Security Policy As part of PCI DSS, the Card Organizations require that you have a security policy that covers the security of credit card information.
City Policy THE CITY OPPOSES DISCRIMINATION ON THE BASIS OF RACE AND SEX AND URGES ALL OF ITS CONTRACTORS TO PROVIDE A FAIR OPPORTUNITY FOR MINORITIES AND WOMEN TO PARTICIPATE IN THEIR WORK FORCE AND AS SUBCONTRACTORS AND VENDORS UNDER CITY CONTRACTS.
Security Policies IBM maintains privacy and security policies that are communicated to IBM employees. IBM requires privacy and security training to personnel who support IBM data centers. We have an information security team. IBM security policies and standards are reviewed and re-evaluated annually. IBM security incidents are handled in accordance with a comprehensive incident response procedure.
Safety Policy The City agrees to maintain in safe working condition all facilities and equipment furnished by the City to carry out the duties of each bargaining unit position, but reserves the right to determine what those facilities and equipment shall be. The Association agrees to work cooperatively in maintaining safety in the Xenia/Xxxxxx Central Communications Center.
SECURITY POLICIES AND NOTIFICATIONS State Security Policies and Procedures The Contractor and its personnel shall review and be familiar with all State security policies, procedures and directives currently existing or implemented during the term of the Contract, including ITS Policy NYS-P03-002 Information Security Policy (or successor policy). Security Incidents Contractor shall address any Security Incidents in the manner prescribed in ITS Policy NYS-P03-002 Information Security Policy (or successor policy), including the New York State Cyber Incident Reporting Procedures incorporated therein or in such successor policy.
Alcohol Policy 12.11 Where contractually bound, the employer will apply the Drug and Alcohol Management Program (DAMP) as contained at Appendix M.
SPAM POLICY You are strictly prohibited from using the Website or any of the Company's Services for illegal spam activities, including gathering email addresses and personal information from others or sending any mass commercial emails.