{"component": "clause", "props": {"groups": [{"size": 7, "snippet": "HMG SECURITY POLICY FRAMEWORK", "samples": [{"hash": "5zfByUcS7cZ", "uri": "/contracts/5zfByUcS7cZ#security-policy", "label": "Contract for the Provision of Services", "score": 29.5826625824, "published": true}, {"hash": "dyIMzbYMxR1", "uri": "/contracts/dyIMzbYMxR1#security-policy", "label": "Contract for the Provision of Vessel Monitoring System (Vms) Devices", "score": 26.38945961, "published": true}, {"hash": "aamzHR94FIU", "uri": "/contracts/aamzHR94FIU#security-policy", "label": "Contract for Evaluating the Potential of Constructed Wetland Features", "score": 21.7125263214, "published": true}], "snippet_links": [{"key": "hmg-security-policy-framework", "type": "definition", "offset": [0, 29]}], "hash": "37302f08737cb2c41beaa61e02a4a059", "id": 5}, {"size": 17, "snippet": "UKG shall maintain an information security policy that is reviewed annually by UKG and published and communicated to all UKG employees. UKG shall maintain a dedicated security and compliance function to maintain and monitor security controls across UKG.", "samples": [{"hash": "aURYhFWpKW4", "uri": "/contracts/aURYhFWpKW4#security-policy", "label": "Data Processing Addendum", "score": 35.4831619263, "published": true}, {"hash": "7CmxGu4bafj", "uri": "/contracts/7CmxGu4bafj#security-policy", "label": "Data Processing Addendum", "score": 35.4806747437, "published": true}, {"hash": "8dhWxn2BnPa", "uri": "/contracts/8dhWxn2BnPa#security-policy", "label": "Data Processing Addendum", "score": 35.2261009216, "published": true}], "snippet_links": [{"key": "maintain-an-information-security-policy", "type": "clause", "offset": [10, 49]}, {"key": "security-and-compliance", "type": "clause", "offset": [167, 190]}, {"key": "to-maintain", "type": "clause", "offset": [200, 211]}, {"key": "security-controls", "type": "clause", "offset": [224, 241]}], "hash": "259c2dc1fdaad0d7db989d459af8a486", "id": 2}, {"size": 6, "snippet": "Contractor shall establish, maintain and enforce a formal, documented, mandated, company-wide information security and management program that shall include security policies, standards, and procedures (collectively, the \u201cContractor\u2019s Information Security Policy\u201d). The Contractor\u2019s Information Security Policy will be communicated to all Contractor personnel, agents, contractors, and subcontractors in a relevant, accessible, and understandable form and will be regularly reviewed and evaluated to ensure its operational effectiveness, compliance with all applicable laws and regulations, and to address new threats and risks.", "samples": [{"hash": "2HYK8X5DIZG", "uri": "/contracts/2HYK8X5DIZG#security-policy", "label": "Consulting and Professional Services Agreement", "score": 25.4683990479, "published": true}], "snippet_links": [{"key": "contractor-shall", "type": "clause", "offset": [0, 16]}, {"key": "a-formal", "type": "clause", "offset": [49, 57]}, {"key": "security-and", "type": "clause", "offset": [106, 118]}, {"key": "management-program", "type": "definition", "offset": [119, 137]}, {"key": "security-policies", "type": "clause", "offset": [157, 174]}, {"key": "and-procedures", "type": "clause", "offset": [187, 201]}, {"key": "information-security-policy", "type": "definition", "offset": [235, 262]}, {"key": "the-contractor", "type": "definition", "offset": [266, 280]}, {"key": "contractor-personnel", "type": "definition", "offset": [339, 359]}, {"key": "to-ensure", "type": "clause", "offset": [497, 506]}, {"key": "operational-effectiveness", "type": "clause", "offset": [511, 536]}, {"key": "compliance-with-all-applicable-laws-and-regulations", "type": "clause", "offset": [538, 589]}], "hash": "f4759c718b681f18d17fffe98a55c852", "id": 6}, {"size": 5, "snippet": "Security officers are required to oversee the property during events that may or may not offer alcohol to guests both during and outside normal business hours. Security is also required at other events that the Chief of Police determines as an event in need of security officers. The Security Policy is enforced to contribute to a peaceful and comfortable presence at the complex, the safety