Physical Security Safeguards Clause Samples

The Physical Security Safeguards clause establishes requirements for protecting physical locations, equipment, and assets from unauthorized access, damage, or theft. It typically mandates measures such as controlled access to facilities, surveillance systems, secure storage of sensitive materials, and procedures for visitor management. By setting these standards, the clause helps ensure that sensitive information and valuable assets are protected from physical threats, thereby reducing the risk of breaches and maintaining operational integrity.
Physical Security Safeguards. The Data Recipient's Information Security Safeguards shall include physical safety and security safeguards at any facilities where any Services are performed or received that meet or exceed reasonable best commercial practices.
Physical Security Safeguards. Oracle employs measures designed to prevent unauthorized persons from gaining access to computing facilities in which Your Content is hosted such as the use of security personnel, secured buildings, and designated data center premises. Oracle provides secured computing facilities for both office locations and production cloud infrastructure. Common controls between office locations and Oracle controlled co-locations/data centers currently include, for example: • Physical access requires authorization and is monitored • All employees and visitors must visibly wear official identification while onsite • Visitors must sign a visitor's register and be escorted and/or observed while onsite • Possession of keys/access cards and the ability to access the locations is monitored. Staff leaving Oracle employment must return keys/cards Additional physical security safeguards are in place for Oracle-controlled Cloud data centers, which currently include safeguards such as: • Premises are monitored by CCTV • Entrances are protected by physical barriers designed to prevent unauthorized entry by vehicles • Entrances are manned twenty-four (24) hours a day, three-hundred-sixty-five (365) days a year by security guards who perform visual identity recognition and visitor escort management • Safeguards related to environmental hazards • Any physical movement of equipment is controlled by hand-delivered receipts and other authorized change control procedures • Network cables are protected by conduits and, where possible, avoid routes through public areas. This section does not apply to Oracle Cloud at Customer Services. You must provide Your own secure computing facilities for the hosting and operation of the Oracle Cloud at Customer Services-related hardware (including the gateway equipment) and network connections required for Oracle to provide the Oracle Cloud at Customer Services.
Physical Security Safeguards. Production data centers used to provide our Services have access control systems that permit only authorized personnel to have access to secure areas. These facilities are designed to withstand adverse weather and other reasonably predictable natural conditions, utilize redundant electrical and telecommunications systems, employ environmental systems that monitor temperature, humidity and other environmental conditions, and contain strategically placed heat, smoke and fire detection and suppression systems. The data center hosting Customer student data is compliant with the requirements as stated in the following standards: ISO9001:2015, ISO/IEC 27001:2013, ISO/IEC 27017:2015 and ISO/IEC 27018:2014 (or the then current substantially equivalent standards). Power: The data center electrical power systems are designed to be fully redundant and maintainable without impact to operations, 24 hours a day, and Uninterruptible Power Supply (UPS) units provide backup power in the event of an electrical failure for critical and essential loads in the facility. In the event of a power failure, UPS and continuous power supply solutions are used to provide power while transferring systems to on-site back-up generators. Access Restrictions: The data center facilities will have appropriate physical access restrictions and monitoring as well as fire detection and fire suppression systems. Facilities are secured by around-the-clock guards, interior and exterior surveillance cameras, two-factor access screening and escort-controlled access. Physical access is controlled both at the perimeter and at building ingress points by professional security staff utilizing video surveillance, intrusion detection systems, and other electronic means.
Physical Security Safeguards. (a) The Contractor shall establish and comply with appropriate administrative, technical, and physical safeguards to protect all Government data, property, facilities, and personnel.
Physical Security Safeguards. Oracle employs measures designed to prevent unauthorized persons from gaining access to computing facilities in which Your Content is hosted such as the use of security personnel, secured buildings, and designated data center premises. Oracle provides secured computing facilities for both Oracle Cloud Hosting and Delivery Policies Page 5 of 18 office locations and production cloud infrastructure. Common controls between office locations and Oracle controlled co-locations/data centers currently include, for example: Additional physical security safeguards are in place for Oracle-controlled Cloud data centers, which currently include safeguards such as: This section does not apply to Oracle Cloud at Customer Services. You must provide Your own secure computing facilities for the hosting and operation of the Oracle Cloud at Customer Services-related hardware (including the gateway equipment) and network connections required for Oracle to provide the Oracle Cloud at Customer Services.
Physical Security Safeguards. Hearsay shall use third-party data centers that have annual SSAE 16 (or comparable audit engagement performed. In the event that such data center(s) become non-compliant with the requirements, then Hearsay, in a reasonable time period, will discontinue using such third party and find an alternative third party that will meet the requirements. Upon Customer’s written request, subject to the data center’s requirements, Hearsay will either (i) provide to Customer a copy of its data centers’ audit report pursuant to the confidentiality restrictions stated in the Agreement, or (ii) facilitate for Customer to receive such report directly from the data center under a confidentiality agreement between Customer and such data center. In the event that such data center(s) become non-compliant with the requirements, then Hearsay, in a reasonable time period, will discontinue using such third party and find an alternative third party that will meet the requirements.

Related to Physical Security Safeguards

  • Physical Security BNY Mellon will deploy perimeter security such as barrier access controls around its facilities processing or storing Customer Data. The ISP will include (i) procedures for validating visitor identity and authorization to enter the premises, which may include identification checks, issuance of identification badges and recording of entry purpose of visit and (ii) physical security policies for personnel, such as a “clean desk” policy. In accordance with its ISP and applicable law, BNY Mellon will install closed circuit television (“CCTV”) systems and CCTV recording systems to monitor and record access to controlled areas, such as data centers and server rooms.

  • Security Safeguards Contractor shall store and process District Data in accordance with commercial best practices, including implementing appropriate administrative, physical, and technical safeguards that are no less rigorous than those outlined in SANS Top 20 Security Controls, as amended, to secure such data from unauthorized access, disclosure, alteration, and use. Contractor shall ensure that all such safeguards, including the manner in which District Data is collected, accessed, used, stored, processed, disposed of and disclosed, comply with all applicable federal and state data protection and privacy laws, regulations and directives, including without limitation C.R.S. § ▇▇-▇▇-▇▇▇ et seq., as well as the terms and conditions of this Addendum. Without limiting the foregoing, and unless expressly agreed to the contrary in writing, Contractor warrants that all electronic District Data will be encrypted in transmission and at rest in accordance with NIST Special Publication 800-57, as amended.

  • Technical Security Controls 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.