Workforce Security Sample Clauses

Workforce Security. 1.1.1. Data repositories containing Customers Data shall be maintained by Xxxxxx Authorized Personnel who have passed sufficient background investigations that revealed no occurrences of criminal convictions or fraud. 1.1.2. Bizagi implements adequate procedures for the clearance, authorization, supervision, training and termination of workforce members.
AutoNDA by SimpleDocs
Workforce Security. 100 Union Membership
Workforce Security. The Company maintains Workforce security procedures to ensure that all Workforce members have appropriate Access to ePHI. These procedures also are intended to prevent those Workforce members who do not have appropriate Access to ePHI from obtaining such Access. As applicable:
Workforce Security. 3.3.1 Authorization and/or Supervision of Employees 12 3.3.2 Clearance Procedures 13 3.3.3 Termination Procedures 13 3.4 Information Access Management 3.4.1 Access Authorization 15 3.4.2 Access Establishment and Modification 15 3.5 Awareness and Training 3.5.1 Workforce Training Program 17 3.5.2 Security Reminders 18 3.5.3 Protection from Malicious Software 18 3.5.4 Log-in Monitoring (Addressable) 18 3.5.5 Password Management 18 3.6 Security Incident Procedures 19 3.7 Contingency Plan 3.7.1 Data Backup Plan 21 3.7.2 Disaster Recovery Plan 21 3.7.3 Testing and Revision Procedure 22 3.7.4 Applications and Data Criticality Analysis 22 3.8 Evaluation 24 Section 4 Physical Safeguards (PS)
Workforce Security. BUSINESS ASSOCIATE will implement policies and procedures to ensure that all members of its workforce have appropriate access to electronic PHI and to prevent those workforce members who do not have access from obtaining access to electronic PHI.
Workforce Security. Implement policies and procedures to ensure that Vendor workforce members have appropriate access to EPHI, and to prevent those workforce members without authorized access from obtaining it.
Workforce Security. Workforce Screening Supplier will perform a thorough background check that will include, at a minimum, criminal check, credit report, employment verification, drug testing, workers compensation report, name/address verification for all employees requiring access to information systems that transmit, transact or store Customer’s PII and/or PHI. Background checks will include married name and maiden name where appropriate. Termination Procedure Supplier will terminate access to information systems that transmit, transact or store Customer’s PII and/or PHI immediately upon termination of individual employment. Authorization and Supervision Supplier will: (i) ensure that workforce members have appropriate access to PII and/or PHI following the principles of Minimum Necessary and Least Privilege and (ii) prevent workforce members who do not have access to PII and/or PHI from obtaining access to PII and/or PHI. Access Authorization Supplier must implement policies and procedures for granting access to Customer’s PII and/or PHI. Supplier will provide secure role-based account management granting privileges utilizing the principle of least privilege. Supplier will monitor all user accounts with administrative level access to Operating Systems and databases transmitting, transacting or storing Customer’s PII and/or PHI. Supplier will restrict the ability to install software to only authorized technical support personnel. Access Establishment and Modification Supplier will implement policies and procedures to establish, document, review, and modify a user’s right to access systems that transmit, transact or store Customer’s PII and/or PHI.
AutoNDA by SimpleDocs
Workforce Security 

Related to Workforce Security

  • Site Security While providing services at a DSHS location, the Contractor, its agents, employees, or Subcontractors shall conform in all respects with physical, fire, or other security regulations specific to the DSHS location.

  • Performance Security 47.1 Within twenty-one (21) days of the receipt of Letter of Acceptance from the Procuring Entity, the successful Tenderer, if required, shall furnish the Performance Security in accordance with the GCC 18, using for that purpose the Performance Security Form included in Section X, Contract Forms. If the Performance Security furnished by the successful Tenderer is in the form of a bond, it shall be issued by a bonding or insurance company that has been determined by the successful Tenderer to be acceptable to the Procuring Entity. A foreign institution providing a bond shall have a correspondent financial institution located in Kenya, unless the Procuring Entity has agreed in writing that a correspondent financial institution is not required. 47.2 Failure of the successful Tenderer to submit the above-mentioned Performance Security or sign the Contract shall constitute sufficient grounds for the annulment of the award and forfeiture of the Tender Security. In that event the Procuring Entity may award the Contract to the Tenderer offering the next lowest Evaluated Tender. 47.3 Performance security shall not be required for a contract, if so specified in the TDS.

  • Personnel Security 6.1 Staff recruitment in accordance with government requirements for pre- employment checks; 6.2 Staff training and awareness of Departmental security and any specific contract requirements.

  • JOB SECURITY 23.01 Subject to the willingness and capacity of individual employees to accept relocation and retraining, the Employer will make every reasonable effort to ensure that any reduction in the work force will be accomplished through attrition.

  • Network Security The AWS Network will be electronically accessible to employees, contractors and any other person as necessary to provide the Services. AWS will maintain access controls and policies to manage what access is allowed to the AWS Network from each network connection and user, including the use of firewalls or functionally equivalent technology and authentication controls. AWS will maintain corrective action and incident response plans to respond to potential security threats.

  • STATE SECURITY 4.01 Nothing in this Agreement shall be construed as requiring the Employer to do or refrain from doing anything contrary to any instruction, direction or regulations given or made by or on behalf of the Government of Canada in the interest of the safety or security of Canada or any state allied or associated with Canada.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!