of City staff and guests, and protection of the property of the City and guests. The City organizes all security services of the rental facilities; the Lessee must utilize the Security personnel offered by the City.", "samples": [{"hash": "33Wi4Jg4Tpg", "uri": "/contracts/33Wi4Jg4Tpg#security-policy", "label": "Rental Agreement", "score": 21.0711841583, "published": true}, {"hash": "75KHlVsYZtX", "uri": "/contracts/75KHlVsYZtX#security-policy", "label": "Rental Agreement", "score": 20.8658447266, "published": true}, {"hash": "bNu78pKkXVh", "uri": "/contracts/bNu78pKkXVh#security-policy", "label": "Lease Agreement", "score": 20.6577682495, "published": true}], "snippet_links": [{"key": "security-officers", "type": "clause", "offset": [0, 17]}, {"key": "events-that", "type": "clause", "offset": [62, 73]}, {"key": "not-offer", "type": "clause", "offset": [85, 94]}, {"key": "normal-business-hours", "type": "definition", "offset": [137, 158]}, {"key": "other-events", "type": "clause", "offset": [189, 201]}, {"key": "chief-of-police", "type": "definition", "offset": [211, 226]}, {"key": "an-event", "type": "clause", "offset": [241, 249]}, {"key": "the-security", "type": "clause", "offset": [280, 292]}, {"key": "the-complex", "type": "definition", "offset": [368, 379]}, {"key": "the-safety", "type": "clause", "offset": [381, 391]}, {"key": "city-staff", "type": "definition", "offset": [395, 405]}, {"key": "property-of-the-city", "type": "clause", "offset": [440, 460]}, {"key": "security-services", "type": "definition", "offset": [496, 513]}, {"key": "rental-facilities", "type": "definition", "offset": [521, 538]}, {"key": "the-lessee", "type": "clause", "offset": [540, 550]}, {"key": "security-personnel", "type": "definition", "offset": [568, 586]}, {"key": "by-the-city", "type": "clause", "offset": [595, 606]}], "hash": "e5587cd5c6808fb9ce1c59eb23e16f5a", "id": 10}, {"size": 5, "snippet": "A copy of the Bank\u2019s security and privacy policy and data protection statement is available on the Bank\u2019s Website.", "samples": [{"hash": "gz8ejuJOyXG", "uri": "/contracts/gz8ejuJOyXG#security-policy", "label": "General Terms and Conditions", "score": 24.4510612488, "published": true}, {"hash": "lyWTH6qY1HS", "uri": "/contracts/lyWTH6qY1HS#security-policy", "label": "Terms and Conditions", "score": 24.2279262543, "published": true}, {"hash": "lNPtz0SGEug", "uri": "/contracts/lNPtz0SGEug#security-policy", "label": "Terms and Conditions", "score": 24.2279262543, "published": true}], "snippet_links": [{"key": "the-bank", "type": "definition", "offset": [10, 18]}, {"key": "data-protection-statement", "type": "clause", "offset": [53, 78]}], "hash": "111210436043fb777c858ce4e7224227", "id": 8}, {"size": 21, "snippet": "As part of PCI DSS, the Card Organizations require that you have a security policy that covers the security of credit card information.", "samples": [{"hash": "8QHk5Q81l56", "uri": "/contracts/8QHk5Q81l56#security-policy", "label": "Card Processing Agreement", "score": 32.9440345764, "published": true}, {"hash": "l4KE20rqwo7", "uri": "/contracts/l4KE20rqwo7#security-policy", "label": "Card Processing Agreement", "score": 32.9348335266, "published": true}, {"hash": "9DiCGrRmNqE", "uri": "/contracts/9DiCGrRmNqE#security-policy", "label": "Merchant Processing Agreement", "score": 30.6812076569, "published": true}], "snippet_links": [{"key": "pci-dss", "type": "definition", "offset": [11, 18]}, {"key": "card-organizations", "type": "definition", "offset": [24, 42]}, {"key": "security-of", "type": "clause", "offset": [99, 110]}, {"key": "credit-card-information", "type": "clause", "offset": [111, 134]}], "hash": "a357d96187c50b307b75db597549d34b", "id": 1}, {"size": 6, "snippet": "10.1 We will not provide your personal details to third parties, however, we may provide on your details to relevant authorities or regulators if we and/or they wish to investigate or assist in the investigation of any suspected or alleged fraud or abuse of the Service or if we are required by law to do so, for example under the Proceeds of Crime Act 2002 (as amended from time to time) and any other anti-money laundering or data protection legislation.