Security Policy Framework Sample Clauses

Security Policy Framework. The parties agree to enter into a confidential relationship with respect to the disclosure of certain sensitive, proprietary or protected information ("Sensitive Information").
AutoNDA by SimpleDocs
Security Policy Framework. The Supplier shall evidence working towards compliance with SPF minimum mandatory measures (as contained within this clause S3-30) and shall ensure that controls are in place relevant to the BIL of DfE Data before the contract. The Supplier shall record compliance, and evidence of such compliance, with its obligations under this Schedule 7, using a self-assessment checklist (“Self-Assessment Checklist”) satisfactory to DfE and shall make available to DfE an updated Self-Assessment Checklist: (i) on or by the date for the Security Document and Business Continuity Plans to be completed; and (ii) promptly following a change: in the operational requirements of the National Curriculum Tests programme; or to one or more SPF minimum mandatory measures. Each Self-Assessment Checklist shall include details of: whether the Supplier is compliant with each requirement of this clause S3-30 (each, a “Requirement”); evidence supporting the Supplier’s compliance with each Requirement; actions taken by the Supplier to mitigate any non-compliance with each Requirement; the risk caused to the Supplier and DfE due to any non-compliance with each Requirement; and the named person(s) in the Supplier’s organisation who are responsible for ensuring compliance with each Requirement. For the purposes of completing the Self-Assessment Checklist, as at 17 June 2009, the BIL rating of NCT data is BIL3.
Security Policy Framework. The whole SPF is provided for Contractors’ reference, however, Contractors’ should complete the questions highlighted in yellow for submission with their Tender. APPENDIX H

Related to Security Policy Framework

  • Security Policy As part of PCI DSS, the Card Organizations require that you have a security policy that covers the security of credit card information.

  • Security Policies IBM maintains privacy and security policies that are communicated to IBM employees. IBM requires privacy and security training to personnel who support IBM data centers. We have an information security team. IBM security policies and standards are reviewed and re-evaluated annually. IBM security incidents are handled in accordance with a comprehensive incident response procedure.

  • Safety Policy Each employer is required by law to have a safety policy and program. TIR will ask for and may require a copy of that policy and program.

  • Security Program Contractor will develop and implement an effective security program for the Project Site, which program shall require the Contractor and subcontractors to take measures for the protection of their tools, materials, equipment, and structures. As between Contractor and Owner, Contractor shall be solely responsible for security against theft of and damage of all tools and equipment of every kind and nature and used in connection with the Work, regardless of by whom owned.

  • Summary of Policy and Prohibitions on Procurement Lobbying Pursuant to State Finance Law §139-j and §139-k, this Contract includes and imposes certain restrictions on communications between OGS and a Vendor during the procurement process. A Vendor is restricted from making contacts from the earliest notice of intent to solicit offers/bids through final award and approval of the Procurement Contract by OGS and, if applicable, the Office of the State Comptroller (“restricted period”) to other than designated staff unless it is a contact that is included among certain statutory exceptions set forth in State Finance Law §139-j(3)(a). Designated staff, as of the date hereof, is identified in Appendix G, Contractor and OGS Information, or as otherwise indicated by OGS. OGS employees are also required to obtain certain information when contacted during the restricted period and make a determination of the responsibility of the Vendor pursuant to these two statutes. Certain findings of non-responsibility can result in rejection for contract award and in the event of two findings within a four-year period; the Vendor is debarred from obtaining governmental Procurement Contracts. Further information about these requirements can be found on the OGS website: xxxx://xxx.xxx.xx.xxx/aboutOgs/regulations/defaultSFL_139j-k.asp.

  • Security Protocols Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.

  • SPAM POLICY You are strictly prohibited from using the Website or any of the Company's Services for illegal spam activities, including gathering email addresses and personal information from others or sending any mass commercial emails.

  • ADDITIONAL INSURED ENDORSEMENT AND PRIMARY AND NON-CONTRIBUTORY INSURANCE CLAUSE Supplier agrees to list Sourcewell and its Participating Entities, including their officers, agents, and employees, as an additional insured under the Supplier’s commercial general liability insurance policy with respect to liability arising out of activities, “operations,” or “work” performed by or on behalf of Supplier, and products and completed operations of Supplier. The policy provision(s) or endorsement(s) must further provide that coverage is primary and not excess over or contributory with any other valid, applicable, and collectible insurance or self-insurance in force for the additional insureds.

  • Security Procedures The Fund shall comply with data access operating standards and procedures and with user identification or other password control requirements and other security procedures as may be issued from time to time by State Street for use of the System on a remote basis and to access the Data Access Services. The Fund shall have access only to the Fund Data and authorized transactions agreed upon from time to time by State Street and, upon notice from State Street, the Fund shall discontinue remote use of the System and access to Data Access Services for any security reasons cited by State Street; provided, that, in such event, State Street shall, for a period not less than 180 days (or such other shorter period specified by the Fund) after such discontinuance, assume responsibility to provide accounting services under the terms of the Custodian Agreement.

  • Security Plan The Operator shall develop and execute a security plan that meets the requirements of this Agreement and Article 7. The Operator shall document in the security plan the process used to ensure information systems including hardware, software, applications, and general support systems have effective security safeguards, which have been implemented, planned for, and documented. The Operator shall deliver a copy of the plan to the RIRs after each annual update.

Time is Money Join Law Insider Premium to draft better contracts faster.