Personnel File Access and Security Sample Clauses

The 'Personnel File - Access and Security' clause defines the rules and procedures governing who can access employee personnel files and how these files are protected. Typically, it restricts access to authorized individuals such as HR staff or supervisors with a legitimate business need, and may require files to be stored securely, whether in locked cabinets or password-protected digital systems. This clause ensures the confidentiality and integrity of sensitive employee information, protecting both the organization and its employees from unauthorized disclosure or misuse.
Personnel File Access and Security. Section A. Privacy and Personnel Files‌ 1. The Board shall comply in all respects with current state and federal laws concerning public school system employee personnel files. The term “personnel files” refers to all records, information, data or materials, which are maintained by the School Board anywhere (including the work site file), which are uniquely applicable to that employee, whether maintained in one or more location. All files maintained on employees shall be confidential except as provided in School Board rules or Florida Statutes. Items may not be placed in an employee’s personnel file unless the item has been made known to the employee pursuant to Section 1012.31, Florida Statutes. 2. An employee, or his Association designee authorized in writing, shall have the right, upon request, to review all documents contained in his own official personnel file and in the files maintained by a principal or work site administrator, whether or not such documents are subject to public disclosure under state law. The sole exception shall be records, which are expressly restricted from disclosure by law. The employee must make an appointment with the Human Resources Department, the school principal or work site administrator, as the case may be, in order that a managerial employee will be present when the employee’s file is inspected. 3. A Union representative shall receive one copy of any document in an employee’s personnel file if either: a. the employee has given the Union written consent to review the file; b. review of the file is pertinent to the Union’s role in enforcing this Agreement. All documents used for investigations remain confidential as prescribed by state law. 4. An employee shall receive one copy of any document in his own personnel file upon request to the Human Resources Department. 5. No anonymous letters or materials shall be placed in the personnel file. Materials, which are derogatory to an employee, may be placed in a personnel file only if they pertain to work performance, or other matters that may be reason for discipline, suspension, or dismissal. Such material must be reduced to writing within forty-five (45) days and signed by a person competent to know the facts or make the judgment. Additional material may be added to clarify or simplify as needed. A copy of all such materials to be placed in the personnel file shall be provided to the employee either: a. by certified mail, return receipt requested to his/her address of record...
Personnel File Access and Security 

Related to Personnel File Access and Security

  • Access and Security Customer shall employ all physical, administrative and technical controls, screening and security procedures and other safeguards necessary to: (a) securely administer the distribution and use of all Access Credentials and protect against any unauthorized access to or use of the Hosted Services; and (b) control the content and use of Customer Data, including the uploading or other provision of Customer Data for Processing by the Hosted Services.

  • PERSONAL INFORMATION PRIVACY AND SECURITY CONTRACT 11 Any reference to statutory, regulatory, or contractual language herein shall be to such language as in 12 effect or as amended. 13 A. DEFINITIONS

  • Data and Security If Contractor is granted access to Court Data, Confidential Information or Court Work Locations in the performance of the Work;

  • Background Screening and Security All Contractor employees, Subcontractors and agents of the Contractor performing work under the Contract must comply with all background screening and security requirements of the Department, as detailed below.

  • Data Privacy and Security Bank will implement and maintain a written information security program, in compliance with all federal, state and local laws and regulations (including any similar international laws) applicable to Bank, that contains reasonable and appropriate security measures designed to safeguard the personal information of the Funds’ shareholders, employees, trustees and/or officers that Bank or any Subcustodian receives, stores, maintains, processes, transmits or otherwise accesses in connection with the provision of services hereunder. In this regard, Bank will establish and maintain policies, procedures, and technical, physical, and administrative safeguards, designed to (i) ensure the security and confidentiality of all personal information and any other confidential information that Bank receives, stores, maintains, processes or otherwise accesses in connection with the provision of services hereunder, (ii) protect against any reasonably foreseeable threats or hazards to the security or integrity of personal information or other confidential information, (iii) protect against unauthorized access to or use of personal information or other confidential information, (iv) maintain reasonable procedures to detect and respond to any internal or external security breaches, and (v) ensure appropriate disposal of personal information or other confidential information. Bank will monitor and review its information security program and revise it, as necessary and in its sole discretion, to ensure it appropriately addresses any applicable legal and regulatory requirements. Bank shall periodically test and review its information security program. Bank shall respond to Customer’s reasonable requests for information concerning Bank’s information security program and, upon request, Bank will provide a copy of its applicable policies and procedures, or in Bank’s discretion, summaries thereof, to Customer, to the extent Bank is able to do so without divulging information Bank reasonably believes to be proprietary or Bank confidential information. Upon reasonable request, Bank shall discuss with Customer the information security program of Bank. Bank also agrees, upon reasonable request, to complete any security questionnaire provided by Customer to the extent Bank is able to do so without divulging sensitive, proprietary, or Bank confidential information and return it in a commercially reasonable period of time (or provide an alternative response that reasonably addresses the points included in the questionnaire). Customer acknowledges that certain information provided by Bank, including internal policies and procedures, may be proprietary to Bank, and agrees to protect the confidentiality of all such materials it receives from Bank. Bank agrees to resolve promptly any applicable control deficiencies that come to its attention that do not meet the standards established by federal and state privacy and data security laws, rules, regulations, and/or generally accepted industry standards related to Bank’s information security program. Bank shall: (i) promptly notify Customer of any confirmed unauthorized access to personal information or other confidential information of Customer (“Breach of Security”); (ii) promptly furnish to Customer appropriate details of such Breach of Security and assist Customer in assessing the Breach of Security to the extent it is not privileged information or part of an investigation; (iii) reasonably cooperate with Customer in any litigation and investigation of third parties reasonably deemed necessary by Customer to protect its proprietary and other rights; (iv) use reasonable precautions to prevent a recurrence of a Breach of Security; and (v) take all reasonable and appropriate action to mitigate any potential harm related to a Breach of Security, including any reasonable steps requested by Customer that are practicable for Bank to implement. Nothing in the immediately preceding sentence shall obligate Bank to provide Customer with information regarding any of Bank’s other customers or clients that are affected by a Breach of Security, nor shall the immediately preceding sentence limit Bank’s ability to take any actions that Bank believes are appropriate to remediate any Breach of Security unless such actions would prejudice or otherwise limit Customer’s ability to bring its own claims or actions against third parties related to the Breach of Security. If Bank discovers or becomes aware of a suspected data or security breach that may involve an improper access, use, disclosure, or alteration of personal information or other confidential information of Customer, Bank shall, except to the extent prohibited by Applicable Law or directed otherwise by a governmental authority not to do so, promptly notify Customer that it is investigating a potential breach and keep Customer informed as reasonably practicable of material developments relating to the investigation until Bank either confirms that such a breach has occurred (in which case the first sentence of this paragraph will apply) or confirms that no data or security breach involving personal information or other confidential information of Customer has occurred. For these purposes, “personal information” shall mean (i) an individual’s name (first initial and last name or first name and last name), address or telephone number plus (a) social security number, (b) driver’s license number, (c) state identification card number, (d) debit or credit card number, (e) financial account number, (f) passport number, or (g) personal identification number or password that would permit access to a person’s account or (ii) any combination of the foregoing that would allow a person to log onto or access an individual’s account. This provision will survive termination or expiration of the Agreement for so long as Bank or any Subcustodian continues to possess or have access to personal information related to Customer. Notwithstanding the foregoing “personal information” shall not include information that is lawfully obtained from publicly available information, or from federal, state or local government records lawfully made available to the general public.