Other Security Requirements Sample Clauses

Other Security Requirements. 8.1 Premises - Please provide details of the security measures in place for restricting access to your premises including alarm systems and security staff etc.
Other Security Requirements. The Company shall maintain all technologies, policies, procedures and practices necessary to secure and protect the confidentiality and integrity of CCS student information, including procedures to (a) establish user IDs and passwords as necessary to protect such information; (b) protect all such user passwords from detection and unauthorized use; (c) prevent hostile or unauthorized intrusion that could result in data corruption, or deny service; (d) prevent and detect computer viruses from spreading to disks, attachments to e-mail, downloaded files, and documents generated by word processing and spreadsheet programs; (e) minimize system downtime; (f) notify CCS of planned system changes that may impact the security of CCS data; (g) return or destroy CCS data that exceed specified retention schedules; (h) notify CCS of any data storage outside the US; (i) in the event of system failure, enable immediate recovery of CCS information to the previous business day. The Company should guarantee that CCS data will not be sold to, accessed by, or moved by third parties. In the event of a security breach, the Company shall (a) immediately take action to close the breach; (b) notify CCS within 24 hours of Company's first knowledge of the breach, the reasons for or cause of the breach, actions taken to close the breach, and identify the CCS student information compromised by the breach; (c) return compromised CCS data for review; (d) provide communications on the breach to be shared with affected parties and cooperate with CCS efforts to communicate to affected parties by providing CCS with prior review of press releases and any communications to be sent to affected parties; (e) take all legally required, reasonable, and customary measures in working with CCS to remediate the breach which may include toll free telephone support with informed customer services staff to address questions by affected parties and/or provide monitoring services if necessary given the nature and scope of the disclosure; (f) cooperate with CCS by providing information, records and witnesses needed to respond to any government investigation into the disclosure of such records or litigation concerning the breach; and (g) provide CCS with notice within 24 hours of notice or service on Company, whichever occurs first, of any lawsuits resulting from, or government investigations of, the Company's handling of CCS data of any kind, failure to follow security requirements and/or failure to safeguar...
Other Security Requirements. The Company shall maintain all technologies, policies, procedures and practices necessary to secure and protect the confidentiality and integrity of WSD Student Information, including procedures to (a) establish user IDs and passwords as necessary to protect such information; (b) protect all such user passwords from detection and unauthorized use; (c) prevent hostile or unauthorized intrusion that could result in data corruption, or deny service; (d) prevent and detect computer viruses from spreading to disks, attachments to e-mail, downloaded files, and documents generated by word processing and spreadsheet programs; (e) minimize system downtime; (f) notify WSD of planned system changes that may impact the security of WSD data; (g) return or destroy WSD data that exceed specified retention schedules or upon the request of WSD; (h) notify WSD of any data storage outside the United States; (i) in the event of system failure, enable immediate recovery of WSD Student Information to the previous business day. The Company guarantees that WSD Student Information shall not be sold to, accessed by, or moved by third parties.
Other Security Requirements. The Independent Contractor shall maintain all technologies, policies, procedures and practices necessary to secure and protect the confidentiality and integrity of PSD Student/employee Information, including procedures to (a) establish user IDs and passwords as necessary to protect such information;
Other Security Requirements. 8.1 Premises - Please provide details of the security measures in place for restricting access to your premises including alarm systems and security staff etc. 8.2 Portable media – Please provide details of the policies you have in place for the use of portable media and storage devices including the level of encryption and controlled access procedures exceptionally loaded with Client Data.
Other Security Requirements. The Company shall maintain all technologies, policies, procedures and practices necessary to secure and protect the confidentiality and integrity of ACS student information, including procedures to (a) establish user IDs and passwords as necessary to protect such information;
Other Security Requirements. The Company shall maintain all technologies, policies, procedures and practices necessary to secure and protect the confidentiality and integrity of BCS student information, including procedures to (a) establish user IDs and passwords as necessary to protect such information; (b) protect all such user passwords from detection and unauthorized use; (c) prevent hostile or unauthorized intrusion that could result in data corruption, or deny service; (d) prevent and detect computer viruses from spreading to disks, attachments to e-mail, downloaded files, and documents generated by word processing and spreadsheet programs; (e) minimize system downtime; (f) notify BCS of planned system changes that may impact the security of BCS data; (g) return or destroy BCS data that exceed specified retention schedules;
Other Security Requirements. Premises - Please provide details of the security measures in place for restricting access to your premises including alarm systems and security staff etc. Our premises are all very secure with access to each office via a card or key pad. We also have alarms at each office and security staff at our Leeds and London offices.
Other Security Requirements. Premises - Please provide details of the security measures in place for restricting access to your premises including alarm systems and security staff etc. To prevent unauthorised physical access, damage and interference to our premises and information, appropriate levels of physical entry controls are implemented at all of our premises to ensure security both during and outside working hours. Security perimeters and tools (barriers such as walls, CCTV, card controlled entry gates or manned reception desks) are used to protect areas that contain information and information processing facilities. Secure areas are protected by appropriate entry controls to ensure that only authorised personnel are permitted access. All employees, contractors, third party users and visitors are required to wear some form of visible identification and should immediately notify security personnel if they encounter unescorted visitors of anyone not wearing visible identification. Additional rules exist such as no tailgating’ so that individual access can be recorded and monitored. A visitor policy is in place to record visits, address information security and H&S requirements. Visitors are required to wear of visitor ID whilst on site and comply with supervision and escort requirements. Access to premises is by a physical access card issued to an individual and access can only be authorised by the employee's line manager. An inventory of all access cards is retained and checked every week. All unused access cards must be held securely. If an access card is reported lost or stolen the physical entry control system must be changed or reprogrammed immediately so that the missing card cannot be used. Access to specific rooms or areas, secure areas, stores, computer and server rooms must be by one of the following: Access card, Access card with additional access permissions to secure areas, Number coded key pad. Access to computer / server rooms, stores or secure areas is kept to a minimum, in line with the operational objectives. The responsibility for issuing access cards or granting secure room access rests with the employee’s line manager or for the secure area the manager of the business function in which the individual is working. An Access Register is retained in each secure area listing all Capita employees, contractors, related 3rd parties or visitors that have access to secure areas. Employees, contractors, and related 3rd parties, whose responsibilities change or no longer...
Other Security Requirements. The Company shall maintain all technologies, policies, procedures and practices necessary to secure and protect the confidentiality and integrity of GCS student information, including procedures to