Security Policies and Safeguards Sample Clauses

The Security Policies and Safeguards clause establishes the requirements for maintaining and enforcing measures to protect sensitive information and systems from unauthorized access, breaches, or other security threats. It typically outlines the standards and procedures that parties must follow, such as implementing firewalls, encryption, access controls, and regular security audits. By clearly defining these obligations, the clause helps ensure that both parties take appropriate steps to mitigate security risks and protect confidential data, thereby reducing the likelihood of data breaches and associated liabilities.
Security Policies and Safeguards. Infor shall establish and maintain administrative, technical, and physical safeguards designed to protect against the destruction, loss, unauthorized access or alteration of Licensee Data and Personal Information in the possession or under the control of Infor or to which Infor has access, which are: (i) no less rigorous than those maintained by Infor for its own information of a similar nature; (ii) no less rigorous than generally accepted industry standards; and (iii) required by applicable laws. The security procedures and safeguards implemented and maintained by Infor pursuant to this Section 6(b) shall include, without limitation: (i) User identification and access controls designed to limit access to Licensee’s Data to authorized users; (ii) the use of appropriate procedures and technical controls regulating data entering Infor’s network from any external source; (iii) the use of encryption techniques when Licensee’s Data is transmitted or transferred into or out of the hosted environment; (iv) physical security measures, including without limitation securing Licensee’s Data within a secure facility where only authorized personnel and agents will have physical access to Licensee Data; (v) operational measures, including without limitation IT Service Management (ITSM) processes designed to ensure the correct and secure operations of information processing activities;
Security Policies and Safeguards. Infor will establish and maintain administrative, technical, and physical safeguards designed to protect against the destruction, loss, unauthorized access or alteration of Ordering Activity Data and Personal Information in the possession or under the control of Infor or to which Infor has access in performance of Subscription Services, which are: (i) no less rigorous than those maintained by Infor for its own information of a similar nature; (ii) no less rigorous than generally accepted industry standards; and (iii) required by applicable laws. The security procedures and safeguards implemented and maintained by Infor pursuant to this Section shall include, without limitation: (i) User identification and access controls designed to limit access to Ordering Activity Data to authorized users; (ii) the use of appropriate procedures and technical controls regulating data entering Infor’s network from any external source; (iii) the use of encryption techniques when Ordering Activity Data is transmitted or transferred into or out of the hosted environment; (iv) physical security measures, including without limitation securing Ordering Activity Data within a secure facility where only authorized personnel and agents will have physical access to Ordering Activity Data; (v) operational measures, including without limitation IT Service Management (ITSM) processes designed to ensure the correct and secure operations of information processing activities; (vi) periodic employee training regarding the security programs referenced in this Section; and (vii) periodic testing of the systems and procedures outlined in this Section.
Security Policies and Safeguards. Ephesoft shall establish and maintain administrative, technical, and physical safeguards designed to protect against the destruction, loss, unauthorized access or alteration of Licensee Data and Personal Information in the possession or under the control of Ephesoft or to which Ephesoft has access, which are: (i) no less rigorous than those maintained by Ephesoft for its own information of a similar nature; (ii) no less rigorous than generally accepted industry standards; and (iii) required by applicable laws. The security procedures and safeguards implemented and maintained by Ephesoft pursuant to this Section 6(b) shall include, without limitation: (i) User identification and access controls designed to limit access to Licensee’s Data to authorized users; (ii) the use of appropriate procedures and technical controls regulating data entering Ephesoft’s network from any external source; (iii) the use of encryption techniques when Licensee’s Data is transmitted or transferred into or out of the hosted environment; (iv) physical security measures, including without limitation securing Licensee’s Data within a secure facility where only authorized personnel and agents will have physical access to Licensee Data; (v) operational measures, including without limitation IT Service Management (ITSM) processes designed to ensure the correct and secure operations of information processing activities;
Security Policies and Safeguards. Ordering Activity shall agree that the following terms are sufficient for the protection of Ordering Activity Data and Personal Information.
Security Policies and Safeguards. 6.1 Vendor shall establish and maintain administrative, technical and physical safeguards designed to protect against the destruction, loss, unauthorized access or alteration of Confidential Information and/or County Data in the possession or under the control of Vendor or to which Vendor has access, which are: (a) no less rigorous than those maintained by Vendor for its own information of a similar nature; (b) no less rigorous than generally accepted industry standard; and, (c) no less rigorous than as required by applicable laws. If applicable for the maintenance and support of systems and data protection, the security procedures and safeguards implemented and maintained by Vendor shall include, without limitation: 6.1.1 User identification and access controls designed to limit access to County’s Data and/or Confidential Information to authorized users. 6.1.2 The use of appropriate Security and technical controls and procedures governing data entering County’s network from any external sources.
Security Policies and Safeguards. Contractor shall establish and maintain administrative, technical and physical safeguards designed to protect against the destruction, loss, unauthorized access or alteration of County Data and Personal Information in the possession or under the control of Contractor or to which Contractor has access, which are: (i) no less rigorous than those maintained by Contractor for its own information of a similar nature; (ii) no less rigorous than generally accepted industry standard; and, (iii) no less rigorous than as required by applicable laws. “Personal Information” is information that can be used on its own or with other information to identify, contact, or locate a single person, or to identify an individual in context.

Related to Security Policies and Safeguards

  • Security Policies To the extent the Contractor or its subcontractors, affiliates or agents handles, collects, stores, disseminates or otherwise deals with State Data, the Contractor will have an information security policy that protects its systems and processes and media that may contain State Data from internal and external security threats and State Data from unauthorized disclosure, and will have provided a copy of such policy to the State. The Contractor shall provide the State with not less than thirty (30) days advance written notice of any material amendment or modification of such policies.

  • Security Safeguards Contractor shall store and process District Data in accordance with commercial best practices, including implementing appropriate administrative, physical, and technical safeguards that are no less rigorous than those outlined in SANS Top 20 Security Controls, as amended, to secure such data from unauthorized access, disclosure, alteration, and use. Contractor shall ensure that all such safeguards, including the manner in which District Data is collected, accessed, used, stored, processed, disposed of and disclosed, comply with all applicable federal and state data protection and privacy laws, regulations and directives, including without limitation C.R.S. § ▇▇-▇▇-▇▇▇ et seq., as well as the terms and conditions of this Addendum. Without limiting the foregoing, and unless expressly agreed to the contrary in writing, Contractor warrants that all electronic District Data will be encrypted in transmission and at rest in accordance with NIST Special Publication 800-57, as amended.

  • Safeguards Business Associate, its Agent(s) and Subcontractor(s) shall implement and use appropriate safeguards to prevent the use or disclosure of PHI other than as provided for by this Agreement. With respect to any PHI that is maintained in or transmitted by electronic media, Business Associate or its Subcontractor(s) shall comply with 45 CFR sections 164.308 (administrative safeguards), 164.310 (physical safeguards), 164.312 (technical safeguards) and 164.316 (policies and procedures and documentation requirements). Business Associate or its Agent(s) and Subcontractor(s) shall identify in writing upon request from Covered Entity all of the safeguards that it uses to prevent impermissible uses or disclosures of PHI.