Security Information Sample Clauses

The Security Information clause defines the obligations and standards for handling, protecting, and managing sensitive or confidential information related to security. It typically outlines the types of information considered sensitive, such as passwords, access codes, or proprietary security protocols, and specifies the measures parties must take to prevent unauthorized access or disclosure. By establishing clear guidelines for the treatment of security-related information, this clause helps prevent data breaches and ensures that both parties understand their responsibilities in safeguarding critical information.
Security Information. 12.1 The Supplier shall provide the Authority with details of systems that they have in place that show how they shall comply fully with all Annexes and Schedules that deal with the security of information. 12.2 In order for the Supplier to process any data belonging to the Authority they must have security clearance appropriate to the security classification that has been allocated to that process. Only Official and Official – Sensitive security classification audio will be undertaken under the OTS Service. Official and Official- Sensitive Baseline Personal Security Service – BPSS Secret Security Clearance - SC or Developed Vetting – DV Top Secret Developed Vetting- DV 12.3 The security classifications (OFFICIAL, OFFICIAL SENSITIVE, SECRET and TOP SECRET) indicate the increasing sensitivity of information AND the baseline personnel, physical and information security controls necessary to defend against a broad profile of applicable threats. Full details are provided in Annex 4. 12.4 The Supplier shall be expected to handle information classified as Official and Official- Sensitive only and should ensure that all their Personnel who do not directly deliver the contracted services have undergone a basic Disclosure Barring Service (DBS) check. This shall include all temporary and relief Personnel. 12.5 The Supplier shall work with Authority to ensure the required numbers of Personnel with the required level of security clearance will be available to fulfil Orders. 12.6 The Supplier shall create and maintain a database which shall contain details of their Personnel and their level of security clearance and ensure that said clearance certificates are monitored for any breaches and updated as required. 12.7 The Supplier shall provide the Authority with details of their Personnel who undertake Service Orders and include their clearance details. 12.8 The Supplier’s database of Personnel shall be made available to the Authority immediately on request. 12.9 The Supplier shall ensure that any breaches of security are immediately reported to the Authority. 12.10 The Authority and its authorised representatives shall have the right to audit or examine source data from the Supplier database. 12.11 For full details of Security Information requirements, see Annex D to the Call-Off Contract terms and conditions (Information Assurance and Security).
Security Information. The Client acknowledges that the Security Information is confidential and agrees that it is responsible for maintaining its confidentiality. The Client agrees that it must: a. only use the Security Information in accordance with these terms; b. not disclose the Security Information (or any part of it) to any person or persons (including its employees, contractors, agents and consultants) other than to an Authorised Person; c. ensure that at all times, each Authorised Person maintains the confidentiality of the Security Information; d. notify Openmarkets immediately upon becoming aware that any Security Information has been or may be used or disclosed in a manner that is not consistent with these terms; and e. regularly review and, if necessary, upgrade the security of its network through which it accesses the DMA Service to ensure that only Authorised Persons are able to access or use the DMA Service.
Security Information. Agency shall comply with all privilege requirements and procedures set forth by the USDHS, USSS or other governmental entity. If Agency has custody of a record provided by City which contains details of security arrangements or investigations, Agency shall, as soon as practical and without delay, notify City of any request to disclose such record and shall follow the requirements of Section 13.5, below, prior to disclosure. For purposes of this Paragraph, the term “record” shall be broadly construed and shall include, but not be limited to, all documents, paper, electronic files, and other things containing information, irrespective of the form of that record or data, i.e. electronic, hard copy, voice recording, photograph, etc., unless such form is specified by law.