\n10.2 All information received by us from your use of the Service shall be used in accordance with our Privacy Policy which is available on the App and which we encourage you to review as it details how we may process your User Data. By using the Service, you consent to such processing. It is your responsibility to update and maintain changes to that information and we are entitled to rely on any information you provide to us.\n10.3 If we have reason to believe that there has been or is likely to be a breach of security or any other misuse of the Service we may suspend and/or terminate your membership to the Service.\n10.4 We are not obliged to monitor, detect or report any unauthorised use of the Service and you shall be solely responsible for all use of the Service made by you or anyone else using your User Data, for preventing unauthorised use of your User Data and/or mobile device you are liable for all user charges that are incurred as a result of any such unauthorised use.\n10.5 If you believe there has been any breach of security such as the disclosure, theft or unauthorised use of your User Data or mobile device you must notify us immediately by e-mailing us at: \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587.\u2587\u2587@\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587.\u2587\u2587\u2587", "samples": [{"hash": "bDXjr6bcZGZ", "uri": "/contracts/bDXjr6bcZGZ#security-policy", "label": "Terms and Conditions", "score": 24.3032169342, "published": true}], "snippet_links": [{"key": "your-personal-details", "type": "clause", "offset": [25, 46]}, {"key": "to-third-parties", "type": "clause", "offset": [47, 63]}, {"key": "provide-on", "type": "clause", "offset": [81, 91]}, {"key": "your-details", "type": "clause", "offset": [92, 104]}, {"key": "relevant-authorities", "type": "definition", "offset": [108, 128]}, {"key": "the-investigation", "type": "clause", "offset": [194, 211]}, {"key": "fraud-or-abuse", "type": "clause", "offset": [240, 254]}, {"key": "required-by-law", "type": "definition", "offset": [283, 298]}, {"key": "for-example", "type": "definition", "offset": [309, 320]}, {"key": "act-2002", "type": "clause", "offset": [349, 357]}, {"key": "as-amended", "type": "definition", "offset": [359, 369]}, {"key": "from-time-to-time", "type": "clause", "offset": [370, 387]}, {"key": "money-laundering", "type": "clause", "offset": [408, 424]}, {"key": "data-protection-legislation", "type": "clause", "offset": [428, 455]}, {"key": "received-by", "type": "definition", "offset": [478, 489]}, {"key": "your-use-of-the-service", "type": "clause", "offset": [498, 521]}, {"key": "in-accordance-with", "type": "clause", "offset": [536, 554]}, {"key": "our-privacy-policy", "type": "clause", "offset": [555, 573]}, {"key": "the-app", "type": "clause", "offset": [596, 603]}, {"key": "user-data", "type": "clause", "offset": [679, 688]}, {"key": "using-the-service", "type": "clause", "offset": [693, 710]}, {"key": "you-consent-to", "type": "clause", "offset": [712, 726]}, {"key": "your-responsibility", "type": "definition", "offset": [750, 769]}, {"key": "changes-to", "type": "clause", "offset": [793, 803]}, {"key": "entitled-to-rely", "type": "clause", "offset": [832, 848]}, {"key": "information-you-provide-to-us", "type": "clause", "offset": [856, 885]}, {"key": "reason-to-believe", "type": "definition", "offset": [903, 920]}, {"key": "is-likely", "type": "definition", "offset": [944, 953]}, {"key": "breach-of-security", "type": "definition", "offset": [962, 980]}, {"key": "misuse-of-the-service", "type": "clause", "offset": [994, 1015]}, {"key": "your-membership", "type": "clause", "offset": [1048, 1063]}, {"key": "to-the-service", "type": "clause", "offset": [1064, 1078]}, {"key": "unauthorised-use", "type": "clause", "offset": [1137, 1153]}, {"key": "responsible-for", "type": "clause", "offset": [1193, 1208]}, {"key": "mobile-device", "type": "clause", "offset": [1338, 1351]}, {"key": "user-charges", "type": "definition", "offset": [1375, 1387]}, {"key": "notify-us-immediately", "type": "clause", "offset": [1600, 1621]}], "hash": "b87ff7ce234ff2aed9aac5daca5dcbed", "id": 7}, {"size": 5, "snippet": "As part of PCI DSS, the Card Organizations require that each Merchant has a security policy that covers the security of credit card information. Merchant may obtain a sample policy by visiting \u2587\u2587\u2587.