Physical Security Program Clause Samples

The Physical Security Program clause establishes requirements for safeguarding physical premises, assets, and personnel against unauthorized access, theft, or damage. It typically outlines measures such as access controls, surveillance systems, visitor management, and secure storage of sensitive materials. By mandating these protocols, the clause helps ensure the safety and integrity of facilities, thereby reducing the risk of security breaches and protecting organizational resources.
Physical Security Program. Provider shall use a number of technological and operational approaches in its physical security program to mitigate security risks to the extent reasonably practicable. Provider’s security team shall work closely with each site to determine appropriate measures are in place to prevent unauthorized persons from gaining access to systems within which Personal Data is Processed and continually monitor any changes to the physical infrastructure, business, and known threats. Provider’s security team shall also monitor best practice measures used by others in the industry and carefully select approaches that meet both uniqueness in business practice and expectations of RSA. Provider shall balance its approach toward security by considering elements of control that include architecture, operations, and systems.
Physical Security Program. Data importer shall use a number of technological and operational approaches in its physical security program to mitigate security risks to the extent reasonably practicable. Data importer’s security team works closely with each site to determine appropriate measures are in place to prevent unauthorized persons from gaining access to systems within which personal data is processed and continually monitor any changes to the physical infrastructure, business and known threats. They also monitor best practice measures used by others in the industry and carefully select approaches that meet both uniqueness in business practice and expectations of data importer. Data importer balances its approach towards security by considering elements of control that include architecture, operations and systems.
Physical Security Program. Expel shall use a number of technological and operational approaches in its physical security program to mitigate security risks to the extent reasonably possible. Expel’s security team works closely with each site to determine appropriate measures are in place to prevent unauthorized persons from gaining access to systems within which confidential information (including personal data) is processed and continually monitor any changes to the infrastructure, business and known threats. They also monitor best practice measures used by others in the industry and carefully select approaches that meet both uniqueness in business practice and expectations of Expel. Expel balances its approach towards security by considering elements of control that include architecture, operations and systems.
Physical Security Program. Arista shall use a number of technological and operational approaches in its physical security program to mitigate security risks to the extent reasonably practicable. Arista’s security team works closely with each site to determine appropriate measures are in place to prevent unauthorized persons from gaining access to systems within which personal data is processed and continually monitor any changes to the physical infrastructure, business and known threats. They also monitor best practice measures used by others in the industry and carefully select approaches that meet both uniqueness in business practice and expectations of Arista. Arista balances its approach towards security by considering elements of control that include architecture, operations and systems.
Physical Security Program. Vendor shall use a number of technological and operational approaches in its physical security program to mitigate security risks to the extent reasonably possible. Vendor’s security team works closely with each site to determine appropriate measures are in place to prevent unauthorized persons from gaining access to systems within which confidential information (including personal data) is processed and continually monitor any changes to the infrastructure, business and known threats. They also monitor best practice measures used by others in the industry and carefully select approaches that meet both uniqueness in business practice and expectations of Vendor. Vendor balances its approach towards security by considering elements of control that include architecture, operations and systems.
Physical Security Program. Suppliers must implement appropriate physical security measures designed to protect the physical copies or assets where Company Data is processed and to ensure continuous monitoring of access to facilities. Physical security measures are aligned to industry’s best practices (e.g. ISO 27001) and periodically reviewed to align to industry’s best practices.