Safety and Security Procedures definition

Safety and Security Procedures means IBM's safety and security procedures, as the same may be modified by IBM from time to time.
Safety and Security Procedures means the safety and security procedures, including without limiting the generality of the foregoing, specifications for signage and traffic control as may be issued by the Province from time to time and set out in Schedule “B” to this Agreement; and
Safety and Security Procedures has the meaning set forth in Section 2.4.2.9.

Examples of Safety and Security Procedures in a sentence

  • Safety and Security Procedures Safety Drills:Safety drills are required by law and are important practice in the event of a real emergency.

  • That the draft Customs Safety and Security Procedures (EU Exit) Regulations 2021, whichwere laid before this House on 24 May, be approved.Notes:The Speaker has not yet considered this instrument for certification (Standing Order No. 83P).

  • That the draft Customs Safety and Security Procedures (EU Exit) Regulations 2020, whichwere laid before this House on 16 November, be approved.Notes:The Instrument has not yet been considered by the Joint Committee on Statutory Instruments.

  • Such cooperation shall include, without limitation, providing such information as a person with reasonable commercial skills and expertise would find reasonably necessary for the Court or a Third Party to perform its services relating to the Work.1.5 Data and Security.(a) Safety and Security Procedures.

  • These days are not a part of the 180-day contract and additional compensation will be paid for attendance and participation Professional learning is defined by RCW 28A.150.415.

  • Manchester Airport Site Rules, Safety and Security Procedures Cont… Penalties will be incurred by both you and your employer should any of the above regulations not be adhered to, including the possibility of prosecution.

  • IBM shall establish and maintain safeguards against the destruction, loss or alteration of the EMW Data in the possession of IBM (the "DATA SAFEGUARDS") that shall be no less rigorous than those data security policies set forth in the Safety and Security Procedures.

  • Safety and Security Procedures: General - ASF shall have limited access to certain Confidential Data and Information solely for the purposes consistent with meeting ASF's obligations under this Agreement: (a) ASF shall require all visitors to be identified at the front entrance of all operating centers and to sign a visitor's log which includes the date, time in/out, firm represented and signature.

  • Are there Safety and Security Procedures in Place?.……………………..………………………………………………YesNoDescribe (Alarm, Fence, Firearms, Signs, Etc.): 10.

  • You agree to comply at all times with the Bank's "Safety and Security Procedures" published on the Bank’s website and to safeguard the confidentiality and security of the Security Procedures and all other proprietary property or information the Bank provides to you in connection with the Service and to notify us immediately if you have any reason to believe the security or confidentiality required by this provision has been or may be breached.

Related to Safety and Security Procedures

  • Security Procedures means rules and regulations governing access to, and health and safety procedures while on, Government premises; and information technology security protocols;

  • Computer Security Procedures means procedures for prevention of unauthorized computer access and use and administration of computer access and use as provided in writing to the Underwriter.

  • Privacy and Security Requirements means (a) all Privacy Laws; (b) all applicable Privacy Contracts, and (c) all applicable Privacy Policies.

  • Security procedure means a procedure employed for the purpose of verifying that an electronic signature, record, or performance is that of a specific person or for detecting changes or errors in the information in an electronic record. The term includes a procedure that requires the use of algorithms or other codes, identifying words or numbers, encryption, or callback or other acknowledgment procedures.

  • Social Engineering Security Procedures means security procedures intended to prevent Social Engineering Fraud as set forth in the Application and/or as otherwise provided in writing to the Underwriter.

  • Privacy and Security Laws means any and all international, local, country-specific, or U.S. State or Federal laws, regulations, directives, standards, guidelines, policies, or procedures, as amended, applicable to Supplier pertaining to the security, confidentiality, or privacy of Buyer Data.

  • Staff Vetting Procedures means the Authority’s procedures for the vetting of personnel and as advised to the Contractor by the Authority.

  • Technical safeguards means the technology and the policy and procedures for its use that 27 protect electronic PHI and control access to it.

  • customs procedures means the treatment applied by the customs administration of each Party to goods which are subject to customs control.

  • Safety Management System means a systematic approach to managing safety, including the necessary organisational structures, accountabilities, policies and procedures;

  • Loss Absorption Regulations means, at any time, the laws, regulations, requirements, guidelines, rules, standards and policies relating to minimum requirements for own funds and eligible liabilities and/or loss absorbing capacity instruments of the United Kingdom, the PRA, the United Kingdom resolution authority, the Financial Stability Board and/or of the European Parliament or of the Council of the European Union then in effect in the United Kingdom including, without limitation to the generality of the foregoing, any delegated or implementing acts (such as regulatory technical standards) adopted by the European Commission and any regulations, requirements, guidelines, rules, standards and policies relating to minimum requirements for own funds and eligible liabilities and/or loss absorbing capacity instruments adopted by the PRA and/or the United Kingdom resolution authority from time to time (whether or not such regulations, requirements, guidelines, rules, standards or policies are applied generally or specifically to the Company or to the Regulatory Group).

