General Security Procedures Sample Clauses

The General Security Procedures clause establishes the baseline requirements and protocols for maintaining the security of information, assets, or premises involved in the agreement. It typically outlines the standards parties must follow, such as implementing access controls, monitoring systems, or following specific industry security practices. By setting clear expectations for security measures, this clause helps prevent unauthorized access, data breaches, or other security incidents, thereby protecting both parties' interests and ensuring compliance with relevant regulations.
POPULAR SAMPLE Copied 1 times
General Security Procedures. 1.1 Processor shall be responsible for establishing and maintaining an information security program that is designed to: (i) protect the security and confidentiality of Personal Data; (ii) protect against anticipated threats or hazards to the security or integrity of the Personal Data; (iii) protect against unauthorized access to or use of the Personal Data; (iv) ensure the proper disposal of Personal Data, as further defined herein; and, (v) ensure that all employees and subcontractors of Processor, if any, comply with all of the foregoing. Processor will designate an individual to be responsible for the information security program. Such individual shall respond to Controller inquiries regarding computer security and to be responsible for notifying Controller-designated contact(s) if a breach or an incident occurs, as further described herein. 1.2 Processor shall conduct formal privacy and security awareness training for all personnel and contractors as soon as reasonably practicable after the time of hiring and/or prior to being appointed to work on Personal Data and annually recertified thereafter. Documentation of security awareness training shall be retained by Processor, confirming that this training and subsequent annual recertification process have been completed. 1.3 Controller shall have the right to review an overview of Processor’s information security program prior to the commencement of Service and annually thereafter upon Controller request. 1.4 In the event of any apparent or actual theft, unauthorized use or disclosure of any Personal Data, Processor shall immediately commence all reasonable efforts to investigate and correct the causes and remediate the results thereof, and within 2 business days following confirmation of any such event, provide Controller notice thereof, and such further information and assistance as may be reasonably requested. Upon Controller’s request, remediation actions and reasonable assurance of resolution of discovered issues shall be provided to Controller. 1.5 Processor will not transmit any unencrypted Personal Data over the internet or any unsecured network, and will not store any Personal Data on any mobile computing device, such as a laptop computer, USB drive or portable data device, except where there is a business necessity and then only if the mobile computing device is protected by industry-standard encryption software. Processor shall encrypt Personal Data in transit into and out of the Services over...
General Security Procedures. You need a username and password, to access your Eligible Accounts and Online Financial Services through the Service. We may set standards for your username and password. We recommend that you change your password regularly, and select a unique username and password combination for use only with the Service. We may also require additional security procedures for certain transactions. These additional security procedures may require special hardware, software or third-party services. To enhance the security of your Eligible Accounts and Online Financial Services, we may also offer you additional, optional security procedures. These could include personal reference questions and answers, random number generators or one-time passwords. We may also require the use or activation of specific applications, Internet browser software features, plug-ins and add-ons, to use the Service. These could include JavaScript support and "cookies." To enable and enhance secure access to the Service, we may also access detailed information about the computers and Mobile Devices you use to access the Service. This could include telephone numbers and unique internal and network identifiers for your computers and Mobile Devices. We also use cookies and other technology for information security and other purposes, as described in our Privacy Policy, available at ▇▇▇▇▇▇▇▇▇▇.▇▇▇.
General Security Procedures. Company agrees to abide by the security procedures set forth in this Agreement ("Security Procedures"). Both parties agree that the services described and provided by Bank will be subject to the terms and conditions set forth below:
General Security Procedures. Each individual who has access to Bank’s Online Banking system, including each individual named on joint accounts, must designate an online password and an Online ID. Your password must be a minimum of eight characters, which must consist of at least one numeric characters, plus alpha characters. For example, your password may be: 123signup. You may be required to change your password periodically to enhance security. All accounts you maintain with Bank will be displayed through online with account numbers, except for the last four digits, masked (your account numbers will still appear in your online statements). This provides additional level of security by ensuring that your actual account numbers will never be displayed.
General Security Procedures. 2.1. Poppulo shall promptly report activity that may reasonably lead to physical harm, loss of Protected Data or damage to personnel or facilities to the Customer. 2.2. Poppulo will implement and regularly evaluate a process to provide for continuation of business operations during unplanned, adverse events.
General Security Procedures. Each individual who has access to Bank’s Online Banking system, including each individual named on joint accounts, must designate a Password and an Access ID. Your Password must be a minimum of 8 characters, which must consist of at least one (1) numeric characters, plus alpha characters. For example, your Password may be: 123signup. You may be required to change your Password periodically to enhance security.
General Security Procedures. This Section 1.6 shall apply to all the Services offered in the Agreement.
General Security Procedures. 1.1 Processor shall be responsible for establishing and maintaining an information security program that is designed to: (i) protect the security and confidentiality of Personal Data; (ii) protect against anticipated threats or hazards to the security or integrity of the Personal Data;
General Security Procedures. You agree to the following Security Procedures which are applicable to all Cash Management Service(s) (collectively and individually, “User Information”). The Bank recommends each Authorized Person have his/her own User Information, and You agree that You will not have a single set of Authorized Persons and User Information for Your Accounts unless You executed an Addendum for Shared Services to this Cash Management Services Agreement.
General Security Procedures. 1.1 Processor shall be responsible for establishing and maintaining an information security program that is designed to: (i) protect the security and confidentiality of Personal Data; (ii) protect against anticipated threats or hazards to the security or integrity of the Personal Data; (iii) protect against unauthorized access to or use of the Personal Data; (iv) ensure the proper disposal of Personal Data, as further defined herein; and, (v) ensure that all employees and subcontractors of Processor, if any, comply with all of the foregoing. 1.2 Processor shall conduct periodic risk assessments designed to analyze existing information security risks, identify potential new risks, and evaluate the effectiveness of existing security controls. 1.3 In the event of any apparent or actual theft, unauthorized use or disclosure of any Personal Data, Processor shall immediately commence all reasonable efforts to investigate and correct the causes and remediate the results thereof, and without undue delay and within 72 hours following confirmation of any such event, provide Controller notice thereof, and such further information and assistance as may be reasonably requested. Upon Controller request, remediation actions and reasonable assurance of resolution of discovered issues shall be provided to Controller.