Workplace Security Sample Clauses

Workplace Security. Workplace facilities occupied on a regular basis will have a written workplace security plan, which will be evaluated annually. Each plan, notwithstanding national direction on workplace security, will be developed to meet local situations and may be subject to impact and implementation bargaining. At a minimum, the plan must address the following:
AutoNDA by SimpleDocs
Workplace Security. In addition to the requirements set forth in Section 3.6 of the Agreement, Vendor agrees that it will include reasonable workspace controls designed to protect Personal Information.
Workplace Security. The Processor will take the following measures to guarantee security of all workplaces which are used for access to systems of the Controller to process Personal Data: ☐ a password-protected keyboard lock/screen lock which is activated automatically after a certain period of inactivity (at the latest after 30 minutes). ☐ antivirus and desktop firewall programs will be installed. ☐ immediate installation of safety patches
Workplace Security. Workplace facilities occupied on a regular basis will have a written workplace security plan. Development of this plan is appropriate for Partnership discussions; however, the Agency is ultimately responsible for ensuring that there is a plan. Each plan, notwithstanding national direction on workplace security, will be developed to meet local situations and may be subject to impact and implementation bargaining. At a minimum, the plan must address the following:
Workplace Security. 68.1 The Employer will endeavour to provide all Employees with a secure workplace. Access to personal security alarms will be provided to Employees working in direct contact with the public as part of their ordinary duties and other Employees, where necessary.
Workplace Security. In stores that operate 24 hours there shall be a minimum of 2 team members at all times. A security guard will also be on duty for the night/early morning.
Workplace Security. ● Branch shall install a visitor check-in system. All visitors must sign in at the front desk, and the visitor management application will notify the hosting employee to pick up the visitors. The visitor management application will issue a visitor badge. While visiting office premises, visitors must be accompanied by the hosting employee and wear their visitor badge in a publicly visible fashion at all times. ● Branch shall implement and maintain a secure Mobile Device Management system to secure assets and information access for work. Company-issued devices and laptops are secured using a tested image and are protected using anti-virus and malware scanning software. To protect business data from data theft or exploit, external USB storage devices for laptops are prohibited (mitigated by mobile device management tool). Under Branch’s BYOD (Bring Your Own Device) policy, personal mobile devices are required to access a separate guest wifi network if used in the office. Physical Security ● Branch shall implement and maintain a program to ensure personnel physical access is revoked immediately upon termination or when access is no longer required. ● Employees must use an issued security access card to access office premises. Branch shall use physical locks inside the office building to secure network equipment and company assets. Access to server rooms will be restricted to authorized IT administrative staff. Security surveillance recordings are for review in case of any incident. Organization Controls ● Branch shall implement and maintain policies and procedures, which shall be documented and approved by its senior management, to support the hiring, termination, code of conduct, ethics and background screening of all employees and contractors. ● Branch shall perform a background check using reliable third-party services for each employee. ● Branch shall implement and maintain a security awareness program for employees, which provides basic IT security standards (during employee on-boarding), annual privacy and security awareness training, and individual personnel acknowledgment of intent to comply with corporate security policies. Network Security
AutoNDA by SimpleDocs
Workplace Security a) Entry to the Supplier’s premises where ITV Data is stored, processed, or may be accessed shall be restricted to authorised Supplier Personnel only.
Workplace Security. The Trustee will take reasonable precautions to restrict the access of unauthorized personnel to public areas only. The Trust encourages Employees to be vigilant about workplace security and to report any suspicious activities to the Manager of Office Administration. Employees should keep personal property secured. The Trust is not responsible for lost or stolen personal property. Employees are encouraged to adhere to a “clear desk” and “clear screen” policy as follows: • Keep sensitive and confidential business information securely locked when not required, especially when the office is vacated. • Log off computers and terminals when leaving the office and use a screen saver password when the computer is unattended for a period of more than 15 minutes.

