Cjis Security Policy Section 5 Sample Clauses

Cjis Security Policy Section 5 
AutoNDA by SimpleDocs

Related to Cjis Security Policy Section 5

  • Security Policy As part of PCI DSS, the Card Organizations require that you have a security policy that covers the security of credit card information.

  • Security Policies IBM maintains privacy and security policies that are communicated to IBM employees. IBM requires privacy and security training to personnel who support IBM data centers. We have an information security team. IBM security policies and standards are reviewed and re-evaluated annually. IBM security incidents are handled in accordance with a comprehensive incident response procedure.

  • Security Policy for Contractors 1. The Department for Work and Pensions treats its information as a valuable asset and considers that it is essential that information must be protected, together with the systems, equipment and processes which support its use. These information assets may include data, text, drawings, diagrams, images or sounds in electronic, magnetic, optical or tangible media, together with any Personal Data for which the Department for Work and Pensions is the Data Controller.

  • Summary of Policy and Prohibitions on Procurement Lobbying Pursuant to State Finance Law §139-j and §139-k, this Contract includes and imposes certain restrictions on communications between OGS and a Vendor during the procurement process. A Vendor is restricted from making contacts from the earliest notice of intent to solicit offers/bids through final award and approval of the Procurement Contract by OGS and, if applicable, the Office of the State Comptroller (“restricted period”) to other than designated staff unless it is a contact that is included among certain statutory exceptions set forth in State Finance Law §139-j(3)(a). Designated staff, as of the date hereof, is identified in Appendix G, Contractor and OGS Information, or as otherwise indicated by OGS. OGS employees are also required to obtain certain information when contacted during the restricted period and make a determination of the responsibility of the Vendor pursuant to these two statutes. Certain findings of non-responsibility can result in rejection for contract award and in the event of two findings within a four-year period; the Vendor is debarred from obtaining governmental Procurement Contracts. Further information about these requirements can be found on the OGS website: xxxx://xxx.xxx.xx.xxx/aboutOgs/regulations/defaultSFL_139j-k.asp.

  • Use, Security, and Retention Local Agency shall use, hold and maintain State Confidential Information in compliance with any and all applicable laws and regulations in facilities located within the United States, and shall maintain a secure environment that ensures confidentiality of all State Confidential Information wherever located. Local Agency shall provide the State with access, subject to Local Agency’s reasonable security requirements, for purposes of inspecting and monitoring access and use of State Confidential Information and evaluating security control effectiveness. Upon the expiration or termination of this Agreement, Local Agency shall return State Records provided to Local Agency or destroy such State Records and certify to the State that it has done so, as directed by the State. If Local Agency is prevented by law or regulation from returning or destroying State Confidential Information, Local Agency warrants it will guarantee the confidentiality of, and cease to use, such State Confidential Information.

  • UNION SECURITY AND CHECKOFF 5:01 It shall be a condition of continued employment for all employees including probationary employees, as defined in Article 2, to become members and maintain membership in good standing in the Union.

  • Safety Policy Each employer is required by law to have a safety policy and program. TIR will ask for and may require a copy of that policy and program.

  • SECURITY POLICIES AND NOTIFICATIONS State Security Policies and Procedures The Contractor and its personnel shall review and be familiar with all State security policies, procedures and directives currently existing or implemented during the term of the Contract, including ITS Policy NYS-P03-002 Information Security Policy (or successor policy). Security Incidents Contractor shall address any Security Incidents in the manner prescribed in ITS Policy NYS-P03-002 Information Security Policy (or successor policy), including the New York State Cyber Incident Reporting Procedures incorporated therein or in such successor policy.

  • UNION SECURITY AND CHECK-OFF 5.01 All present seniority employees who are currently members of the Union will be required to continue to be members of the Union as a condition of employment for the duration of this Agreement.

  • City Policy THE CITY OPPOSES DISCRIMINATION ON THE BASIS OF RACE AND SEX AND URGES ALL OF ITS CONTRACTORS TO PROVIDE A FAIR OPPORTUNITY FOR MINORITIES AND WOMEN TO PARTICIPATE IN THEIR WORK FORCE AND AS SUBCONTRACTORS AND VENDORS UNDER CITY CONTRACTS.

Time is Money Join Law Insider Premium to draft better contracts faster.