Human Resource Security Clause Samples

Human Resource Security. NetDocuments’ employees sign a confidentiality agreement and acknowledge security policies during the employee on-boarding process and annually for the term of employment. In addition, NetDocuments conducts training annually on its security policies and processes. NetDocuments conducts background verification and credit checks in accordance with applicable law during the hiring process and annually for the term of an employee’s employment.
Human Resource Security. Prior to employment
Human Resource Security. 6.1. All newly-hired employees will be subject to screening prior to employment. which may include drug screening and background checks in accordance with Schedule A (Hiring Criteria) attached hereto . The screening processes are conducted in accordance with relevant national laws and industry regulations and provide verification of identity. references and credentials. 6.2. Temporary employees will be evaluated in substantially the same manner as permanent employees. Agent reviews the screening processes of the contract staffing agencies through its supplier management program. 6.3. All employees will be required to complete an annual information security awareness program. 6.4. Violations and breaches of the Information Security Policy will be investigated and disciplinary actions may be taken in accordance with internal Human Resource policies.
Human Resource Security. 3.1. ▇▇▇▇ & ▇▇▇▇▇▇ liaises closely with our recruitment agency contacts to ensure that pre-employment screening requirements are carried out on our behalf. 3.2. ▇▇▇▇ & ▇▇▇▇▇▇ utilizes a third-party Employee Screening company to conduct background screening in line with the UK Government's Baseline Personnel Security Standard (BPSS) on all Staff regardless of their role. 3.3. Confidentiality clauses are in place in Staff contracts that provide adequate protection for the confidentiality of ▇▇▇▇ & ▇▇▇▇▇▇ Data. 3.4. A disciplinary process is in place to address non-compliance with security policies and requirements. 3.5. Upon termination of employment, access is revoked from Staff on their last working day and all equipment and Intellectual Property is returned by the leaver.
Human Resource Security. 3.1. ▇▇▇▇ & ▇▇▇▇▇▇ liaises closely with our recruitment agency contacts to ensure that pre-employment screening requirements are carried out on our behalf. 3.2. ▇▇▇▇ & ▇▇▇▇▇▇ utilizes a third-party Employee Screening company to conduct background screening in line with the UK Government's Baseline Personnel Security Standard (BPSS) on all Staff regardless of their role, subject to limitations in accordance with local legislation. 3.3. Confidentiality clauses are in place in Staff contracts that provide adequate protection for the confidentiality of ▇▇▇▇ & ▇▇▇▇▇▇ Data. 3.4. A disciplinary process is in place to address non-compliance with security policies and requirements. 3.5. Upon termination of employment, access is revoked from Staff on their last working day and all equipment and Intellectual Property is returned by the leaver.
Human Resource Security. 3.1 Leading Resolutions shall ensure thorough background checks are carried out on all supplier personnel that they engage with and will meet any specific client requirements. 3.2 Leading Resolutions acknowledges and agrees that the activity of any Supplier Personnel working at Customer premises may be monitored by Customer. Customer have the unfettered right to deny access to Customer premises to any Supplier Personnel without notice. 3.3 Leading Resolutions shall, prior to the date of this Agreement, appoint a member of the Supplier Personnel to act as Supplier Relationship Manager to be able to respond to Customer inquiries regarding information security and ensure Leading Resolutions’ compliance with its information security obligations under this Agreement.
Human Resource Security. 1.1 Screening Background verification checks on all candidates for employment is carried out in accordance with relevant laws, regulations and ethics and is proportional to the business requirements, the classification of the information to be accessed and the perceivedrisks. 7.1.2 Terms and conditions of employment The contractual agreements with employees and contractors state their and the organization’s responsibilities for information security. 7.2.1 Management responsibilities Management requires all employees and contractors to apply information security in accordance with the established policiesand procedures of the organization. 7.2.2 Information security awareness, education, training All employees of the organization and, where relevant, contractors receive appropriate awareness education and training and regular updates in organizational policies and procedures, asrelevant for their job function. 7.2.3 Disciplinary process There is a formal and communicated disciplinary process in place to take action against employees who have committed aninformation security breach. 7.3.1 Termination or change of employment responsibilities Information security responsibilities and duties that remain validafter termination or change of employment are defined, communicated to the employee or contractor and enforced.
Human Resource Security. If Provider accesses, collects, stores, transfers, retains or processes Customer Data and all physically accesses Customer offices: A background check must be conducted for all employees/contractors that will process Customer Data and physically access Customer offices: i. Background check must be conducted by a reputable third party and include criminal check and employment verification to the extent permitted by applicable law; and ii. A non-disclosure agreement (NDA) shall be signed by employees, contractors or others who may gain access to Customer Data or Customer offices containing obligations substantially similar to those in the NDA between Customer and Provider. Customer may reasonably request to see such NDAs.
Human Resource Security. Contractor shall establish a formal security awareness program that makes all employees aware of security best practices, and should require that they attend formal security training at least once annually to ensure that they are aware of the latest policies and security threats.
Human Resource Security a. Written internal policies, guidelines, and documented practices for the safe handling and protection of data. b. Security and Privacy Awareness Training. Training program to ensure that relevant staff are familiar with data importer’s information security and privacy program and processes.