Related to Workplace Security

  • Data Privacy and Security Bank will implement and maintain a written information security program, in compliance with all federal, state and local laws and regulations (including any similar international laws) applicable to Bank, that contains reasonable and appropriate security measures designed to safeguard the personal information of the Funds' shareholders, employees, trustees and/or officers that Bank or any Subcustodian receives, stores, maintains, processes, transmits or otherwise accesses in connection with the provision of services hereunder. In this regard, Bank will establish and maintain policies, procedures, and technical, physical, and administrative safeguards, designed to (i) ensure the security and confidentiality of all personal information and any other confidential information that Bank receives, stores, maintains, processes or otherwise accesses in connection with the provision of services hereunder, (ii) protect against any reasonably foreseeable threats or hazards to the security or integrity of personal information or other confidential information, (iii) protect against unauthorized access to or use of personal information or other confidential information, (iv) maintain reasonable procedures to detect and respond to any internal or external security breaches, and (v) ensure appropriate disposal of personal information or other confidential information. Bank will monitor and review its information security program and revise it, as necessary and in its sole discretion, to ensure it appropriately addresses any applicable legal and regulatory requirements. Bank shall periodically test and review its information security program. Bank shall respond to Customer's reasonable requests for information concerning Bank's information security program and, upon request, Bank will provide a copy of its applicable policies and procedures, or in Bank's discretion, summaries thereof, to Customer, to the extent Bank is able to do so without divulging information Bank reasonably believes to be proprietary or Bank confidential information. Upon reasonable request, Bank shall discuss with Customer the information security program of Bank. Bank also agrees, upon reasonable request, to complete any security questionnaire provided by Customer to the extent Bank is able to do so without divulging sensitive, proprietary, or Bank confidential information and return it in a commercially reasonable period of time (or provide an alternative response that reasonably addresses the points included in the questionnaire). Customer acknowledges that certain information provided by Bank, including internal policies and procedures, may be proprietary to Bank, and agrees to protect the confidentiality of all such materials it receives from Bank. Bank agrees to resolve promptly any applicable control deficiencies that come to its attention that do not meet the standards established by federal and state privacy and data security laws, rules, regulations, and/or generally accepted industry standards related to Bank's information security program. Bank shall: (i) promptly notify Customer of any confirmed unauthorized access to personal information or other confidential information of Customer ("Breach of Security"); (ii) promptly furnish to Customer appropriate details of such Breach of Security and assist Customer in assessing the Breach of Security to the extent it is not privileged information or part of an investigation; (iii) reasonably cooperate with Customer in any litigation and investigation of third parties reasonably deemed necessary by Customer to protect its proprietary and other rights; (iv) use reasonable precautions to prevent a recurrence of a Breach of Security; and (v) take all reasonable and appropriate action to mitigate any potential harm related to a Breach of Security, including any reasonable steps requested by Customer that are practicable for Bank to implement. Nothing in the immediately preceding sentence shall obligate Bank to provide Customer with information regarding any of Bank's other customers or clients that are affected by a Breach of Security, nor shall the immediately preceding sentence limit Bank's ability to take any actions that Bank believes are appropriate to remediate any Breach of Security unless such actions would prejudice or otherwise limit Customer's ability to bring its own claims or actions against third parties related to the Breach of Security. If Bank discovers or becomes aware of a suspected data or security breach that may involve an improper access, use, disclosure, or alteration of personal information or other confidential information of Customer, Bank shall, except to the extent prohibited by Applicable Law or directed otherwise by a governmental authority not to do so, promptly notify Customer that it is investigating a potential breach and keep Customer informed as reasonably practicable of material developments relating to the investigation until Bank either confirms that such a breach has occurred (in which case the first sentence of this paragraph will apply) or confirms that no data or security breach involving personal information or other confidential information of Customer has occurred. For these purposes, "personal information" shall mean (i) an individual's name (first initial and last name or first name and last name), address or telephone number plus (a) social security number, (b) driver's license number, (c) state identification card number, (d) debit or credit card number, (e) financial account 22 number, (f) passport number, or (g) personal identification number or password that would permit access to a person's account or (ii) any combination of the foregoing that would allow a person to log onto or access an individual's account. This provision will survive termination or expiration of the Agreement for so long as Bank or any Subcustodian continues to possess or have access to personal information related to Customer. Notwithstanding the foregoing "personal information" shall not include information that is lawfully obtained from publicly available information, or from federal, state or local government records lawfully made available to the general public.

  • Security Notwithstanding anything herein to the contrary, except for Section 27, to the extent requested by Indemnitee and approved by the Board, the Company may at any time and from time to time provide security to Indemnitee for the Company’s obligations hereunder through an irrevocable bank line of credit, funded trust or other collateral. Any such security, once provided to Indemnitee, may not be revoked or released without the prior written consent of Indemnitee.

  • Security System The site and the Work area may be protected by limited access security systems. An initial access code number will be issued to the Contractor by the County. Thereafter, all costs for changing the access code due to changes in personnel or required substitution of contracts shall be paid by the Contractor and may be deducted from payments due or to become due to the Contractor. Furthermore, any alarms originating from the Contractor’s operations shall also be paid by the Contractor and may be deducted from payments due or to become due to the Contractor.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!