Information Security Policies and Practices Sample Clauses

Information Security Policies and Practices. The SI shall implement, and throughout the Term maintain and follow, a comprehensive information security program (the "Information Security Program") with respect to (a) SI employees, consultants, Subcontractors and others engaged or relied upon by the SI for purposes of the Project, and (b) those elements of the SI's systems (including hardware, software and data) that interact or exchange information with the NFPS (collectively, the "NFPS Security-Sensitive SI Resources"). The SI's Information Security Program shall comply with: (i) this Section 23.4 (Information Security Policies and Practices); (ii) Good Industry Practices; and (iii) the Technical Specifications (where applicable). The Information Security Program at a minimum shall include the following:
Information Security Policies and Practices. The Contractor shall develop and implement, and throughout the Term maintain and follow, a comprehensive information security program (the "Information Security Program"), including information security polices and practices, in accordance with (i) the Technical Specification, and (ii) this Contract Section entitled "Information Security Policies and Practices" (collectively, "Information Security Policies and Practices"). Such Information Security Policies and Practices at a minimum shall include the following:

Related to Information Security Policies and Practices

  • Policies and Practices The employment relationship between the Parties shall be governed by this Agreement and the policies and practices established by the Company and the Board of Directors (hereinafter referred to as the “Board”). In the event that the terms of this Agreement differ from or are in conflict with the Company’s policies or practices or the Company’s Employee Handbook, this Agreement shall control.

  • Security Policies To the extent the Contractor or its subcontractors, affiliates or agents handles, collects, stores, disseminates or otherwise deals with State Data, the Contractor will have an information security policy that protects its systems and processes and media that may contain State Data from internal and external security threats and State Data from unauthorized disclosure, and will have provided a copy of such policy to the State. The Contractor shall provide the State with not less than thirty (30) days advance written notice of any material amendment or modification of such policies.

  • Compliance Policies and Procedures To assist the Fund in complying with Rule 38a-1 of the 1940 Act, BBH&Co. represents that it has adopted written policies and procedures reasonably designed to prevent violation of the federal securities laws in fulfilling its obligations under the Agreement and that it has in place a compliance program to monitor its compliance with those policies and procedures. BBH&Co will upon request provide the Fund with information about our compliance program as mutually agreed.

  • Security Practices Dell has implemented corporate information security practices and standards that are designed to safeguard the Dell’s corporate environment and to address: (1) information security; (2) system and asset management; (3) development; and (4) governance. These practices and standards are approved by the Dell CIO and undergo a formal review on an annual basis.

  • Violence Policies and Procedures The Employer agrees to have in place explicit policies and procedures to deal with violence. The policy will address the prevention of violence, the management of violent situations, provision of legal counsel and support to employees who have faced violence. The policies and procedures shall be part of the employee's health and safety policy and written copies shall be provided to each employee. Prior to implementing any changes to these policies, the employer agrees to consult with the Association.