Other Security Requirements Sample Clauses

Other Security Requirements. 8.1 Premises - Please provide details of the security measures in place for restricting access to your premises including alarm systems and security staff etc.
AutoNDA by SimpleDocs
Other Security Requirements. The Company shall maintain all technologies, policies, procedures and practices necessary to secure and protect the confidentiality and integrity of WSD Student Information, including procedures to (a) establish user IDs and passwords as necessary to protect such information; (b) protect all such user passwords from detection and unauthorized use; (c) prevent hostile or unauthorized intrusion that could result in data corruption, or deny service; (d) prevent and detect computer viruses from spreading to disks, attachments to e-mail, downloaded files, and documents generated by word processing and spreadsheet programs; (e) minimize system downtime; (f) notify WSD of planned system changes that may impact the security of WSD data; (g) return or destroy WSD data that exceed specified retention schedules or upon the request of WSD; (h) notify WSD of any data storage outside the United States; (i) in the event of system failure, enable immediate recovery of WSD Student Information to the previous business day. The Company guarantees that WSD Student Information shall not be sold to, accessed by, or moved by third parties. In the event of a security breach, the Company shall (a) immediately take action to close the breach; (b) notify WSD within 24 hours of Company's first knowledge of the breach, the reasons for or cause of the breach, actions taken to close the breach, and identify the WSD Student Information compromised by the breach; (c) return compromised WSD Student Information for review; (d) provide communications on the breach to be shared with affected parties and cooperate with WSD efforts to communicate to affected parties by providing WSD with prior review of press releases and any communications to be sent to affected parties; (e) take all legally required, reasonable, and customary measures in working with WSD to remediate the breach which may include toll free telephone support with informed customer services staff to address questions by affected parties and/or provide monitoring services if necessary given the nature and scope of the disclosure; (f) cooperate with WSD by providing information, records and witnesses needed to respond to any government investigation into the disclosure of such records or litigation concerning the breach; and (g) provide WSD with notice within 24 hours of notice or service on Company, whichever occurs first, of any lawsuits resulting from, or government investigations of, the Company's handling of WSD Student Infor...
Other Security Requirements. The Independent Contractor shall maintain all technologies, policies, procedures and practices necessary to secure and protect the confidentiality and integrity of PSD Student/employee Information, including procedures to (a) establish user IDs and passwords as necessary to protect such information;
Other Security Requirements. The Company shall maintain all technologies, policies, procedures and practices necessary to secure and protect the confidentiality and integrity of FCPS Confidential Records in the Company’s possession, including procedures to (i) restrict access to such records in accordance with this Addendum; (ii) establish user IDs and passwords as necessary to protect such records; (iii) protect all such user passwords from detection and unauthorized use; (iv) prevent hostile or unauthorized intrusion that could compromise confidentiality, result in data corruption, or deny service; (v) prevent and detect computer viruses from spreading to disks, attachments to e-mail, downloaded files, and documents generated by word processing and spreadsheet programs; (v) minimize system downtime; (vi) notify FCPS of planned system changes that may impact the security of FCPS Confidential Records; (vii) return or destroy FCPS Confidential Records that exceed specified retention schedules; (viii) permit periodic security audits by FCPS or designated third party using applicable regulations and industry best practice standards as benchmarks, and make commercially reasonable efforts to remediate the vulnerabilities discovered; and (ix) in the event of system failure, enable immediate recovery of FCPS records to the previous business day. In the event of a security breach, the Company shall (i) immediately take action to close the breach; (ii) notify FCPS within 2 business days after Company's first knowledge of the breach, the reasons for or cause of the breach, actions taken to close the breach, and identify the FCPS Confidential Records compromised by the breach; (iii) return compromised FCPS Confidential Records for review; (iv) provide communications on the breach to be shared with affected parties and cooperate with FCPS efforts to communicate to affected parties by providing FCPS with prior review of press releases and any communications to be sent to affected parties; (v) take all legally required, reasonable, and customary measures in working with FCPS to remediate the breach which may include toll free telephone support with informed customer services staff to address questions by affected parties and/or provide monitoring services if necessary given the nature and scope of the disclosure; (vi) cooperate with FCPS by providing information, records and witnesses needed to respond to any government investigation into the disclosure of such records or litigation concerning the ...
Other Security Requirements. The Company shall maintain all technologies, policies, procedures and practices necessary to secure and protect the confidentiality and integrity of BCS student information, including procedures to (a) establish user IDs and passwords as necessary to protect such information; (b) protect all such user passwords from detection and unauthorized use; (c) prevent hostile or unauthorized intrusion that could result in data corruption, or deny service; (d) prevent and detect computer viruses from spreading to disks, attachments to e-mail, downloaded files, and documents generated by word processing and spreadsheet programs; (e) minimize system downtime; (f) notify BCS of planned system changes that may impact the security of BCS data; (g) return or destroy BCS data that exceed specified retention schedules;
Other Security Requirements. The Company shall maintain all technologies, policies, procedures and practices necessary to secure and protect the confidentiality and integrity of ACS student information, including procedures to (a) establish user IDs and passwords as necessary to protect such information;
Other Security Requirements. 6.1 The Service Provider shall at all times when undertaking the Services provide security processes and facilities regarding the holding of Customer Data that meet or exceed the Security Control Requirements including security measures set out in the Customer’s “Group Information Security Policies and Standards” comprised in the Standards and Policies relevant to the transfer, storage and processing of data (as notified to the Service Provider by the Customer from time to time) and the provisions set out in this Schedule 7. The Service Provider shall make available to the Customer its policies and procedures upon request by the Customer.
AutoNDA by SimpleDocs
Other Security Requirements. The Company shall maintain all technologies, policies, procedures and practices necessary to secure and protect the confidentiality and integrity of GCS student information, including procedures to
Other Security Requirements. The Company shall maintain all technologies, policies, procedures and practices reasonably necessary to secure and protect the confidentiality and integrity of FCPS Confidential Student Records. In the event of a security breach, the Company shall (i) promptly take action to close the breach; (ii) notify FCPS within 2 business days after Company's first knowledge of the breach, the reasons for or cause of the breach, actions taken to close the breach, and identify the FCPS Confidential Student Records compromised by the breach; (iii) return compromised FCPS Confidential Student Records for review; (iv) provide communications on the breach to be shared with affected parties and cooperate with FCPS efforts to communicate to affected parties by providing FCPS with prior review of press releases and any communications to be sent to affected parties; (v) take all legally required, reasonable, and customary measures in working with FCPS to remediate the breach which may include toll free telephone support with informed customer services staff to address questions by affected parties and/or provide monitoring services if necessary given the nature and scope of the disclosure; (vi) cooperate with FCPS by providing information, records and witnesses needed to respond to any government investigation into the disclosure of such records or litigation concerning the breach; and
Other Security Requirements. The costs for compliance with subsections (a) and (b) of this Section 11 shall be allocated pursuant to the applicable provisions of Section 2.5 of the Agreement [**]. Sprint shall cooperate with Amdocs' compliance efforts with subsections (a) and (b) below. The Parties will state the technical requirements, implementation timetables and processes for compliance with subsections (a) and (b) below in [**] as applicable to be agreed upon by the Parties.
Time is Money Join Law Insider Premium to draft better contracts faster.