Human Resources Security Sample Clauses
POPULAR SAMPLE Copied 2 times
Human Resources Security. The Contractor takes reasonable steps to ensure that its Workforce is aware of their obligations in the provision of the Services and applicable data protection laws, including that any unauthorized processing or disclosure of the Personal Data may lead to disciplinary action under their contract of employment or other contractual arrangements. Prior to receiving access to Personal Data, the Workforce and any Extended Workforce will receive appropriate security awareness training and recurring security awareness training at appropriate intervals. The access rights of the Contractor’s Workforce with access to the Contractor’s Information Processing System(s) or media containing Personal Data are removed upon termination of their employment, contract or agreement, or adjusted upon change of job function.
Human Resources Security. 18.1. Graylog personnel sign confidentiality agreements and acknowledge Graylog’s Acceptable Use Policy during the new employee onboarding process.
18.2. Graylog conducts background verification checks for potential Graylog personnel with access to Customer Content in accordance with relevant laws and regulations. The background checks are commensurate to an individual's job duties.
Human Resources Security a. Medallia employees undergo comprehensive screening during the hiring process. Background checks and reference validation will be performed to determine whether candidate qualifications are appropriate for the proposed position. Subject to any restrictions imposed by applicable law and based on jurisdiction, these background checks include criminal background checks, employment validation, and education verification as applicable.
b. Ensuring all Medallia employees are subject to confidentiality and non-disclosure commitments before access is provisioned to Medallia Products and/or Customer Data.
c. Ensuring applicable Medallia employees receive security and privacy awareness training designed to provide such employees with information security knowledge to provide for the security, availability, and confidentiality of Customer Data.
d. Upon Medallia employee separation or change in roles, Medallia shall ensure any Medallia employee access is revoked in a timely manner and all Medallia assets, both information and physical, are returned.
Human Resources Security. Vendor will maintain and enforce a policy that addresses human resources security for all Representatives accessing University Data. Vendor will conduct background checks and not utilize any individual to fulfill the obligations of this Agreement if such individual has been convicted of any crime involving dishonesty or false statement including, but not limited to fraud and theft, or otherwise convicted of any offense for which incarceration for a minimum of one (1) year is an authorized penalty. Any such individual may not be a “Representative” under this Agreement Physical Security. All facilities used by or on behalf of Vendor to store and process University Data will implement and maintain administrative, physical, technical, and procedural safeguards in accordance with industry best practices at a level sufficient to secure University Data from a Security Incident. Such measures will be no less protective than those used to secure the Vendor’s own data of a similar type, and in no event, less than reasonable in view of the type and nature of the data involved.
Human Resources Security. 4.1. Roles & Responsibilities. Supplier shall define and document the security roles and responsibilities of employees, contractors, and third-party users in accordance with Supplier's information security policy. Supplier shall ensure that workforce members agree to terms and conditions concerning information security appropriate to the nature and extent of access they will have to Supplier's assets associated with information systems and services.
Human Resources Security. The Data Importer informs its personnel about relevant security procedures and their respective roles, as well as of possible consequences of breaching the security rules and procedures. Such consequences include disciplinary and/or legal action.
Human Resources Security. ● A background check will be conducted on the employee(s) that will have access servers to rule out any criminal involvement. ● Processor will make sure to train its employees that will be handling Controller’s Data about their roles and security guidelines that will have to be adhered to from time to time.
Human Resources Security. 2.1 Supplier will ensure that Supplier’s personnel have received a background check upon hiring, in accordance with Supplier’s internal policies.
2.2 Supplier will ensure that Supplier’s personnel complete information security awareness training on an annual basis, or more frequently as needed, with regards to information security and the handling of UKG Personal Data.
2.3 Supplier will require all of Supplier’s personnel to keep all UKG Personal Data confidential in accordance with the terms of the Agreement and will use UKG Personal Data solely as necessary to perform the Services to UKG.
Human Resources Security. Provider informs its personnel about relevant security procedures and their respective roles, as well as of possible consequences of breaching the security rules and procedures. Such consequences include disciplinary and/or legal action.
Human Resources Security. Data Importer shall maintain a policy which defines requirements around enforcing security measures as they relate to employment status changes. This includes background checks, acknowledgement and adherence to Data Importer's security policies, onboarding and termination for employees and third parties.