\u2587\u2587\u2587.\u2587\u2587\u2587 and selecting PCI under the other payment processing services tab. Processor will provide Merchant with a sample policy for Merchant\u2019s convenience only. If Merchant does not already have a security policy in place, Merchant may use the sample policy as a starting point. However, Merchant will need to modify it to fit Merchant\u2019s processing environment and needs. If Merchant already has a security policy in place, Merchant may want to compare it to the sample policy to verify that Merchant\u2019s security policy contains the required items", "samples": [{"hash": "bshoynuo4BP", "uri": "/contracts/bshoynuo4BP#security-policy", "label": "Merchant Processing Agreement", "score": 23.7146072388, "published": true}, {"hash": "jqQsEznf74g", "uri": "/contracts/jqQsEznf74g#security-policy", "label": "Merchant Processing Agreement", "score": 22.5544147491, "published": true}, {"hash": "hx0gtfN0Laq", "uri": "/contracts/hx0gtfN0Laq#security-policy", "label": "Merchant Processing Agreement", "score": 22.5544147491, "published": true}], "snippet_links": [{"key": "pci-dss", "type": "definition", "offset": [11, 18]}, {"key": "card-organizations", "type": "definition", "offset": [24, 42]}, {"key": "security-of", "type": "clause", "offset": [108, 119]}, {"key": "credit-card-information", "type": "clause", "offset": [120, 143]}, {"key": "sample-policy", "type": "clause", "offset": [167, 180]}, {"key": "payment-processing-services", "type": "clause", "offset": [239, 266]}, {"key": "will-provide", "type": "clause", "offset": [282, 294]}, {"key": "policy-for", "type": "definition", "offset": [318, 328]}, {"key": "in-place", "type": "clause", "offset": [410, 418]}, {"key": "starting-point", "type": "clause", "offset": [460, 474]}, {"key": "merchant-will", "type": "clause", "offset": [485, 498]}, {"key": "processing-environment", "type": "definition", "offset": [535, 557]}, {"key": "to-verify", "type": "definition", "offset": [674, 683]}, {"key": "required-items", "type": "clause", "offset": [729, 743]}], "hash": "e40d5bf8832c5eaab198b560d3e0f60c", "id": 9}, {"size": 8, "snippet": "3.1 A documented set of rules and procedures must regulate the Processing of information and associated services.", "samples": [{"hash": "7LbSYO0nZB1", "uri": "/contracts/7LbSYO0nZB1#security-policy", "label": "Call Off Contract", "score": 36.3251385928, "published": true}, {"hash": "8xipgZIs9yP", "uri": "/contracts/8xipgZIs9yP#security-policy", "label": "Master Subscription Agreement", "score": 34.1420631409, "published": true}, {"hash": "5jG92AHu5uu", "uri": "/contracts/5jG92AHu5uu#security-policy", "label": "Data Processing Agreement", "score": 33.153049469, "published": true}], "snippet_links": [{"key": "rules-and-procedures", "type": "definition", "offset": [24, 44]}, {"key": "processing-of-information", "type": "clause", "offset": [63, 88]}, {"key": "associated-services", "type": "clause", "offset": [93, 112]}], "hash": "c4b0364afc708450d4950c6f90858a8e", "id": 4}, {"size": 9, "snippet": "Givex will comply with the information security requirements set forth in this Exhibit E (the \u201cSecurity Policy\u201d). The Security Policy applies to Givex\u2019s performance under the GivexPay Merchant Agreement (the \u201cAgreement\u201d) and all access, collection, use, storage, transmission, disclosure, destruction or deletion of, and security incidents regarding, Merchant Information. This Security Policy does not limit other obligations of Givex, including under the Agreement or laws that apply to Givex, Givex\u2019s performance under the Agreement, the Merchant Information or the Permitted Purpose. To the extent this Security Policy directly conflicts with the Agreement, Givex will promptly notify Merchant of the conflict and will comply with the requirement that is more restrictive and more protective of Merchant Information.", "samples": [{"hash": "5vfpUSppeCZ", "uri": "/contracts/5vfpUSppeCZ#security-policy", "label": "Merchant