General Security Sample Clauses

General Security. A5.1.1 The Contractor shall comply, and be able to demonstrate compliance with: The Lead/Customer Organisation’s Security policies and standards; and The Data Security Plan submitted when completing the Award Criteria Security Questionnaire as part of the tender response.
AutoNDA by SimpleDocs
General Security. 1. Never leave your iPad unsecured. iPads should be locked in a designated storage facility or a secure locker when not in use.
General Security. The Supplier shall comply, and be able to demonstrate compliance with:
General Security. 1. Defendants will develop and submit to USDOJ and the Monitor for review and approval facility-specific policies designed to promote the safety and security of prisoners and that include the following:
General Security. 1. Never leave your computing device unattended or unsecured.
General Security. Splunk’s information security management system (“ISMS”) is calibrated to protect the confidentiality, integrity and availability of customer data. Splunk employees receive regular training on Splunk’s security policies and procedures, including annual training on secure data handling practices, and supplemental, targeted trainings as appropriate. Employees are background checked and Splunk vendors are risk assessed prior to onboarding to determine if their data protection and security practices meet Splunk’s standards.
General Security. 1. Never leave your Kindle unsecured. Kindle should be locked in a designated storage facility or kept with you at all times.
AutoNDA by SimpleDocs
General Security. ● Never leave your Chromebook unsecured. ● Lock your Chromebook in a designated storage facility or secure locker. ● During after-school activities, you are expected to maintain the security of your Chromebook. ● Unsupervised Chromebooks may be collected by staff, and disciplinary action may be taken. ● Your Chromebook may have several identifying labels (i.e. NPD117 asset number, serial number and student ID number). Do not modify, remove or destroy these labels. ● Do not store personal information about yourself or others on the Chromebook. ● Keep all passwords confidential. ● You are responsible for your individual account. Take all reasonable precautions to prevent others from using it. ● Do NOT loan your Chromebook to anyone. ● Notify a teacher immediately if you suspect any potential security problems with your Chromebook, including any suspected computer viruses. ● To prevent loss or damage to your Chromebook, NEVER leave it unattended or have it out of its case on the bus or in the cafeteria during meals. ● Keep your closed Chromebook in its case when traveling between classrooms. ● Follow all rules so you will not lose privileges.
General Security a. External Party agrees to promptly implement and maintain an information security program that includes appropriate administrative, technical and physical safeguards reasonably designed to accomplish the following tasks:
General Security. Never leave the Chromebook unsecured. Chromebooks should be locked in a designated area or secured in a locker when not in use. • Students are expected to maintain the security of the Chromebook even during after- school activities.
Time is Money Join Law Insider Premium to draft better contracts faster.