Security Policy and Procedures Sample Clauses

Security Policy and Procedures. Data Processor has adopted security policies and follows documented procedures for the Processing and protection of Personal Data. They are appropriately conveyed to relevant staff. Security Resources, Training and Organization Security Resource(s) Data Processor shall have a security-oriented team dedicated to ensuring the security of Data Processor’s assets and of Data Processor’s client services, including Personal Data, and to reacting to security vulnerabilities. Security Training Data Processor shall be responsible for verifying all members of the Data Processor team are trained in security practices, including cybersecurity. Evidence must be provided to Data Controller via artifacts upon request. Trustworthy Data Processors Data Processor agrees to perform background investigation of all team members to the maximum extent allowed by law, in compliance with all federal, state, provincial, local and national laws. Security of Premises
AutoNDA by SimpleDocs
Security Policy and Procedures. The data processor has a documented security policy with regard to the processing of personal data.
Security Policy and Procedures. ConnDOT has in effect a Security Policy that the Contractor must adhere to. The Contractor is responsible for being familiar with the policy and informing his employees of all security procedures, which must be strictly adhered to by all employees. Any violations created by the Contractor or his employees may subject the Contractor to assessment and/or cancellation of the contract. The State has the right to demand termination of any employee who has violated ConnDOT Security Regulations. Supervisory personnel shall include in their responsibilities overseeing that all entrances and exits in each area are secure during nightly operations and locking all doors and windows when leaving the premises.
Security Policy and Procedures. Contractor (Processor) must document a security policy regarding the processing of personal data.
Security Policy and Procedures. Data Processor has adopted security policies and follows documented procedures for the processing and protection of Personal Data. They are appropriately conveyed to relevant staff.
Security Policy and Procedures. Data importer maintains a cybersecurity program that documents the policies, standards, and controls it uses that secure the information and resources related to the Services. The documentation includes organizational, administrative, technical, and physical safeguards and standards appropriate to the size and complexity, the scope of the activities, and the sensitivity of the Personal Data at issue

Related to Security Policy and Procedures

  • Policy and Procedures If the resident leaves the facility due to hospitalization or a therapeutic leave, the facility shall not be obligated to hold the resident’s bed available until his or her return, unless prior arrangements have been made for a bed hold pursuant to the facility’s “Bed Reservation Policy and Procedure” and pursuant to applicable law. In the absence of a bed hold, the resident is not guaranteed readmission unless the resident is eligible for Medicaid and requires the services provided by the facility. However, the resident may be placed in any appropriate bed in a semi-private room in the facility at the time of his or her return from hospitalization or therapeutic leave provided a bed is available and the resident’s admission is appropriate and meets the readmission requirements of the facility.

  • Security Policies IBM maintains privacy and security policies that are communicated to IBM employees. IBM requires privacy and security training to personnel who support IBM data centers. We have an information security team. IBM security policies and standards are reviewed and re-evaluated annually. IBM security incidents are handled in accordance with a comprehensive incident response procedure.

  • Security Policy As part of PCI DSS, the Card Organizations require that you have a security policy that covers the security of credit card information.

  • Safety Policy Each employer is required by law to have a safety policy and program. TIR will ask for and may require a copy of that policy and program.

  • Policies and Procedures i) The policies and procedures of the designated employer apply to the employee while working at both sites.

  • Violence Policies and Procedures The Employer agrees to have in place explicit policies and procedures to deal with violence. The policy will address the prevention of violence, the management of violent situations, provision of legal counsel and support to employees who have faced violence. The policies and procedures shall be part of the employee's health and safety policy and written copies shall be provided to each employee. Prior to implementing any changes to these policies, the employer agrees to consult with the Association.

  • Overpayment Policies and Procedures Within 90 days after the Effective Date, Xxxxx shall develop and implement written policies and procedures regarding the identification, quantification and repayment of Overpayments received from any Federal health care program.

  • Compliance Policies and Procedures To assist the Fund in complying with Rule 38a-1 of the 1940 Act, BBH&Co. represents that it has adopted written policies and procedures reasonably designed to prevent violation of the federal securities laws in fulfilling its obligations under the Agreement and that it has in place a compliance program to monitor its compliance with those policies and procedures. BBH&Co will upon request provide the Fund with information about our compliance program as mutually agreed.

  • Company Policies and Procedures 7.1.1 The Company will ensure that Employees are able to readily access Company policies and procedures that apply to the Employees.

  • COMPLIANCE WITH POLICIES AND PROCEDURES During the period that Executive is employed with the Company hereunder, Executive shall adhere to the policies and standards of professionalism set forth in the policies and procedures of the Company and IAC as they may exist from time to time.

Time is Money Join Law Insider Premium to draft better contracts faster.