Virus Protection The Bank is not responsible for any electronic virus or viruses that you may encounter. We suggest that you routinely scan your PC using a virus protection product. An undetected virus may corrupt and destroy your programs, files, and your hardware.
Cybersecurity; Data Protection To the Company’s knowledge, the Company and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (collectively, the “Personal Data”)) used in connection with their businesses, and there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same, except in each case as would not reasonably be expected to have a Material Adverse Effect. The Company and its subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification.
Security Management The Contractor shall comply with the requirements of the DOD 5200.1-M and the DD Form 254. Security of the Contractor’s electronic media shall be in accordance with the above documents. Effective Program Security shall require the Contractor to address Information Security and Operations Security enabled by the Security Classification Guides. The Contractor’s facility must be able to handle and store material up to the Classification Level as referenced in Attachment J-01, DD Form 254.
Xxxxx Disaster Protection In accordance with the requirements of the Flood Disaster Protection Act of 1973 (42 U.S.C. 4001), the Subrecipient shall assure that for activities located in an area identified by the Federal Emergency Management Agency (FEMA) as having special flood hazards, flood insurance under the National Flood Insurance Program is obtained and maintained as a condition of financial assistance for acquisition or construction purposes (including rehabilitation).
Virus Management DST shall maintain a malware protection program designed to deter malware infections, detect the presence of malware within DST environment.
Whistle Blowing Protection The Employer agrees to adhere to the whistle blowing protection pursuant to the
Waste Management o Participate in recycling using the Harvard Recycles receptacles provided. Recyclable materials include paper, cardboard, glass bottles, cans, plastics 1-7, as well as fluorescent light bulbs, batteries, chemicals, cartridges and electronics. o Designate a space for employees to leave surplus or shared office supplies to reduce redundant purchases. o Arrange for surplus furniture and other large office items to be delivered to Harvard’s Recycling and Surplus Center for reuse. Occupant Education and Engagement o Install or enable software that powers down computers when not in use, and ensure that all computer monitors have a “sleep mode” enabled. o Ensure that every employee has a power strip and turns the strip with an “off” switch for electronic devices. o Encourage staff to use task lighting that accommodates fluorescent bulbs, rather than halogen lamps. o Provide mugs or encourage staff to bring their own reusable mugs, plates, and utensils for the kitchen area. Keep the kitchen area stocked with dish cleaning supplies if a dishwasher is not available. o Start a physical or electronic bulletin board for “green tips”, news, and ideas. o Ask the Property Manager for training to properly operate controls, including shades, lights, thermostats, etc. o Advise employees to dress appropriately for the weather as building temperatures will be set at the lowest or highest end of the ASHRAE standard range depending on the outside temperature.
POWER SURGE PROTECTION This Agreement provides power surge protection from the product date of purchase of the Covered Product in the absence of insurance coverage. If the Covered Product is damaged as a result of a power surge, We will replace the Covered Product in accordance with the terms herein. You may be required to submit proof of claim denial from Your insurer, if applicable.
Eye Protection Where an employee is required by the College or by legislation, in order to perform his/her duties, to acquire and wear prescription eye protection, the employee shall provide the College with proof of purchase by March 1 each year and the College shall reimburse to such employee, on the first pay day of April in each year, up to a maximum of twenty dollars ($20.00); in situations other than the foregoing, the College, may in its discretion, (which discretion shall not be unreasonably exercised) reimburse such expense where it is recommended by the health and safety committee constituted under the Occupational Health and Safety Act.
Patch Management All workstations, laptops and other systems that process and/or 20 store PHI COUNTY discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or 21 transmits on behalf of COUNTY must have critical security patches applied, with system reboot if 22 necessary. There must be a documented patch management process which determines installation 23 timeframe based on risk assessment and vendor recommendations. At a maximum, all applicable 24 patches must be installed within thirty (30) calendar or business days of vendor release. Applications 25 and systems that cannot be patched due to operational reasons must have compensatory controls 26 implemented to minimize risk, where possible.