Vendor Security Policies Sample Clauses

Vendor Security Policies. Throughout the Contract Term, Vendor shall establish and maintain appropriate internal policies and procedures regarding: (i) the security of the Services and Vendor’s IT systems; and (ii) the permitted use, disclosure, access to, and security of PII, USAC Data, Confidential Information, and USAC IT Systems. Vendor shall provide USAC upon request with copies of its information privacy and IT security policies and procedures to review. Such policies and procedures shall not materially conflict with USAC’s policies and procedures either expressly or by omission. Vendor agrees to maintain strict control of Vendor IT and the access information (e.g. name, username, password, access rights) of all Contract Staff to immediately remove access for persons no longer authorized, and to inform USAC immediately if Vendor suspects, or reasonably should expect, there is unauthorized access to USAC Data or USAC IT System. Vendor shall require Contract Staff to use Multifactor Authentication. Vendor agrees to require all who have access to USAC IT Systems through Vendor to maintain the confidential nature of the Confidential Information, and to not use or access USAC IT Systems except for the benefit of USAC.
AutoNDA by SimpleDocs
Vendor Security Policies. Vendor shall apply the safeguarding requirements and procedures from NIST SP 800-171 Revision 2 “Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations” to protect covered Vendor IT systems and USAC Data. Throughout the Contract Term, Vendor shall establish and maintain appropriate internal policies and procedures regarding: (i) the security of the Services and Vendor’s IT systems; and (ii) the permitted use, disclosure, access to, and security of PII, USAC Data, Confidential Information, and USAC IT Systems. Vendor shall provide USAC upon request with copies of its information privacy and IT security policies and procedures to review. Such policies and procedures shall not materially conflict with USAC’s policies and procedures either expressly or by omission. Vendor agrees to maintain strict control of Vendor Owned / Controlled IT and the access information (e.g. name, username, password, access rights) of all Contract Staff to immediately remove access for persons no longer authorized, and to inform USAC immediately if Vendor suspects, or reasonably should expect, there is unauthorized access to USAC Data or USAC IT System. Vendor shall require Contract Staff to use Multifactor Authentication. Vendor agrees to require all who have access to USAC IT Systems through Vendor to maintain the confidential nature of the Confidential Information, and to not use or access USAC IT Systems except for the benefit of USAC.

Related to Vendor Security Policies

  • Security Policies IBM maintains privacy and security policies that are communicated to IBM employees. IBM requires privacy and security training to personnel who support IBM data centers. We have an information security team. IBM security policies and standards are reviewed and re-evaluated annually. IBM security incidents are handled in accordance with a comprehensive incident response procedure.

  • Security Policy As part of PCI DSS, the Card Organizations require that you have a security policy that covers the security of credit card information.

  • Security Policy for Contractors 1. The Department for Work and Pensions treats its information as a valuable asset and considers that it is essential that information must be protected, together with the systems, equipment and processes which support its use. These information assets may include data, text, drawings, diagrams, images or sounds in electronic, magnetic, optical or tangible media, together with any Personal Data for which the Department for Work and Pensions is the Data Controller.

  • SECURITY POLICIES AND NOTIFICATIONS State Security Policies and Procedures The Contractor and its personnel shall review and be familiar with all State security policies, procedures and directives currently existing or implemented during the term of the Contract, including ITS Policy NYS-P03-002 Information Security Policy (or successor policy). Security Incidents Contractor shall address any Security Incidents in the manner prescribed in ITS Policy NYS-P03-002 Information Security Policy (or successor policy), including the New York State Cyber Incident Reporting Procedures incorporated therein or in such successor policy.

  • Information Security Program (1) DTI shall implement and maintain a comprehensive written information security program applicable to the Personal Information ("Information Security Program") which shall include commercially reasonable measures, including, as appropriate, policies and procedures and technical, physical, and administrative safeguards that are consistent with industry standards, providing for (i) the security and confidentiality of the Personal Information, (ii) protection of the Personal Information against reasonably foreseeable threats or hazards to the security or integrity of the Personal Information, (iii) protection against unauthorized access to or use of or loss or theft of the Personal Information, and (iv) appropriate disposal of the Personal Information. Without limiting the generality of the foregoing, the Information Security Program shall provide for (i) continual assessment and re-assessment of the risks to the security of Personal Information acquired or maintained by DTI and its agents, contractors and subcontractors in connection with the Services, including but not limited to (A) identification of internal and external threats that could result in unauthorized disclosure, alteration or destruction of Personal Information and systems used by DTI and its agents, contractors and subcontractors, (B) assessment of the likelihood and potential damage of such threats, taking into account the sensitivity of such Personal Information, and (C) assessment of the sufficiency of policies, procedures, information systems of DTI and its agents, contractors and subcontractors, and other arrangements in place, to control risks; and (ii) appropriate protection against such risks.

  • Security Protocols Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.

  • Security Program Contractor will develop and implement an effective security program for the Project Site, which program shall require the Contractor and subcontractors to take measures for the protection of their tools, materials, equipment, and structures. As between Contractor and Owner, Contractor shall be solely responsible for security against theft of and damage of all tools and equipment of every kind and nature and used in connection with the Work, regardless of by whom owned.

  • Contractor and Employee Security Precautions A. The security aspects of working at the Correctional Facility are critical. The following security precautions are part of the site conditions and are a part of this Contract. All persons coming on the site in any way connected with this Work shall be made aware of them, and it is the (General) Contractor’s responsibility to check and enforce them.

  • Security Procedures The Fund shall comply with data access operating standards and procedures and with user identification or other password control requirements and other security procedures as may be issued from time to time by State Street for use of the System on a remote basis and to access the Data Access Services. The Fund shall have access only to the Fund Data and authorized transactions agreed upon from time to time by State Street and, upon notice from State Street, the Fund shall discontinue remote use of the System and access to Data Access Services for any security reasons cited by State Street; provided, that, in such event, State Street shall, for a period not less than 180 days (or such other shorter period specified by the Fund) after such discontinuance, assume responsibility to provide accounting services under the terms of the Custodian Agreement.

  • Security Practices A. Protected data provided to the contractor will be stored: (include where and how) B. The security protections taken to ensure data will be protected that align with the NIST Cybersecurity Framework and industry best practices include:

Time is Money Join Law Insider Premium to draft better contracts faster.