  • Data Safeguards means the highest industry-standard safeguards (including administrative, physical, technical, and procedural safeguards) against the destruction, loss, misuse, unauthorized disclosure, or alteration of the JBE Data or Confidential Information, and such other related safeguards that are set forth in Applicable Laws, a Statement of Work, or pursuant to JBE policies or procedures.

  • HMG Security Policy Framework means the Cabinet Office Security Policy Framework (available from the Cabinet Office Security Policy Division) as updated from time to time.

  • Data Security Requirements means, collectively, all of the following to the extent relating to Data Treatment, to any privacy, security, or security breach notification requirements applicable to the Company or any Retained Subsidiary, to the conduct of the Management and Franchise Business, or to any System: (i) PCI-DSS, (ii) the Company’s and the Retained Subsidiaries’ own rules and policies and (iii) applicable Law.

  • Information Security Program means the administrative, technical, and physical safeguards that a licensee uses to access, collect, distribute, process, protect, store, use, transmit, dispose of, or otherwise handle nonpublic information.

  • Operation Procedures means the procedures contained in Annexure A hereto which the Contractor is obliged to follow when performing work on behalf of the company

  • AML/KYC Procedures means the customer due diligence procedures of a Reporting Finnish Financial Institution pursuant to the anti-money laundering or similar requirements of Finland to which such Reporting Finnish Financial Institution is subject.

  • Information Privacy and Security Laws means all applicable laws concerning the privacy, data protection, transfer, or security of Personal Confidential Information, including, to the extent applicable, the General Data Protection Regulation (EU), other state, and federal, data security laws, data breach notification laws, and consumer protection laws.

  • New Jersey Stormwater Best Management Practices (BMP) Manual or “BMP Manual” means the manual maintained by the Department providing, in part, design specifications, removal rates, calculation methods, and soil testing procedures approved by the Department as being capable of contributing to the achievement of the stormwater management standards specified in this chapter. The BMP Manual is periodically amended by the Department as necessary to provide design specifications on additional best management practices and new information on already included practices reflecting the best available current information regarding the particular practice and the Department’s determination as to the ability of that best management practice to contribute to compliance with the standards contained in this chapter. Alternative stormwater management measures, removal rates, or calculation methods may be utilized, subject to any limitations specified in this chapter, provided the design engineer demonstrates to the municipality, in accordance with Section IV.F. of this ordinance and N.J.A.C. 7:8-5.2(g), that the proposed measure and its design will contribute to achievement of the design and performance standards established by this chapter.

  • health and safety file means a file, or other record containing the information in writing required by these Regulations "health and safety plan" means a site, activity or project specific documented plan in accordance with the client's health and safety specification;

  • Safety Requirements means Prudent Electrical Practices, CPUC General Order No. 167, Contractor Safety Program Requirements, and all applicable requirements of Law, PG&E, the Utility Distribution Company, the Transmission Provider, Governmental Approvals, the CAISO, CARB, NERC and WECC.

  • Administrative Safeguards are administrative actions, and policies and procedures, to manage the selection, development, implementation, and maintenance of security measures to protect electronic PHI and to manage the conduct of Contractor’s workforce in relation to the protection of that information.

  • ISM Code Documentation includes, in respect of a Ship:

  • European Data Protection Laws means data protection laws applicable in Europe, including: (i) Regulation 2016/679 of the European Parliament and of the Council on the protection of natural persons with regard to the processing of personal data and on the free movement of such data (General Data Protection Regulation) ("GDPR"); (ii) Directive 2002/58/EC concerning the processing of personal data and the protection of privacy in the electronic communications sector; and (iii) applicable national implementations of (i) and (ii); or (iii) GDPR as it forms parts of the United Kingdom domestic law by virtue of Section 3 of the European Union (Withdrawal) Act 2018 ("UK GDPR"); and (iv) Swiss Federal Data Protection Act on 19 June 1992 and its Ordinance ("Swiss DPA"); in each case, as may be amended, superseded or replaced.

  • Security Policy Framework means the Cabinet Office Security Policy Framework (available from the Cabinet Office Security Policy Division);

  • Environmental, Health, and Safety Requirements means all federal, state, local and foreign statutes, regulations, and ordinances concerning public health and safety, worker health and safety, and pollution or protection of the environment, including without limitation all those relating to the presence, use, production, generation, handling, transportation, treatment, storage, disposal, distribution, labeling, testing, processing, discharge, release, threatened release, control, or cleanup of any hazardous materials, substances or wastes, as such requirements are enacted and in effect on or prior to the Closing Date.