Policies and Processes Sample Clauses

Policies and Processes. Armis has developed and implemented a range of documented policies, standards, programs and processes in support of its overall data security program. These include, but not limited to, employee security training process; employee background checks; incoming and departing employees access and related data protection process; access control policy and processes; product vulnerability management and penetration testing, reporting and remediation process; business continuity and disaster recovery process; security incident management standard; confidentiality documentation policy; vulnerability and patch management standards; mobile devices policy; removable media policy; acceptable encryption standard; vendor risk management standard; configuration management standard; data handling policy; media destruction policy, data classification and handling standard, etc.
AutoNDA by SimpleDocs
Policies and Processes. In carrying out its obligations under Clauses 4.1, 4.2 and 4.3, the parties will meet and determine the Operating Manuals, policies and procedures related to the efficient operation of the Hotel. The OPERATOR shall have the right to propose and determine with the advice of OWNER the Policies and Procedures. Notwithstanding to the generality of the foregoing, subject to the Annual Budget, the OPERATOR shall have the right to determine the policies and procedures in respect of all matters including but not limited to the following:-
Policies and Processes. The CCHH Provider shall have policies and processes in place to ensure compliance with Federal and State requirements and shall have documentation of policies and processes readily available.
Policies and Processes. Password Construction Guidelines Overview Passwords are a critical component of information security. Passwords serve to protect user accounts; however, a poorly constructed password may result in the compromise of individual systems, data, or network. This guideline provides best practices for creating secure passwords.
Policies and Processes. Password Construction Guidelines Definition and Terms The following definition and terms can be found in the SANS Glossary located at xxxxx://xxx.xxxx.xxx/security- resources/glossary-of-terms/ • Simple Network Management Protocol (SNMP) Password Construction Guidelines Overview Passwords are a critical component of information security. Passwords serve to protect user accounts; however, a poorly constructed password may result in the compromise of individual systems, data, or network. This guideline provides best practices for creating secure passwords.
Policies and Processes. Please review the following policies for details of protecting information when accessing the corporate network via remote access methods, and acceptable use of PrimeGov’s network: • Password Protection Policy • Acceptable Use Policy
Policies and Processes. The IHH Provider shall have policies and processes in place to ensure compliance with Federal and State requirements and shall have documentation of policies and processes readily available.
AutoNDA by SimpleDocs

Related to Policies and Processes

  • Policies and Procedures i) The policies and procedures of the designated employer apply to the employee while working at both sites.

  • Ordering Guidelines and Processes 1.14.1 For information regarding Ordering Guidelines and Processes for various Network Elements, Combinations and Other Services, TWTC should refer to the “Guides” section of the AT&T Interconnection Web site. TWTC will be notified of any material changes to such “Guides”.

  • Violence Policies and Procedures The Employer agrees to have in place explicit policies and procedures to deal with violence. The policy will address the prevention of violence, the management of violent situations, provision of legal counsel and support to employees who have faced violence. The policies and procedures shall be part of the employee's health and safety policy and written copies shall be provided to each employee. Prior to implementing any changes to these policies, the employer agrees to consult with the Association.

  • Overpayment Policies and Procedures Within 90 days after the Effective Date, Xxxxx shall develop and implement written policies and procedures regarding the identification, quantification and repayment of Overpayments received from any Federal health care program.

  • Company Policies and Procedures 7.1.1 The Company will ensure that Employees are able to readily access Company policies and procedures that apply to the Employees.

  • Compliance Policies and Procedures To assist the Fund in complying with Rule 38a-1 of the 1940 Act, BBH&Co. represents that it has adopted written policies and procedures reasonably designed to prevent violation of the federal securities laws in fulfilling its obligations under the Agreement and that it has in place a compliance program to monitor its compliance with those policies and procedures. BBH&Co will upon request provide the Fund with information about our compliance program as mutually agreed.

  • Policies and Practices The employment relationship between the Parties shall be governed by this Agreement and the policies and practices established by the Company and the Board of Directors (hereinafter referred to as the “Board”). In the event that the terms of this Agreement differ from or are in conflict with the Company’s policies or practices or the Company’s Employee Handbook, this Agreement shall control.

  • COMPLIANCE WITH POLICIES AND PROCEDURES During the period that Executive is employed with the Company hereunder, Executive shall adhere to the policies and standards of professionalism set forth in the policies and procedures of the Company and IAC as they may exist from time to time.

  • Sub-Advisor Compliance Policies and Procedures The Sub-Advisor shall promptly provide the Trust CCO with copies of: (i) the Sub-Advisor’s policies and procedures for compliance by the Sub-Advisor with the Federal Securities Laws (together, the “Sub-Advisor Compliance Procedures”), and (ii) any material changes to the Sub-Advisor Compliance Procedures. The Sub-Advisor shall cooperate fully with the Trust CCO so as to facilitate the Trust CCO’s performance of the Trust CCO’s responsibilities under Rule 38a-1 to review, evaluate and report to the Trust’s Board of Trustees on the operation of the Sub-Advisor Compliance Procedures, and shall promptly report to the Trust CCO any Material Compliance Matter arising under the Sub-Advisor Compliance Procedures involving the Sub-Advisor Assets. The Sub-Advisor shall provide to the Trust CCO: (i) quarterly reports confirming the Sub-Advisor’s compliance with the Sub-Advisor Compliance Procedures in managing the Sub-Advisor Assets, and (ii) certifications that there were no Material Compliance Matters involving the Sub-Advisor that arose under the Sub-Advisor Compliance Procedures that affected the Sub-Advisor Assets. At least annually, the Sub-Advisor shall provide a certification to the Trust CCO to the effect that the Sub-Advisor has in place and has implemented policies and procedures that are reasonably designed to ensure compliance by the Sub-Advisor with the Federal Securities Laws.

  • Processes Any employer, employee, trade union or employer’s association may at any point in time apply for an exemption from any of the provisions of this Collective Agreement. The applicant is required to complete and submit in writing with the relevant office of the Council, a fully and properly completed prescribed application for exemption form, accompanied by all relevant supporting documentation.

Time is Money Join Law Insider Premium to draft better contracts faster.