Security Policies Sample Clauses

Security Policies a. Contractor’s security policy is documented, has obtained management approval, is reviewed no less frequently than annually and is maintained to ensure its continuing suitability, adequacy and effectiveness; and b. Contractor’s operational, technical and administrative policies, standards and guidelines are documented, have obtained management approval, are reviewed no less frequently than annually and are maintained to ensure their continuing suitability, adequacy and effectiveness.
Security Policies. IBM maintains privacy and security policies that are communicated to IBM employees. IBM requires privacy and security training to personnel who support IBM data centers. We have an information security team. IBM security policies and standards are reviewed and re-evaluated annually. IBM security incidents are handled in accordance with a comprehensive incident response procedure.
Security Policies. Contractor shall comply at all times with Agency’s security policies as they are stated in this Contract or otherwise made available to Contractor.
Security Policies. To the extent the Contractor or its subcontractors, affiliates or agents handles, collects, stores, disseminates or otherwise deals with State Data, the Contractor will have an information security policy that protects its systems and processes and media that may contain State Data from internal and external security threats and State Data from unauthorized disclosure, and will have provided a copy of such policy to the State. The Contractor shall provide the State with not less than thirty (30) days advance written notice of any material amendment or modification of such policies.
Security Policies. The responsible party and the operator will each maintain and fully implement written security policies that apply to personal information processing.
Security Policies. Vendor will maintain written security policies that are fully implemented and applied to the processing of Personal Data. At a minimum, these policies must include assignment of internal responsibility for information security management, devoting adequate personnel resources to information security, carrying out appropriate background checks on permanent staff who will have access to the Personal Data, requiring employees, vendors and others with access to Personal Data to enter into written confidentiality agreements, and conducting training to make employees and others with access to the Personal Data aware of information security risks presented by the processing.
Security Policies. The controller and processor will each maintain and fully implement written security policies that apply to personal data processing.
Security Policies. Consultant and Company agree that their personnel, while working at or visiting the premises of the other party, shall comply with all the internal rules and regulations of the other party, including security procedures, and all applicable federal, state, and local laws and regulations applicable to the location where said employees are working or visiting.
Security Policies. Comcast shall maintain a written information security program that describes the governance and structure of the information security program as well as documenting policies and standards that are reviewed annually.
Security Policies. Business Associate shall maintain security policies that comply with all applicable laws and regulations. Company has the right to request a copy of Business Associate’s security policies.