Network Security, Physical Security and Environmental Controls Sample Clauses

Network Security, Physical Security and Environmental Controls a. Meya uses a variety of techniques designed to detect and/or prevent unauthorized access to systems processing Customer Data, including firewalls and network access controls.
AutoNDA by SimpleDocs
Network Security, Physical Security and Environmental Controls a. Meetupcall uses a variety of techniques designed to detect and/or prevent unauthorised access to systems processing Customer Data, including frewalls and network access controls.

Related to Network Security, Physical Security and Environmental Controls

  • Technical Security Controls 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.

  • Physical and Environmental Security DST shall: (i) restrict entry to DST’s area(s) where Fund Confidential Information is stored, accessed, or processed solely to DST’s personnel or DST authorized third party service providers for such access; and (ii) implement commercially reasonable practices for infrastructure systems, including fire extinguishing, cooling, and power, emergency systems and employee safety.

  • Physical Security of Media Transfer Agent shall implement controls, consistent with applicable prevailing industry practices and standards, that are designed to deter the unauthorized viewing, copying, alteration or removal of any media containing Fund Data. Removable media on which Fund Data is stored by Transfer Agent (including thumb drives, CDs, and DVDs, and PDAS) will be encrypted based on Transfer Agent encryption policies.

  • O.S.H.A. and Environmental Compliance (a) Each Borrower has duly complied with, and its facilities, business, assets, property, leaseholds, Real Property and Equipment are in compliance in all material respects with, the provisions of the Federal Occupational Safety and Health Act, the Environmental Protection Act, RCRA and all other Environmental Laws; there have been no outstanding citations, notices or orders of non-compliance issued to any Borrower or relating to its business, assets, property, leaseholds or Equipment under any such laws, rules or regulations.

  • Contractor Security Clearance Customers may designate certain duties and/or positions as positions of “special trust” because they involve special trust responsibilities, are located in sensitive locations, or have key capabilities with access to sensitive or confidential information. The designation of a special trust position or duties is at the sole discretion of the Customer. Contractor or Contractor’s employees and Staff who, in the performance of this Contract, will be assigned to work in positions determined by the Customer to be positions of special trust, may be required to submit to background screening and be approved by the Customer to work on this Contract.

  • Security Controls Annually, upon Fund’s reasonable request, Transfer Agent shall provide Fund’s Chief Information Security Officer or his or her designee with a copy of its corporate information security controls that form the basis for Transfer Agent’s Security Policy and an opportunity to discuss Transfer Agent’s information security measures, and a high level summary of any vulnerability testing conducted by Transfer Agent on its information security controls, with a qualified member of Transfer Agent’s information technology management team. Transfer Agent shall review its Security Policy annually.

  • Safety and Security Procedures Contractor shall maintain and enforce, at the Contractor Work Locations, industry-standard safety and physical security policies and procedures. While at each Court Work Location, Contractor shall comply with the safety and security policies and procedures in effect at such Court Work Location.

  • Physical Security Contractor shall ensure that Medi-Cal PII is used and stored in an area that is physically safe from access by unauthorized persons during working hours and non- working hours. Contractor agrees to safeguard Medi-Cal PII from loss, theft or inadvertent disclosure and, therefore, agrees to:

  • Personnel Security 6.1 Staff recruitment in accordance with government requirements for pre- employment checks;

  • New Hampshire Specific Data Security Requirements The Provider agrees to the following privacy and security standards from “the Minimum Standards for Privacy and Security of Student and Employee Data” from the New Hampshire Department of Education. Specifically, the Provider agrees to:

Time is Money Join Law Insider Premium to draft better contracts faster.