Security Overview Sample Clauses

The Security Overview clause outlines the general approach and measures taken to protect data, systems, or information within the scope of an agreement. It typically describes the types of security protocols in place, such as encryption, access controls, and monitoring, and may reference compliance with industry standards or regulations. This clause serves to assure parties that adequate safeguards are implemented, thereby reducing the risk of data breaches and clarifying security responsibilities.
Security Overview. The Demandware security strategy is designed to protect your data at multiple levels, including data security, data integrity, and data privacy. To ensure the privacy, security, and availability of your data and transactions, Demandware employs the following technologies in delivering its service. [**] 1.1 Data Center Security
Security Overview. All IZ Gateway Portfolio Project components are secured at the HIPAA level, leveraging APHL’s security and ensuring confidentiality, integrity and availability. • All connections into the IZ Gateway use an IZ Gateway digital certificate, ensuring that only authenticated (authorized and verified) systems are allowed to connect. • Outgoing connections only occur with known URLs to ensure data transmission to appropriate recipients. • All IZ information is encrypted while in motion. • IZ Gateway does not use, disclose or decrypt IZ information in Connect/Share/Access. • For Multi-Jurisdictional Data Exchange only, which is still under development, the IZ Gateway will access and decrypt IZ information, such as when routing a query to additional Participating IIS Jurisdictions that are 16 identified by the sender within the message and have executed the MOU.
Security Overview. We make every effort to ensure that your information is protected. We use current industry standard encryption and employ SSL encryption to insure that information passed between our site and your browser is secure. All servers involved in gathering, storing, and providing the data to you are operated in a secure data center that has restricted access to authorized personnel only. Our data center is monitored 24 hours per day and only certified employees are permitted on premises. A record is kept of all personnel who have entered the secure data center. Access to servers requires multiple levels of authentication. Sensitive data including your access credentials and account numbers are always stored in encrypted format at all times. Our employees are made aware of our security policies, procedures and practices and confirm, on a yearly basis, that they have carefully reviewed and abide by it.
Security Overview. All IZ Gateway use cases/components are secured at the HIPAA level, leveraging The Association of Public Health Laboratories (APHL)’s security and ensuring confidentiality, integrity and availability • All connections into the IZ Gateway use an IZ Gateway digital certificate, ensuring that only authenticated (authorized and verified) systems are allowed to connect. • Outgoing connections only occur with known URLs to ensure data transmission to appropriate recipients. • All IZ information is encrypted while in motion. • IZ Gateway does not use, disclose or decrypt IZ information in Connect/IIS-IIS Exchange/Access. Highly Sensitive/Any User (No encryption) • For Multi-Jurisdictional Data Exchange only, which is still under development, the IZ Gateway will access and decrypt IZ information, such as when routing a query to additional participating IIS jurisdictions that are identified by the sender within the message and have executed the MOU. Highly Sensitive/Any User (No encryption) Per DUA with IIS Jurisdiction, APHL will notify jurisdiction promptly of a data breach.
Security Overview. Offeror must describe its notification process in the event of a security incident, including relating to timing, incident levels. Offeror should take into consideration that Purchasing Entities may have different notification requirements based on applicable laws and the categorization type of the data being processed or stored.
Security Overview. Using the Online Banking login on the ▇▇▇.▇▇▇▇▇▇▇.▇▇▇ pages is safe, since your account number/username and password are transmitted via secure session that is established between your browser and our systems. Your information is encrypted using 128-bit encryption algorithm and sent to our systems for authentication into Online Banking. Please note ACU never transmits your information without it first being encrypted. You acknowledge the Internet is inherently insecure and all data transfers, including electronic mail, occur openly on the Internet and potentially can be monitored and read by others. Requests for personal information should only be sent to us through the Message Board in your Online Banking account. We cannot and do not warrant data transfers utilizing the open Internet.

