Media Protection Sample Clauses

Media Protection. Supplier must: a. Protect information system media, both paper and digital, including encrypting data at rest stored on portable media (e.g. USB drives, removable hard drives). b. Restrict access to media related to Verizon services performed under this Agreement. Access to such media must be granted in accordance with these Requirements. c. Label media containing Verizon data commensurate with the highest confidentiality level of data contained. d. When (a) directed by Verizon, or (b) unless specifically otherwise required by law or directed by Verizon, upon conclusion or termination of Supplier’s work for Verizon or when no longer required
AutoNDA by SimpleDocs
Media Protection. Supplier will, as applicable to the Services provided: a. Protect information system media, both paper and digital, including encrypting data at rest stored on portable media (e.g. USB drives, removable hard drives). b. Restrict access to media related to Verizon services performed under this Agreement. Access to such media will be granted in accordance with these Requirements. c. Label media containing Verizon data commensurate with the highest confidentiality level of data contained. EA-5 Baseline Security Requirements For Verizon Suppliers d. When (a) directed by Verizon, or (b) unless specifically otherwise required by law or directed by Verizon, upon conclusion or termination of Supplier’s work for Verizon or when no longer required for the performance of work under an Agreement, Supplier will Sanitize (or at Verizon’s election return to Verizon) all copies of all Verizon Confidential Information, including all backup and archival copies, in any electronic or non-electronic form. e. All hardcopy documents will be cross-cut shredded. f. Maintain records for all media that have been destroyed, sanitized or returned to Verizon. Records will be maintained for a minimum of four (4) years and made available to Verizon for inspection upon request.
Media Protection. Supplier must:
Media Protection. The Contractor must implement measures to provide physical and environmental protection and accountability for tapes, diskettes, printouts, and other media containing Department of Treasury’s personal, confidential and sensitive information to prevent the loss of confidentiality, integrity, or availability of information including data or software, when stored outside the system. This can include storage of information before it is input to the system and after it is output.  The Contractor must ensure that only authorized users have access to information in printed form or on digital media removed from the information system, physically control and securely store information media, both paper and digital, restrict the pickup, receipt, transfer, and delivery of such media to authorized personnel.
Media Protection. UNM will ensure that coaches and other Athletics Department personnel shall not make weekly media appearances on shows that are produced or broadcast by non- affiliated distributors, except for excerpts from press conferences open to the media.
Media Protection. Identify and describe the approach for planned and existing implementation of media protection (MP) security controls. Associated SOWs: SR5.5.5, SR5.8.51, SR5.8.52
Media Protection.  Protect information system media, both paper and digital; limit access to information on information system media to authorized users; and sanitize or destroy information system media no longer needed.
AutoNDA by SimpleDocs
Media Protection. As a matter of policy, media containing confidential information must be encrypted and access to the media restricted to authorized personnel. Media that is transported must be encrypted. Where encryption is not feasible/practical, the media must only be transferred by an authorized Pearson employee; or by an approved commercial courier that assures complete, documented chain of custody during the entire transportation process. As a matter of policy, media sanitization is required prior to the transfer of ownership, discarding, scrapping, or repurposing. Sanitization methods must make the data unrecoverable by any means. PE – Physical and Environmental Protection Physical and environmental protections are, in large measure, the purview of our hosting services provider, AWS. Since the systems are hosted in the AWS cloud, no information technology equipment that is critical to the operation of our applications are hosted outside of AWS. AWS datacenters are hosted in secure, undisclosed locations. More information about AWS security certifications and compliance can be found at: xxxx://xxx.xxxxxx.xxx/compliance/programs and xxxxx://xxx.xxxxxx.xxx/compliance/data-center/data-centers/. Regarding Pearson facilities, access is controlled by security guards at the main entrances and/or proximity ID badges. Visitors are required to sign-in, provide a picture ID to verify identity, and are escorted at all times by Pearson personnel. Video cameras monitor secure areas of the facility, in addition to entrance/exit points to the facilities. PL – Planning Information security planning is embodied in Xxxxxxx’x Information Security Management and Governance Policy, which, among many other things, requires system architecture standards; security requirements definition activities on projects; policy documentation creation, maintenance, and dissemination; and a process for handling exceptions to security requirements for those situations where it is not feasible or practical to implement them. Security exceptions are reviewed and, based on risk, dispositioned by senior leadership. PS – Personnel Security Prior to being hired or otherwise engaged as contractors, personnel must submit to a criminal background check, in addition to rigorous interview- and credentials-based review. Upon termination, access to systems is promptly removed. Where members of the workforce change positions and job responsibilities, access and permissions are adjusted accordingly. All employees are r...
Media Protection 

Related to Media Protection

  • Virus Protection The Bank is not responsible for any electronic virus or viruses that you may encounter. We suggest that you routinely scan your PC using a virus protection product. An undetected virus may corrupt and destroy your programs, files, and your hardware.

  • System Protection To prevent compromise of systems which contain DSHS Data or through which that Data passes:

  • Data Protection All personal data contained in the agreement shall be processed in accordance with Regulation (EC) No 45/2001 of the European Parliament and of the Council on the protection of individuals with regard to the processing of personal data by the EU institutions and bodies and on the free movement of such data. Such data shall be processed solely in connection with the implementation and follow-up of the agreement by the sending institution, the National Agency and the European Commission, without prejudice to the possibility of passing the data to the bodies responsible for inspection and audit in accordance with EU legislation (Court of Auditors or European Antifraud Office (XXXX)). The participant may, on written request, gain access to his personal data and correct any information that is inaccurate or incomplete. He/she should address any questions regarding the processing of his/her personal data to the sending institution and/or the National Agency. The participant may lodge a complaint against the processing of his personal data with the [national supervising body for data protection] with regard to the use of these data by the sending institution, the National Agency, or to the European Data Protection Supervisor with regard to the use of the data by the European Commission.

  • Job Protection 15.9.1 Subject to 15.10 below, an employee returning from parental leave is entitled to resume work in the same position or a similar position to the one they occupied at the time of commencing parental leave. A similar position means a position:

  • Whistleblower Protection Notwithstanding anything to the contrary contained herein, no provision of this Agreement shall be interpreted so as to impede the Employee (or any other individual) from reporting possible violations of federal law or regulation to any governmental agency or entity, including but not limited to the Department of Justice, the Securities and Exchange Commission, the Congress, and any agency Inspector General, or making other disclosures under the whistleblower provisions of federal law or regulation. The Employee does not need the prior authorization of the Company to make any such reports or disclosures and the Employee shall not be not required to notify the Company that such reports or disclosures have been made.

  • Privacy Protection Each of the Corporation and the Subsidiaries have security measures and safeguards in place to protect personal information it collects from registered patients and customers and other parties from illegal or unauthorized access or use by its personnel or third parties or access or use by its personnel or third parties in a manner that violates the privacy rights of third parties. The Corporation and the Subsidiaries have complied, in all material respects, with all applicable privacy and consumer protection legislation and neither has collected, received, stored, disclosed, transferred, used, misused or permitted unauthorized access to any information protected by privacy laws, whether collected directly or from third parties, in an unlawful manner. The Corporation and the Subsidiaries have taken all reasonable steps to protect personal information against loss or theft and against unauthorized access, copying, use, modification, disclosure or other misuse.

Time is Money Join Law Insider Premium to draft better contracts faster.