Security Practices Sample Clauses

Security Practices. Dell has implemented corporate information security practices and standards that are designed to safeguard the Dell’s corporate environment and to address: (1) information security; (2) system and asset management; (3) development; and (4) governance. These practices and standards are approved by the Dell CIO and undergo a formal review on an annual basis.
AutoNDA by SimpleDocs
Security Practices. The Provider that creates, receives, maintains, or transmits electronic protected health information in its role as a provider shall undertake the following acts regarding such information:
Security Practices. A. Protected data provided to the contractor will be stored: (include where and how) B. The security protections taken to ensure data will be protected that align with the NIST Cybersecurity Framework and industry best practices include:
Security Practices. IBM implements and maintains practices and procedures, which may be revised periodically, regarding the systems used to host and operate the IBM SaaS. These practices and procedures are designed to reduce the vulnerability of our systems to accidental loss, unlawful intrusions, unauthorized access, disclosure or alteration, or wrongful conduct that may interfere with, misappropriate, or otherwise damage the Content or Customer's use of the IBM SaaS. A description of the practices and procedures applicable to the IBM SaaS, including applicable technical and operational measures, is available to Customer upon request. Customer is responsible for determining whether these practices and procedures are appropriate to meet Customer's requirements. By using the IBM SaaS, Customer acknowledges its acceptance of the IBM practices and procedures and their adequacy for Customer's purposes. Except as specifically provided in the Security Practices for the IBM SaaS, IBM makes no representations or warranties regarding any security functions.
Security Practices. Confidential Data provided to Contractor by the School District will be stored physically in the Office of the SRO at the School District and/or electronically on the School District’s computer system. The measures that Contractor takes to protect Confidential Data will align with the NIST Cybersecurity Framework, including but not necessarily limited to, disk encryption, file encryption, firewalls, and password protection.
Security Practices. IBM maintains practices and procedures, which may be revised periodically, regarding the systems used to host and operate the IBM SaaS, which practices and procedures are designed to reduce the vulnerability of our systems to intrusions or wrongful conduct that may interfere with, misappropriate, or otherwise damage the Content or Customer's use of the IBM SaaS. A description of the practices and procedures applicable to the IBM SaaS, including applicable technical and operational measures, is available to Customer upon request. Customer is responsible for determining whether these practices and procedures are adequate to meet Customer's requirements. By using the IBM SaaS, Customer acknowledges its acceptance of the IBM practices and procedures and their adequacy for Customer's purposes. Except as specifically provided in the Security Practices for the IBM SaaS, IBM makes no representations or warranties regarding any security functions or that the IBM SaaS or Customer's content are secure from any intrusions or wrongful conduct.
Security Practices. Secureworks has implemented corporate information security practices and standards that are designed to safeguard the Secureworks’ corporate environment and to address: (1) information security; (2) system and asset management; (3) development; and (4) governance. These practices and standards are approved by the Secureworks CIO and undergo a formal review on an annual basis.
AutoNDA by SimpleDocs
Security Practices. Confidential Data provided to Contractor by the School District will be stored [insert location]. The measures that Contractor takes to protect Confidential Data will align with the NIST Cybersecurity Framework including, but not necessarily limited to, disk encryption, file encryption, firewalls, and password protection.
Security Practices. Arista has implemented corporate information security practices and standards that are designed to safeguard Arista’s corporate environment and to address business objectives across the following areas:
Security Practices. Confidential Data provided to Town by the School District will be stored in the Office of the Records Management Officer. The measures that Town takes to protect Confidential Data will align with the NIST Cybersecurity Framework including, but not necessarily limited to, disk encryption, file encryption, firewalls, and password protection.
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!