Control Policy. The version of the Judicial Council Tool Control Policy in effect as of the Effective Date is attached as Exhibit “I.” In addition, for each Assigned Project, Consultant Project Manager shall notify the Contractor(s) about the Judicial Council Tool Control Policy in effect and ensure that the Contractor(s) and their subcontractors comply with the applicable Judicial Council Tool Control Policy.
Security Protocols and Tool Control Policy. Contractor, all Subcontractors, and each of their personnel shall comply with all Judicial Council and Court security protocols required in accessing the Project Site and performing the Work, and Contractor shall be responsible for said personnel’s knowledge thereof and compliance therewith. The Judicial Council and Court’s required security protocols include, but are not limited to, the then-current Judicial Council Tool Control Policy, as may be updated and modified from time-to-time, a copy of the version of which in effect as of the Effective Date is attached as Exhibit D. Violation of the required security protocols or Judicial Council Tool Control Policy shall be considered a material breach of this Contract.
Security Protocols and Tool Control Policy. Vendor shall be responsible for Vendor’s, Vendor’s personnel’s, Subcontractors’, and Subcontractors’ personnel’s knowledge and compliance with all Judicial Council and Court required security protocols in the performance of the Work. Such protocols include, but are not limited to, the then-current Judicial Council Tool

Related to Security Protocols and Tool Control Policy

  • Security Protocols Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.

  • Security Procedures The Fund shall comply with data access operating standards and procedures and with user identification or other password control requirements and other security procedures as may be issued from time to time by State Street for use of the System on a remote basis and to access the Data Access Services. The Fund shall have access only to the Fund Data and authorized transactions agreed upon from time to time by State Street and, upon notice from State Street, the Fund shall discontinue remote use of the System and access to Data Access Services for any security reasons cited by State Street; provided, that, in such event, State Street shall, for a period not less than 180 days (or such other shorter period specified by the Fund) after such discontinuance, assume responsibility to provide accounting services under the terms of the Custodian Agreement.

  • Safety and Security Procedures Contractor shall maintain and enforce, at the Contractor Work Locations, industry-standard safety and physical security policies and procedures. While at each Court Work Location, Contractor shall comply with the safety and security policies and procedures in effect at such Court Work Location.

  • Information Security Program (1) DTI shall implement and maintain a comprehensive written information security program applicable to the Personal Information ("Information Security Program") which shall include commercially reasonable measures, including, as appropriate, policies and procedures and technical, physical, and administrative safeguards that are consistent with industry standards, providing for (i) the security and confidentiality of the Personal Information, (ii) protection of the Personal Information against reasonably foreseeable threats or hazards to the security or integrity of the Personal Information, (iii) protection against unauthorized access to or use of or loss or theft of the Personal Information, and (iv) appropriate disposal of the Personal Information. Without limiting the generality of the foregoing, the Information Security Program shall provide for (i) continual assessment and re-assessment of the risks to the security of Personal Information acquired or maintained by DTI and its agents, contractors and subcontractors in connection with the Services, including but not limited to (A) identification of internal and external threats that could result in unauthorized disclosure, alteration or destruction of Personal Information and systems used by DTI and its agents, contractors and subcontractors, (B) assessment of the likelihood and potential damage of such threats, taking into account the sensitivity of such Personal Information, and (C) assessment of the sufficiency of policies, procedures, information systems of DTI and its agents, contractors and subcontractors, and other arrangements in place, to control risks; and (ii) appropriate protection against such risks. (2) The Information Security Program shall require encryption of any Personal Information in electronic format while in transit or in storage, and enhanced controls and standards for transport and disposal of physical media containing Personal Information. DTI shall, and shall require its agents, contractors and subcontractors who access or use Personal Information or Confidential Information to, regularly test key controls, systems and procedures relating to the Information Security Program ("ISP Tests"). DTI shall advise the Funds of any material issues identified in the ISP Tests potentially affecting the Information Security Program. (3) DTI shall comply with its Information Security Program.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!