We use cookies on our site to analyze traffic, enhance your experience, and provide you with tailored content.

For more information visit our privacy policy.

Security Standard Sample Clauses

Security Standard. Glean will use commercially reasonable technical and organizational measures designed to prevent unauthorized access, use, or disclosure of Customer Data in accordance with the Glean Security Standard made available at xxxxx://xxxxx.xxx/legal/security-standard and incorporated herein by reference (“Security Standard”). Subject to Section 6.4 below, Glean may update the Security Standard from time to time.
Security Standard. During any period when F5 is providing Silverline Services to Customer, F5 shall ensure that it has put in place a security program related to the applicable Silverline Services that complies with the Payment Card Industry Data Security Standard (PCI-DSS) or any similar industry security standard. Upon Customer’s request, which request shall not be made more than once in any twelve (12) month period, F5 shall provide Customer a PCI-DSS, or other similar security standard, attestation of compliance
Security Standard. TSYS will use commercially reasonable (but no less than industry standard) security measures for its computer systems and physical facilities designed to safeguard against (i) the unauthorized destruction, loss, alteration of, or access to COMPANY’s Confidential Information and Customer Data, whether such information is at or on TSYS’ systems or facilities or in transit, and (ii) the Merchant Services being provided to COMPANY hereunder being affected or interrupted. TSYS reserves the right to make changes in its security infrastructure and procedures from time to time, so long as the level of the security measures provided is not materially reduced. 7.1.1 Annually, during the Term, TSYS shall (i) have a nationally-recognized accounting firm conduct a “SAS70 Type II” audit in accordance with the Statement of Auditing Standards developed by the American Institute of Certified Public Accountants, and have such accounting firm issue a Service Auditor’s Report Type II (or substantially similar report in the event the SAS70 Type II auditing standard and/or a Service Auditors Report Type II are no longer an industry standard) which shall cover, at a minimum, security policies and procedures and controls, including without limitation, system security and physical security and (ii) have a nationally-recognized and certified auditor reasonably acceptable to COMPANY conduct a Technical Guideline #3, or TG-3, audit. TSYS shall provide COMPANY and its independent auditors with a copy of the SAS70 TYPE II and TG-3 audit reports promptly upon the completion thereof. Unless otherwise agreed by the parties, each audit shall be designed and conducted to facilitate periodic compliance reporting by COMPANY under the Xxxxxxxx-Xxxxx Act of 2002 (and related regulations) and comparable laws in other jurisdictions. 7.1.2 If either the SAS70 TYPE II or TG-3 audit reports identify any issues or non-compliance, including without limitation, risks to TSYS’ computer systems and/or physical facilities which could result in the unauthorized destruction, loss, alteration of, or access to COMPANY’s Confidential Information or Customer Data or the Merchant Services being provided to COMPANY hereunder being materially affected, then a senior technology executive of TSYS shall promptly meet with a representative of COMPANY to discuss the matter and TSYS shall promptly take action to address the matter raised by the report to reduce the risk to COMPANY’s Confidential Information and Customer...
Security StandardConsultant will review the Security Standard document which defines the control system access, modifications, and implementation security requirements and practices to be used throughout the City’s control system. Work activities include: • Review and comment on Draft Security Standard document. • Resolve PMC responses to comments on Draft Security Standard document. Task 4.2.8.2.1.8 - Process Optimization & Failure Analysis Development. Consultant will review documents developed from workshops to discuss and develop additional process optimization opportunities for specific plant processes. Work activities include: • Review and comment on three draft meeting minutes. This scope of work assumes that results of this workshop will be incorporated into the PMC developed standards and algorithm documents and will not impact the control strategies and P&IDs developed during final design of the Primary Treatment Facility Project. Task 4.2.8.2.1.9 - Control Systems Algorithms. Consultant will review process area specific control algorithms that will provide specific documentation on how each of the process area controls systems are controlled and monitored. Work activities include: • Review and comment on three Draft Control Algorithms documents reflecting the individual control loops listed in Appendix B of the PMC scope of work. • Resolve PMC responses to comments on Draft Control Algorithms document. • Review and comment on three draft meeting minutes. This scope of work assumes that the control system algorithms will be generated following concepts developed during the final design of the Primary Treatment Facility Project and will not alter the control strategies and P&IDs that have already been developed. Task 4.2.8.2.1.10 - Incorporate Standards/Algorithms into Contract Documents. Consultant will incorporate standards and algorithms produced by the PMC effort into the contract documents for bidding. It is assumed that that standards and algorithms will be stand-alone electronic documents that can be incorporated as appendices to Xxxxxxx/HDR standard CSI formatted specifications with minimal formatting changes.

