Security Policy and Procedures Clause Samples

The Security Policy and Procedures clause establishes the requirements and standards for maintaining the security of information, systems, and physical premises within an organization or between contracting parties. It typically outlines the specific security measures that must be implemented, such as access controls, data encryption, regular security audits, and employee training on security protocols. This clause ensures that both parties understand their obligations to protect sensitive data and mitigate risks of unauthorized access or breaches, thereby reducing the likelihood of security incidents and ensuring compliance with relevant laws and industry standards.
Security Policy and Procedures. Data Processor has adopted security policies and follows documented procedures for the Processing and protection of Personal Data. They are appropriately conveyed to relevant staff. Security Resource(s) Data Processor shall have a security-oriented team dedicated to ensuring the security of Data Processor’s assets and of Data Processor’s client services, including Personal Data, and to reacting to security vulnerabilities. Security Training Data Processor shall be responsible for verifying all members of the Data Processor team are trained in security practices, including cybersecurity. Evidence must be provided to Data Controller via artifacts upon request. Trustworthy Data Processors Data Processor agrees to perform background investigation of all team members to the maximum extent allowed by law, in compliance with all federal, state, provincial, local and national laws.
Security Policy and Procedures. Processor must document a security policy with regard to the processing of personal data.
Security Policy and Procedures. Data importer maintains a cybersecurity program that documents the policies, standards, and controls it uses that secure the information and resources related to the Services. The documentation includes organizational, administrative, technical, and physical safeguards and standards appropriate to the size and complexity, the scope of the activities, and the sensitivity of the Personal Data at issue
Security Policy and Procedures. Data Processor has adopted security policies and follows documented procedures for the processing and protection of Personal Data. They are appropriately conveyed to relevant staff. Security Resource(s) Data Processor shall have a security-oriented team dedicated to ensuring the security of Data Controller's assets and services, including Personal Data, and to reacting to security vulnerabilities. Security Training Data Processor shall be responsible for verifying all members of the Data Processor’s organization are trained in security practices. Evidence must be provided to Data Controller via artifacts upon request. Trustworthy Data Data Processor agrees to perform background investigation of applicable team members to the extent required by law, in compliance with all federal, state, provincial, local and national laws.
Security Policy and Procedures. ConnDOT has in effect a Security Policy that the Contractor must adhere to. The Contractor is responsible for being familiar with the policy and informing his employees of all security procedures, which must be strictly adhered to by all employees. Any violations created by the Contractor or his employees may subject the Contractor to assessment and/or cancellation of the contract. The State has the right to demand termination of any employee who has violated ConnDOT Security Regulations.
Security Policy and Procedures. Data Processor has adopted security policies and follows documented procedures for the processing and protection of Personal Data. They are appropriately conveyed to relevant staff.
Security Policy and Procedures. Contractor (Processor) must document a security policy regarding the processing of personal data.

Related to Security Policy and Procedures

  • Policy and Procedures If the resident leaves the facility due to hospitalization or a therapeutic leave, the facility shall not be obligated to hold the resident’s bed available until his or her return, unless prior arrangements have been made for a bed hold pursuant to the facility’s “Bed Reservation Policy and Procedure” and pursuant to applicable law. In the absence of a bed hold, the resident is not guaranteed readmission unless the resident is eligible for Medicaid and requires the services provided by the facility. However, the resident may be placed in any appropriate bed in a semi-private room in the facility at the time of his or her return from hospitalization or therapeutic leave provided a bed is available and the resident’s admission is appropriate and meets the readmission requirements of the facility.

  • Security Policies To the extent the Contractor or its subcontractors, affiliates or agents handles, collects, stores, disseminates or otherwise deals with State Data, the Contractor will have an information security policy that protects its systems and processes and media that may contain State Data from internal and external security threats and State Data from unauthorized disclosure, and will have provided a copy of such policy to the State. The Contractor shall provide the State with not less than thirty (30) days advance written notice of any material amendment or modification of such policies.

  • Security Policy As part of PCI DSS, the Card Organizations require that you have a security policy that covers the security of credit card information.

  • Safety Policy Each employer is required by law to have a safety policy and program. TIR will ask for and may require a copy of that policy and program.

  • Policies and Procedures i) The policies and procedures of the designated employer apply to the employee while working at both sites. ii) Only the designated employer shall have exclusive authority over the employee in regard to discipline, reporting to the College of Nurses of Ontario and/or investigations of family/resident complaints. iii) The designated employer will ensure that the employee is covered by WSIB at all times, regardless of worksite, while in the employ of either home. iv) The designated employer will ensure that the employee is covered by liability insurance at all times, regardless of worksite, while in the employ of either home. v) The designated employer shall have exclusive authority over the employee’s personnel files and health records. These files will be maintained on the site of the designated employer.