Customer Security Policy Sample Clauses

Customer Security Policy. 16.1 Customer shall take all necessary measures to protect the security of the Customer’s User ID and the password issued or used by the Customer in connection with the Service, including changing the Customer’s password from time to time. Kloutricity is not responsible for any loss or damage suffered or incurred by the Customer or any third party due to the wrongful use of the Customer’s account or any personal information by any other party.
AutoNDA by SimpleDocs
Customer Security Policy. A. Password Information Security You agree that You are responsible for any and all Password Information that You or any End User utilize with the Plan Services. You further agree to make certain that all such Password Information:

Related to Customer Security Policy

  • Security Policy As part of PCI DSS, the Card Organizations require that you have a security policy that covers the security of credit card information.

  • Security Policies IBM maintains privacy and security policies that are communicated to IBM employees. IBM requires privacy and security training to personnel who support IBM data centers. We have an information security team. IBM security policies and standards are reviewed and re-evaluated annually. IBM security incidents are handled in accordance with a comprehensive incident response procedure.

  • Security Policy for Contractors 1. The Department for Work and Pensions treats its information as a valuable asset and considers that it is essential that information must be protected, together with the systems, equipment and processes which support its use. These information assets may include data, text, drawings, diagrams, images or sounds in electronic, magnetic, optical or tangible media, together with any Personal Data for which the Department for Work and Pensions is the Data Controller.

  • SECURITY POLICIES AND NOTIFICATIONS State Security Policies and Procedures The Contractor and its personnel shall review and be familiar with all State security policies, procedures and directives currently existing or implemented during the term of the Contract, including ITS Policy NYS-P03-002 Information Security Policy (or successor policy). Security Incidents Contractor shall address any Security Incidents in the manner prescribed in ITS Policy NYS-P03-002 Information Security Policy (or successor policy), including the New York State Cyber Incident Reporting Procedures incorporated therein or in such successor policy.

  • Schedule of Underlying Insurance Policies If Umbrella or Excess policy is evidenced to comply with minimum limits, a copy of the Underlying Schedule from the Umbrella or Excess insurance policy may be required.

  • Security Program Contractor will develop and implement an effective security program for the Project Site, which program shall require the Contractor and subcontractors to take measures for the protection of their tools, materials, equipment, and structures. As between Contractor and Owner, Contractor shall be solely responsible for security against theft of and damage of all tools and equipment of every kind and nature and used in connection with the Work, regardless of by whom owned.

  • Security Safeguards (1) Each party acknowledges that it is solely responsible for determining and communicating to the other the appropriate technological, physical, and organizational security measures required to protect Personal Data.

  • Contractor and Employee Security Precautions A. The security aspects of working at the Correctional Facility are critical. The following security precautions are part of the site conditions and are a part of this Contract. All persons coming on the site in any way connected with this Work shall be made aware of them, and it is the (General) Contractor’s responsibility to check and enforce them.

  • Safety Policy Each employer is required by law to have a safety policy and program. TIR will ask for and may require a copy of that policy and program.

  • Anti-­‐Abuse Policy i. Registry Operator’s Anti-­‐Abuse Policy will be required under the Registry Registrar Agreement and posted on the Registry Operator’s web site.

Time is Money Join Law Insider Premium to draft better contracts faster.