Sharing of Model School Security Policies (MSSP) Sample Clauses

Sharing of Model School Security Policies (MSSP). The Model School Security Policies for law enforcement agencies issued pursuant to the Attorney General's Law Enforcement Directive No. 2007-1 on the topics of bomb threats, active shooter response, school lockdowns, school evacuations and public information policies shall serve as templates for the development of local law enforcement policies. Local law enforcement officials shall discuss the policies which they adopt on these topics with school administrators from the school district or districts within their jurisdiction. It is further understood that school administrators shall share their procedures for critical incidents, developed in accordance with the policies issued by the Commissioner of Education, with local law enforcement officials. These procedures shall remain confidential and shall not be shared with the public.
AutoNDA by SimpleDocs

Related to Sharing of Model School Security Policies (MSSP)

  • Information Security Program (1) DTI shall implement and maintain a comprehensive written information security program applicable to the Personal Information ("Information Security Program") which shall include commercially reasonable measures, including, as appropriate, policies and procedures and technical, physical, and administrative safeguards that are consistent with industry standards, providing for (i) the security and confidentiality of the Personal Information, (ii) protection of the Personal Information against reasonably foreseeable threats or hazards to the security or integrity of the Personal Information, (iii) protection against unauthorized access to or use of or loss or theft of the Personal Information, and (iv) appropriate disposal of the Personal Information. Without limiting the generality of the foregoing, the Information Security Program shall provide for (i) continual assessment and re-assessment of the risks to the security of Personal Information acquired or maintained by DTI and its agents, contractors and subcontractors in connection with the Services, including but not limited to (A) identification of internal and external threats that could result in unauthorized disclosure, alteration or destruction of Personal Information and systems used by DTI and its agents, contractors and subcontractors, (B) assessment of the likelihood and potential damage of such threats, taking into account the sensitivity of such Personal Information, and (C) assessment of the sufficiency of policies, procedures, information systems of DTI and its agents, contractors and subcontractors, and other arrangements in place, to control risks; and (ii) appropriate protection against such risks.

Time is Money Join Law Insider Premium to draft better contracts faster.