OUR SECURITY PROCEDURES Sample Clauses

OUR SECURITY PROCEDURES. We keep your information secure by: • Maintaining physical, electronic and procedural safeguards that comply with or exceed federal standards to guard your nonpublic personal information, including the prompt disposal of all unnecessary customer information. • Limiting access to information about you to those associates who need to know that information to provide you products or services. • Training our associates about the importance of maintaining the confidentiality of customer information. We take appropriate disciplinary action to enforce our associates’ privacy responsibilities. • Requiring companies that do work for us on your behalf to protect information, and only provide them with information that we believe is necessary to fulfill their responsibilities. INFORMATION WE COLLECT. We collect and use different types of information about you to assist in servicing your accounts and managing our relationship with you. For example, we will use information we gather to identify you during a transaction in order to protect your identity and your account. Information you provide will also help us understand your financial needs as we design or improve our products and services. The information we gather comes from a variety of sources, including: • Information you provide to us (such as name, address and telephone number). • Information about your transactions with UMB (such as account balance and payment history). • Information we receive from credit reporting agencies and other companies and agencies (such as your credit history).
AutoNDA by SimpleDocs
OUR SECURITY PROCEDURES. SAMPLE We restrict access to nonpublic personal information about you to those employees whom we determine have a legitimate business purpose to access such information in connection with the provision of products or services to you. We employ security techniques designed to protect our customer data. We provide training and communications programs designed to educate employees about the meaning and requirements of our strict standards for data security and confidentiality.
OUR SECURITY PROCEDURES. We also take steps to safeguard customer information. We restrict access to your personal and account information to those employees who need to know that information to provide products or services to you. Employees who violate these standards will be subject to disciplinary measures. Our physical, electronic, and procedural safeguards meet or exceed federal standards regarding the protection of your nonpublic personal information. We use technological means such as backup files, virus detection, eradication software and firewalls to protect against unauthorized access or alterations to customer data and we maintain policies and procedures covering the proper physical security of workplaces and records. We continually strive to maintain complete, accurate and up to date information. If ever you believe that our records contain inaccurate or incomplete information, please contact us at Tel: 0-000-000-0000. We will investigate your concerns and correct any inaccuracies in a timely manner. We reserve the right to change this policy at anytime but would communicate any significant changes to you as required by applicable law. The policies and practices described in this disclosure replace all previous notices or statements regarding our privacy policy.
OUR SECURITY PROCEDURES. You acknowledge that you have reviewed our current online security procedures as reflected in this Agreement, and you acknowledge that these procedures are commercially reasonable in the context of your business operations. You further acknowledge that we may update these security procedures from time to time and make them available to you. You agree to keep any security information we provide to you, including but not limited to, User IDs, Passwords and security procedures, confidential.
OUR SECURITY PROCEDURES. We keep your information secure by: • Maintaining physical, electronic and procedural safeguards that comply with or exceed federal standards to guard your nonpublic personal information, including the prompt disposal of all unnecessary customer information. • Limiting access to information about you to those associates who need to know that information to provide you products or services. • Training our associates about the importance of maintaining the confidentiality of customer information. We take appropriate disciplinary action to enforce our associates’ privacy responsibilities. • Requiring companies that do work for us on your behalf to protect information, and only provide them with information that we believe is necessary to fulfill their responsibilities.

Related to OUR SECURITY PROCEDURES

  • Security Procedures The Fund shall comply with data access operating standards and procedures and with user identification or other password control requirements and other security procedures as may be issued from time to time by State Street for use of the System on a remote basis and to access the Data Access Services. The Fund shall have access only to the Fund Data and authorized transactions agreed upon from time to time by State Street and, upon notice from State Street, the Fund shall discontinue remote use of the System and access to Data Access Services for any security reasons cited by State Street; provided, that, in such event, State Street shall, for a period not less than 180 days (or such other shorter period specified by the Fund) after such discontinuance, assume responsibility to provide accounting services under the terms of the Custodian Agreement.

  • Safety and Security Procedures Contractor shall maintain and enforce, at the Contractor Work Locations, industry-standard safety and physical security policies and procedures. While at each Court Work Location, Contractor shall comply with the safety and security policies and procedures in effect at such Court Work Location.

  • Security Protocols Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.

  • SAFETY PROCEDURES The Contractor shall:

  • Security Program Contractor will develop and implement an effective security program for the Project Site, which program shall require the Contractor and subcontractors to take measures for the protection of their tools, materials, equipment, and structures. As between Contractor and Owner, Contractor shall be solely responsible for security against theft of and damage of all tools and equipment of every kind and nature and used in connection with the Work, regardless of by whom owned.

  • Information Security Program (1) DTI shall implement and maintain a comprehensive written information security program applicable to the Personal Information ("Information Security Program") which shall include commercially reasonable measures, including, as appropriate, policies and procedures and technical, physical, and administrative safeguards that are consistent with industry standards, providing for (i) the security and confidentiality of the Personal Information, (ii) protection of the Personal Information against reasonably foreseeable threats or hazards to the security or integrity of the Personal Information, (iii) protection against unauthorized access to or use of or loss or theft of the Personal Information, and (iv) appropriate disposal of the Personal Information. Without limiting the generality of the foregoing, the Information Security Program shall provide for (i) continual assessment and re-assessment of the risks to the security of Personal Information acquired or maintained by DTI and its agents, contractors and subcontractors in connection with the Services, including but not limited to (A) identification of internal and external threats that could result in unauthorized disclosure, alteration or destruction of Personal Information and systems used by DTI and its agents, contractors and subcontractors, (B) assessment of the likelihood and potential damage of such threats, taking into account the sensitivity of such Personal Information, and (C) assessment of the sufficiency of policies, procedures, information systems of DTI and its agents, contractors and subcontractors, and other arrangements in place, to control risks; and (ii) appropriate protection against such risks.

  • Security Safeguards (1) Each party acknowledges that it is solely responsible for determining and communicating to the other the appropriate technological, physical, and organizational security measures required to protect Personal Data.

  • Security Provisions Order 1600.72A, Contractor and Industrial Security Program applies to all Contractors, subcontractors, consultants, or any other persons (not visitors) who have access to FAA facilities, sensitive unclassified information, and resources. See Security Guidelines (Attachment J-9) for more details. The Government will update the document periodically to reflect the current FAA security policy. The Government designates all eFAST labor categories as enumerated in Attachment J-3 as low risk for the Risk/Sensitivity Level. Program office CORs will review labor category designations and indicate changes to the contractually designated default Risk/Sensitivity Level Designations as appropriate for their specific contracts or task orders. This would require a submission of a “Contractor Position Risk/Sensitivity Level Designation Record” form (FAA Form 1600-77).

Time is Money Join Law Insider Premium to draft better contracts faster.