Agreement", "score": 35.5834541321, "published": true}, {"hash": "4VkvosDgyNY", "uri": "/contracts/4VkvosDgyNY#security-policy", "label": "Merchant Agreement", "score": 35.5834541321, "published": true}, {"hash": "wBno453KrF", "uri": "/contracts/wBno453KrF#security-policy", "label": "Merchant Agreement", "score": 35.5808296204, "published": true}], "snippet_links": [{"key": "information-security-requirements", "type": "clause", "offset": [27, 60]}, {"key": "exhibit-e", "type": "definition", "offset": [79, 88]}, {"key": "the-security", "type": "clause", "offset": [114, 126]}, {"key": "applies-to", "type": "clause", "offset": [134, 144]}, {"key": "performance-under", "type": "clause", "offset": [153, 170]}, {"key": "merchant-agreement", "type": "definition", "offset": [184, 202]}, {"key": "all-access", "type": "clause", "offset": [225, 235]}, {"key": "deletion-of", "type": "clause", "offset": [304, 315]}, {"key": "security-incidents", "type": "clause", "offset": [321, 339]}, {"key": "merchant-information", "type": "definition", "offset": [351, 371]}, {"key": "obligations-of", "type": "clause", "offset": [415, 429]}, {"key": "agreement-or", "type": "definition", "offset": [457, 469]}, {"key": "the-merchant", "type": "definition", "offset": [537, 549]}, {"key": "permitted-purpose", "type": "definition", "offset": [569, 586]}, {"key": "to-the-extent", "type": "clause", "offset": [588, 601]}, {"key": "conflicts-with-the-agreement", "type": "clause", "offset": [632, 660]}, {"key": "promptly-notify", "type": "definition", "offset": [673, 688]}, {"key": "merchant-of", "type": "clause", "offset": [689, 700]}, {"key": "the-conflict", "type": "definition", "offset": [701, 713]}, {"key": "the-requirement", "type": "clause", "offset": [735, 750]}], "hash": "70f8ad8a0593876ecbe8acb5776e0a49", "id": 3}], "next_curs": "ClgSUmoVc35sYXdpbnNpZGVyY29udHJhY3RzcjQLEhZDbGF1c2VTbmlwcGV0R3JvdXBfdjU2IhhzZWN1cml0eS1wb2xpY3kjMDAwMDAwMGEMogECZW4YACAA", "clause": {"size": 291, "children": [["security-policies-and-exception-process", "Security Policies and Exception Process"], ["awareness-and-education-program", "Awareness and Education Program"], ["accountability", "Accountability"], ["security-policy-review", "Security Policy Review"], ["formal-security-policy", "Formal Security Policy"]], "parents": [["general", "General"], ["npc-security-services", "NPC Security Services"], ["entity-controls", "Entity Controls"], ["governing-law", "Governing Law"], ["general-terms", "General Terms"]], "title": "Security Policy", "id": "security-policy", "related": [["security-policies", "Security Policies", "Security Policies"], ["safety-policy", "Safety Policy", "Safety Policy"], ["security-plan", "Security Plan", "Security Plan"], ["security-program", "Security Program", "Security Program"], ["security-practices", "Security Practices", "Security Practices"]], "related_snippets": [], "updated": "2025-07-17T06:09:22+00:00", "also_ask": ["What minimum security standards should be mandated to ensure enforceability?", "How can the clause allocate liability for security breaches most effectively?", "What negotiation levers exist regarding audit rights and compliance verification?", "How does this policy compare to industry-specific regulatory requirements?", "What are the most common pitfalls that render security policies unenforceable in court?"], "drafting_tip": "Specify security standards, assign compliance responsibilities, and require regular audits to ensure clarity, accountability, and ongoing protection.", "explanation": "A Security Policy clause establishes the requirements and standards for protecting sensitive information and systems within an organization or between contracting parties. It typically outlines the necessary security measures, such as data encryption, access controls, and incident response protocols, that must be implemented to safeguard data and prevent unauthorized access. By clearly defining these expectations, the clause helps ensure compliance with legal and regulatory obligations, reduces the risk of data breaches, and provides a framework for managing security-related responsibilities."}, "json": true, "cursor": ""}}