Related to Security Overview

  • Project Overview With ever growing size of cities, ensuring high levels of physical security without significantly increasing the number of security personnel or budget seems to be a daunting task. A heightened sense of security and ever increasing challenges require new tactics with more access to integrated system and centralized information. This necessitates the need of designing and implementing Command and Control centers for critical infrastructure across different cities. A command and control center (CCC) in City Surveillance and Incident Response Project refers to a secure building in a government that operates as the surveillance monitoring center, coordination office and alarm monitoring center all in one. The CCC includes Video Surveillance room, Dial 100 Control room, Forensic Investigation Room, ITMS room and Data center & FMS/NOC Room. The CCC is the “nerve center” - a central administrative location from where overall assets and activities are monitored and managed. The command and control centers would be operated by State Police department. City Surveillance system would involve installation of high definition fixed and PTZ IP cameras, capable of providing optical zoom, to obtain quality video stream day in and day out for the Command & Control Center. A diversified IP based network infrastructure backbone would be deployed involving high speed fibre optics/ wireless technologies to carry video from cameras to the command and control center. The CCC would be equipped with huge video walls, workstations, video management servers and video data storage clusters of several hundred terabytes. The Command and Control Center would integrate with various security systems and sensors and enable the operators to carry out the coordinated response plans effectively. The Command & Control solution would allow the Video Surveillance Room operator/ Dial 100 operator to monitor the cameras, collect inputs, dissect information and make actionable recommendations. The system would provide configurable rules Collaborative Change Management monitoring-Feeds from various public and Capacity Building places where systems which include are already installed training of police like malls, personnel on various community centers, software's like airport and railway VMS,CCC,Dial station etc. 100,Forensic etc. Edge Equipments Network Connectivity (Cameras, Sensors, (Optical Fibre, Radio Panic Button, ITMS Communication, PRI etc.) Line, Switch etc.) with tailored alerts, dashboard visualizations, intelligent role based work flow, response tools and situation collaboration. Surveillance and Incident response project This RFP intends to select System Integrator’s who will be responsible for supply, installation, commissioning of procured items under this rate contract and FMS of Edge Equipments/items procured under this rate contract, existing items available in Abhay Command Center in 26 districts and items to be procured till project completion for this project in different cities of Rajasthan. Rate Contract for Supply, Installation, commissioning and FMS of Edge equipment’s under Surveillance and Incident Response Project in the State of Rajasthan (After Pre-bid)

  • NIST Cybersecurity Framework The U.S. Department of Commerce National Institute for Standards and Technology Framework for Improving Critical Infrastructure Cybersecurity Version 1.1.

  • Agreement Overview This SLA operates in conjunction with, and does not supersede or replace any part of, the Agreement. It outlines the information technology service levels that we will provide to you to ensure the availability of the application services that you have requested us to provide. All other support services are documented in the Support Call Process.

  • Security of Data a. Each of the parties shall: i. ensure as far as reasonably practicable, that Data is properly stored, is not accessible to unauthorised persons, is not altered, lost or destroyed and is capable of being retrieved only by properly authorised persons; ii. subject to the provisions of Sub-Clause 8.a. ensure that, in addition to any security, proprietary and other information disclosure provision contained in the Contract, Messages and Associated Data are maintained in confidence, are not disclosed or transmitted to any unauthorised person and are not used for any purpose other than that communicated by the sending party or permitted by the Contract; and iii. protect further transmission to the same degree as the originally transmitted Message and Associated Data when further transmissions of Messages and Associated Data are permitted by the Contract or expressly authorised by the sending party. b. The sending party shall ensure that Messages are marked in accordance with the requirements of the Contract. If a further transmission is made pursuant to Sub-Clause 3. a. iii. the sender shall ensure that such markings are repeated in the further transmission. c. The parties may apply special protection to Messages by encryption or by other agreed means, and may apply designations to the Messages for protective Interchange, handling and storage procedures. Unless the parties otherwise agree, the party receiving a Message so protected or designated shall use at least the same level of protection and protective procedures for any further transmission of the Message and its Associated Data for all responses to the Message and for all other communications by Interchange or otherwise to any other person relating to the Message. d. If either party becomes aware of a security breach or breach of confidence in relation to any Message or in relation to its procedures or systems (including, without limitation, unauthorised access to their systems for generation, authentication, authorisation, processing, transmission, storage, protection and file management of Messages) then it shall immediately inform the other party of such breach. On being informed or becoming aware of a breach the party concerned shall: i. immediately investigate the cause, effect and extent of such breach; ii. report the results of the investigation to the other party; and iii. use all reasonable endeavours to rectify the cause of such breach. e. Each party shall ensure that the contents of Messages that are sent or received are not inconsistent with the law, the application of which could restrict the content of a Message or limit its use, and shall take all necessary measures to inform without delay the other party if such an inconsistency arises.

  • Overview (a) The Employer is committed to maintaining a stable and skilled workforce, recognising its contribution to the operation of the Employer. As such, full time direct and ongoing employment is a guiding principle of this Agreement. (b) The Employer will take all measures to achieve employment security for the direct permanent employees of the Employer. The Parties agree upon the measures in this Clause to protect and enhance the employment security, health and safety, terms and conditions of employment and career development of the employees. (c) The employer agrees that it is highly important to ensure that work is performed effectively, efficiently and without undue pressure or bullying, and in a way that promotes OHS and EO principles and practices in the workplace and appropriate representation of employees should they so request. The employer will ensure that its employment practices are consistent with the above principles and practices.