Security Information. Siemens provides products and solutions with industrial security functions that support the secure operation of plants, systems, machines and networks. In order to protect plants, systems, machines and networks against cyber threats, it is necessary to implement – and continuously maintain – a holistic, state-of-the-art industrial security concept. Siemens’ products and solutions only form one element of such a concept. You are responsible to prevent unauthorized access to Your plants, systems, machines and networks. Such systems, machines and components should only be connected to the enterprise network or the internet if and to the extent such a connection is necessary and only when appropriate security measures (e.g. firewalls and/or network segmentation) are in place. Additionally, Siemens guidance on appropriate security measures should be taken into account. Please visit hereto ▇▇▇▇▇://▇▇▇.▇▇▇▇▇▇▇.▇▇▇/industrialsecurity. Siemens’ products and solutions undergo continuous development to make them more secure. Siemens strongly recommends that updates are applied as soon as available and that the latest product versions are used. Use of product versions that are no longer supported, and failure to apply latest updates may increase customer’s exposure to cyber threats. To stay informed about the latest security threats, patches and other related measures, published, among, please subscribe to the Siemens Industrial Security RSS Feed under ▇▇▇▇▇://▇▇▇.▇▇▇▇▇▇▇.▇▇▇/industrialsecurity and visit ▇▇▇▇://▇▇▇.▇▇▇▇▇▇▇.▇▇▇/cert/en/cert-security-advisories.htm.
Security Information. Siemens provides products and solutions with industrial security functions that support the secure operation of plants, systems, machines and networks. In order to protect plants, systems, machines and networks against cyber threats, it is necessary to implement – and continuously maintain – a holistic, state-of-the-art industrial security concept. Siemens’ products and solutions only form one element of such a concept. You are responsible to prevent unauthorized access to Your plants, systems, machines and networks. Systems, machines and components should only be connected to the enterprise network or the internet if and to the extent such a connection is necessary and with appropriate security measures (e.g. use of firewalls and network segmentation) in place. For additional information on industrial security measures that may be implemented, please visit ▇▇▇▇▇://▇▇▇.▇▇▇▇▇▇▇.▇▇▇/industrialsecurity. Siemens’ products and solutions undergo continuous development to make the more secure. Siemens strongly recommends to apply product updates as soon as available and to always use the latest product versions. Use of product versions that are no longer supported, and failure to apply latest updates may increase customer’s exposure to cyber threats. To stay informed about product updates, subscribe to the Siemens Industrial Security RSS Feed under ▇▇▇▇▇://▇▇▇.▇▇▇▇▇▇▇.▇▇▇/industrialsecurity.
Security Information. Important Information When Traveling Outside The United States – If you plan to travel outside the U.S., please contact a bankcard representative at ▇-▇▇▇-▇▇▇-▇▇▇▇. For security reasons, some foreign countries may be blocked or have certain restrictions. Your account is also protected by a fraud monitoring system that uses sophisticated technologies that seeks out and identifies suspicious card activity on your behalf. Fraud is serious business. Therefore, if high risk or suspicious activity occurs, you may receive calls from security analysts to confirm activity. In some cases your account may be temporarily blocked until validity of charges is confirmed.
Security Information. Show Management will provide reasonable security protection when exhibits are closed, but the safekeeping of the exhibitor’s property shall remain the responsibility of the exhibitor. Each exhibitor is encouraged to purchase a portal-to- portal rider (available at a nominal cost) on their own insurance policy, protecting them against loss through theft, fire, damage, etc. Please do not leave valuables such as laptops, PDA’s, purses, briefcases, plasma screens and cell phones unattended in your booth at any time. If you will be leaving valuables in your booth overnight, we recommend that you retain the services of the official security company for your booth. In general, exhibitors may use sound equipment in their booths so long as the noise level does not disrupt the activities of neighboring exhibitors. Speakers and other sound devices should be positioned to direct sound into the booth rather than into the aisle. Rule of thumb: Sound and noise should not exceed 85 decibels.
Security Information. Except where otherwise provided in this clause 3.6, you are responsible for paying any losses, fees or charges arising from Trades entered into or instructions given using your Account number and Security Information. You will not be responsible for any losses after we receive a request from you that we stop using any item of the Security Information. You will also not be responsible for any losses where we have been negligent in allowing a person you have not authorised to access your Account, or where it can be shown that a person has gained access to our Trading Platform by abuse of our systems except where such loss results from your failure to comply with clause 3.5 or 27.
Security Information. We are aware of the many instances of data security breaches and continue to work on new ways to protect your information. For our most sensitive databases, we use encrypted formats within controlled and secure environments that have restricted access. Although we work to ensure the integrity and security of our network and computer systems, we cannot guarantee that our security measures will prevent unauthorized access.
Security Information. As soon as possible following the date hereof, Sellers shall make available to Purchaser the appropriate personnel to discuss the Acquired Subsidiaries' information security policies, experiences complying with such policies and material breach of such policies.