Security Policies Sample Clauses
POPULAR SAMPLE Copied 4 times
Security Policies a. Contractor’s security policy is documented, has obtained management approval, is reviewed no less frequently than annually and is maintained to ensure its continuing suitability, adequacy and effectiveness; and
b. Contractor’s operational, technical and administrative policies, standards and guidelines are documented, have obtained management approval, are reviewed no less frequently than annually and are maintained to ensure their continuing suitability, adequacy and effectiveness.
Security Policies. To the extent the Contractor or its subcontractors, affiliates or agents handles, collects, stores, disseminates or otherwise deals with State Data, the Contractor will have an information security policy that protects its systems and processes and media that may contain State Data from internal and external security threats and State Data from unauthorized disclosure, and will have provided a copy of such policy to the State. The Contractor shall provide the State with not less than thirty (30) days advance written notice of any material amendment or modification of such policies.
Security Policies. Contractor shall comply at all times with Agency’s security policies as they are stated in this Contract or otherwise made available to Contractor.
Security Policies. IBM maintains privacy and security policies that are communicated to IBM employees. IBM requires privacy and security training to personnel who support IBM data centers. We have an information security team. IBM security policies and standards are reviewed and re-evaluated annually. IBM security incidents are handled in accordance with a comprehensive incident response procedure.
Security Policies. The responsible party and the operator will each maintain and fully implement written security policies that apply to personal information processing.
Security Policies. Vendor will maintain written security policies that are fully implemented and applied to the processing of Personal Data. At a minimum, these policies must include assignment of internal responsibility for information security management, devoting adequate personnel resources to information security, carrying out appropriate background checks on permanent staff who will have access to the Personal Data, requiring employees, vendors and others with access to Personal Data to enter into written confidentiality agreements, and conducting training to make employees and others with access to the Personal Data aware of information security risks presented by the processing.
Security Policies. The controller and processor will each maintain and fully implement written security policies that apply to personal data processing.
Security Policies. Vendor shall at all times ensure personnel who may come in to contact with Confidential Information, including all Vendor employees, subcontractors, service providers, independent contractors, or agents employed or otherwise engaged by Vendor in connection with this Agreement will be subject to and shall comply with all security and confidentiality provisions contained in this Agreement and all established security and privacy policies and practices of Vendor, which will be shared in their entirety with the University within fifteen (15) days of the execution of this Agreement. In the event such policies are modified subsequent to the execution of this Agreement, then Vendor shall promptly notify the University in writing of such changes. In the event that the University finds Vendor’s information security polices and standards deficient, the University may require that the Vendor establish additional safeguards within a commercially reasonable time (but not more than forty-five (45) days). In the event Vendor chooses not to implement additional safeguards suggested by the University, the University will have the right to terminate this Agreement without penalty and with a pro rata refund to the University through the date of termination.
Security Policies. Consultant and Company agree that their personnel, while working at or visiting the premises of the other party, shall comply with all the internal rules and regulations of the other party, including security procedures, and all applicable federal, state, and local laws and regulations applicable to the location where said employees are working or visiting.
Security Policies a. IBM will maintain and follow written IT security policies and practices that are integral to IBM's business and mandatory for all IBM employees. The IBM Chief Information Security Officer will maintain responsibility and executive oversight for such policies, including formal governance and revision management, employee education, and compliance enforcement.
b. IBM will review its IT security policies at least annually and amend such policies as IBM deems reasonable to maintain protection of IBM Services and Content.
c. IBM will maintain and follow its standard mandatory employment verification requirements for all new hires and will extend such requirements to wholly owned IBM subsidiaries. In accordance with IBM internal processes and procedures, these requirements will be periodically reviewed and include, but may not be limited to, criminal background checks, proof of identity validation, and additional checks as deemed necessary by IBM. Each IBM company is responsible for implementing these requirements in its hiring process as applicable and permitted under local law.
d. IBM employees will complete IBM's security and privacy education annually and certify each year that they will comply with IBM's ethical business conduct, confidentiality, and security policies, as set out in IBM's Business Conduct Guidelines. Additional training will be provided to any persons granted privileged access to Compon ents that is specific to their role within IBM's operation and support of the IBM Services, and as required to maintain compliance and accreditations stated in any relevant IBM Services Document.