Related to Security Standard

  • Security Standards The Provider shall implement and maintain commercially reasonable security procedures and practices that otherwise meet or exceed industry standards designed to protect Student Data from unauthorized access, destruction, use, modification, or disclosure, including but not limited to the unauthorized acquisition of computerized data that compromises the security, confidentiality, or integrity of the Student Data (a "Security Breach"). For purposes of the DPA and this Exhibit G, "Security Breach" does not include the good faith acquisition of Student Data by an employee or agent of the Provider or LEA for a legitimate educational or administrative purpose of the Provider or LEA, so long as the Student Data is used solely for purposes permitted by SOPPA and other applicable law, and so long as the Student Data is restricted from further unauthorized disclosure.

  • Security System The site and the Work area may be protected by limited access security systems. An initial access code number will be issued to the Contractor by the County. Thereafter, all costs for changing the access code due to changes in personnel or required substitution of contracts shall be paid by the Contractor and may be deducted from payments due or to become due to the Contractor. Furthermore, any alarms originating from the Contractor’s operations shall also be paid by the Contractor and may be deducted from payments due or to become due to the Contractor.

  • Security Safeguards Contractor shall maintain a comprehensive security program that is reasonably designed to protect the security, privacy, confidentiality, and integrity of District Data. Contractor shall store and process District Data in accordance with industry standards and best practices, including implementing appropriate administrative, physical, and technical safeguards that are no less rigorous than those outlined in CIS Critical Security Controls (CIS Controls), as amended, to secure such data from unauthorized access, disclosure, alteration, and use. Contractor shall ensure that all such safeguards, including the manner in which District Data is collected, accessed, used, stored, processed, disposed of and disclosed, comply with all applicable federal and state data protection and privacy laws, regulations and directives, including without limitation the Act, as well as the terms and conditions of this Addendum. Without limiting the foregoing, and unless expressly agreed to the contrary in writing, Contractor warrants that all electronic District Data will be encrypted in transmission and at rest in accordance with NIST Special Publication 800-57, as amended, or such other standard as the District’s Chief Privacy Officer or designee may agree to in writing. Contractor shall also encrypt any backup, backup media, removable media, tape, or other copies. In addition, Contractor shall fully encrypt disks and storage for all laptops and mobile devices.

  • Security Systems The Service may not be compatible with security systems. You may be required to maintain a telephone connection through your local exchange carrier in order to use any alarm monitoring functions for any security system installed in your home or business. You are responsible for contacting the alarm monitoring company to test the compatibility of any alarm monitoring or security system with the Service.

  • Safety Standards Performance of the Contract for all commodities or contractual services must comply with requirements of the Occupational Safety and Health Act and other applicable State of Florida and federal requirements.

  • Security Management The Contractor shall comply with the requirements of the DOD 5200.1-M and the DD Form 254. Security of the Contractor’s electronic media shall be in accordance with the above documents. Effective Program Security shall require the Contractor to address Information Security and Operations Security enabled by the Security Classification Guides. The Contractor’s facility must be able to handle and store material up to the Classification Level as referenced in Attachment J-01, DD Form 254.

  • Security Cameras Security cameras have been installed throughout the Facility; however, they will not routinely be used in areas where there is an expectation of privacy, such as restrooms or patient care areas.

  • Property Standards Owner must maintain the Unit, and any common areas of the property accessible to the Tenant under the Lease, in decent, safe and sanitary condition and comply with all applicable state or local codes and requirements for rental properties. Upon notice by the Program Administrator following any inspection (whether conducted in-person or virtually in accordance with the Program guidelines), Owner will promptly correct any violations of Program requirements and this Contract. If the Owner fails to correct such violations, the Program Administrator may terminate this Contract and the Rental Assistance Payment even if the Tenant continues occupancy under the Lease. Owner/Representative Initials:

  • Security Protocols Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.

  • Security Services In performing the Services, the Agent shall properly comply at all times with, and perform all of, the Security Procedures.