Security Policies and Practices Sample Clauses

Security Policies and Practices. The following is not intended to be an all inclusive list of security services and obligations necessary to comply with Security Best Practices, but is intended to capture key elements of such a program. American reserves the right to modify the obligations in this Section or add new obligations, and any such modified or new security requirement, specification or event reporting procedures shall become effective * after written notice thereof from American, **. Notwithstanding the foregoing, if such modification or addition is required by applicable law, Supplier will implement and adhere to such modification or addition and such procedures will become effective in time to comply with such law and Supplier will not have the right to terminate this Agreement.
AutoNDA by SimpleDocs
Security Policies and Practices. Contractor and its personnel shall comply with all of Owner's written security requirements, procedures and practices provided by Owner to Contractor, including mandatory identification badges for all personnel and visitors to the Site. Contractor shall properly protect the Completed Work and the Work in progress, when required, with barricades or fences in a manner acceptable to Owner's Representative. All excavations are to be left at all times in a safe condition, to the satisfaction of Owner's Representative.

Related to Security Policies and Practices

  • Policies and Practices The employment relationship between the Parties shall be governed by this Agreement and the policies and practices established by the Company and the Board of Directors (hereinafter referred to as the “Board”). In the event that the terms of this Agreement differ from or are in conflict with the Company’s policies or practices or the Company’s Employee Handbook, this Agreement shall control.

  • Security Policies IBM maintains privacy and security policies that are communicated to IBM employees. IBM requires privacy and security training to personnel who support IBM data centers. We have an information security team. IBM security policies and standards are reviewed and re-evaluated annually. IBM security incidents are handled in accordance with a comprehensive incident response procedure.

  • Security Policy As part of PCI DSS, the Card Organizations require that you have a security policy that covers the security of credit card information.

  • Data Practices The Public Entity agrees with respect to any data that it possesses regarding the G.O. Grant, the Project, or the operation of the Real Property and, if applicable, Facility, to comply with all of the provisions and restrictions contained in the Minnesota Government Data Practices Act contained in Chapter 13 of the Minnesota Statutes that exists as of the date of this Agreement and as such may subsequently be amended, modified or replaced from time to time.

  • Safety Policy Each employer is required by law to have a safety policy and program. TIR will ask for and may require a copy of that policy and program.

  • Policies and Procedures i) The policies and procedures of the designated employer apply to the employee while working at both sites.

  • SAFETY PRACTICES (a) The employer will take reasonable measures to prevent and eliminate any present or potential job hazards which the employees may encounter at their places of work.

  • Privacy Policies Each party will make available a Privacy Policy that complies with Law. Xxxxxx’s Privacy Policy explains how and for what purposes Stripe collects, uses, retains, discloses and safeguards the Personal Data you provide to Stripe.

  • Compliance Policies and Procedures To assist the Fund in complying with Rule 38a-1 of the 1940 Act, BBH&Co. represents that it has adopted written policies and procedures reasonably designed to prevent violation of the federal securities laws in fulfilling its obligations under the Agreement and that it has in place a compliance program to monitor its compliance with those policies and procedures. BBH&Co will upon request provide the Fund with information about our compliance program as mutually agreed.

  • Company Policies and Procedures 7.1.1 The Company will ensure that Employees are able to readily access Company policies and procedures that apply to the Employees.

Time is Money Join Law Insider Premium to draft better contracts faster.