PREVENT Sample Clauses

PREVENT. (a) unauthorised or unlawful processing of the Shared User Data; and
PREVENT. Under the Counter Terrorism and Security Act 2015 the Prevent duty places an obligation on higher education institutions to have "due regard to the need to prevent individuals from being drawn into terrorism". Compliance with the duty in England is monitored by the Office for Students (OfS). Government Guidance requires that universities have policies in place for external speakers and events, the training of staff, welfare and pastoral care, and IT usage. It is also makes clear that the approach to Prevent should be reasonable and proportionate in the context of the assessment of risk within the local environment. The University’s approach to Prevent is primarily one of safeguarding the welfare our students and staff. We will also ensure that the duty is balanced against our fundamental commitment to academic freedom and freedom of speech, and other key legislation such as the Equality Act and the Human Rights Act. Free and open debate in often controversial subjects is a key element of University life, and we will always seek to allow events to go ahead providing that they are within the law. The University, therefore, has a number of policies and Codes of Practice that relate to Prevent, to ensure the University’s compliance, and to engage in the wellbeing and duty of care for students and staff. Such policies and Codes of Practice, including how to arrange an event and/or a speaker, how to use material in your research or study that may raise the interest in the security services, and how to raise a concern, can be found here: xxxx://xxx.xxxxxx.xx.xx/cgr/prevent/
PREVENT. ‌ Prevent is 1 of the 4 elements of CONTEST, the government’s counter-terrorism strategy. It aims to stop people becoming terrorists or supporting terrorism. The Prevent strategy: Responds to the ideological challenge we face from terrorism and aspects of extremism, and the threat we face from those who promote these views Provides practical help to prevent people from being drawn into terrorism and ensure they are given appropriate advice and support works with a wide range of sectors (including education, criminal justice, faith, charities, online and health) where there are risks of radicalisation that we need to deal with For the avoidance for doubt the safeguarding elements of the PREVENT programme are included in the remit of this protocol.
PREVENT. 62.1 The Contractor shall ensure their employees and agents have a good understanding of the need to prevent people being drawn into terrorism; and
PREVENT. Finst employs a multitude of techniques to prevent situations that may give rise to a (potential) harmful conflict of interest. Important measures are the following:
PREVENT. 25.1 The Supplier shall ensure their employees and agents have a good understanding of the need to prevent people being drawn into terrorism; and
PREVENT. The ministry responsible for post-secondary education will report the remedial action taken to the BC government central privacy office and work with that office and the relevant program area to implement recommendations for preventing future breaches. In addition to following the Privacy Breach Protocol, Parties to this agreement may choose to also report directly to the BC government central privacy office if the privacy breach occurs at their institution.
PREVENT. 23.1 UNIMORE acknowledges that Nottingham is subject to the Counter Terrorism and Security Xxx 0000 (“Prevent Duty”) which requires it to act to deal with any threat of terrorism within the UK, treat security with the utmost importance and recognise the need to tackle terrorism and, where possible, to prevent individuals including students from being drawn into terrorism.
PREVENT. unauthorised or unlawful processing of the Shared Personal Data; and
PREVENT. The Solutionz Cyber security certification begins with the setup of your AV/UC environment to meet your organization’s data security requirements. Cyber Secure AV includes: • Rapid Risk Assessment – designed to understand specific security threats • Secure Administration Accounts – protect important admin accounts for all devices • Up to Date Patching – all equipment is deployed with the latest tested version and up to date patching • Integrated Threat Intelligence – identifies & stops “bad connections” (powered by Dark Cubed) • Initial Vulnerability Scan – identify any known vulnerabilities that will endanger the security of your entire AV/UC environment • Encrypted Communication (optional) Detect & respond Our detection process scales to meet any organization’s requirements or augment their existing security infrastructure. We address the most common attacks on AV/UC environments and detect them before they become your issue. • 24/7/365 Monitoring – of every data packet that crosses the AV/UC boundary with automated response (block, ticket, notification) • Annual Vulnerability Scanning – monthly or quarterly scanning available (additional charges apply) • Customized Block Lists – automatically implemented to internal Security Operations Center • Device Monitoring/Logging – available upon request (additional charges apply)