Security Practices Sample Clauses

Security Practices. A. Protected data provided to the contractor will be stored: (include where and how) B. The security protections taken to ensure data will be protected that align with the NIST Cybersecurity Framework and industry best practices include:
AutoNDA by SimpleDocs
Security Practices. The Provider that creates, receives, maintains, or transmits electronic protected health information in its role as a provider shall undertake the following acts regarding such information:
Security Practices. IBM implements and maintains practices and procedures, which may be revised periodically, regarding the systems used to host and operate the IBM SaaS. These practices and procedures are designed to reduce the vulnerability of our systems to accidental loss, unlawful intrusions, unauthorized access, disclosure or alteration, or wrongful conduct that may interfere with, misappropriate, or otherwise damage the Content or Customer's use of the IBM SaaS. A description of the practices and procedures applicable to the IBM SaaS, including applicable technical and operational measures, is available to Customer upon request. Customer is responsible for determining whether these practices and procedures are appropriate to meet Customer's requirements. By using the IBM SaaS, Customer acknowledges its acceptance of the IBM practices and procedures and their adequacy for Customer's purposes. Except as specifically provided in the Security Practices for the IBM SaaS, IBM makes no representations or warranties regarding any security functions.
Security Practices. IBM maintains practices and procedures, which may be revised periodically, regarding the systems used to host and operate the IBM SaaS, which practices and procedures are designed to reduce the vulnerability of our systems to intrusions or wrongful conduct that may interfere with, misappropriate, or otherwise damage the Content or Customer's use of the IBM SaaS. A description of the practices and procedures applicable to the IBM SaaS, including applicable technical and operational measures, is available to Customer upon request. Customer is responsible for determining whether these practices and procedures are adequate to meet Customer's requirements. By using the IBM SaaS, Customer acknowledges its acceptance of the IBM practices and procedures and their adequacy for Customer's purposes. Except as specifically provided in the Security Practices for the IBM SaaS, IBM makes no representations or warranties regarding any security functions or that the IBM SaaS or Customer's content are secure from any intrusions or wrongful conduct.
Security Practices. Dell has implemented corporate information security practices and standards that are designed to safeguard the Dell’s corporate environment and to address: (1) information security; (2) system and asset management;
Security Practices. Confidential Data provided to Contractor by the School District will be stored in the United States. The measures that Contractor takes to protect Confidential Data will align with the NIST Cybersecurity Framework, including but not necessarily limited to, disk encryption, file encryption, firewalls, and password protection.
Security Practices. Confidential Data provided to Contractor by the School District will be stored physically in the Office of the SRO at the School District and/or electronically on the School District’s computer system. The measures that Contractor takes to protect Confidential Data will align with the NIST Cybersecurity Framework, including but not necessarily limited to, disk encryption, file encryption, firewalls, and password protection.
AutoNDA by SimpleDocs
Security Practices. Arista has implemented corporate information security practices and standards that are designed to safeguard Arista’s corporate environment and to address business objectives across the following areas:
Security Practices a) Vendor’s creation, collection, receipt, access, use, storage, disposal and disclosure of any data related to Alaska Communications’ customers will comply with all applicable privacy and data protection Laws.
Security Practices. Tealium warrants that, having regard to the state of technological development and the cost of implementing any measures, it will: (a) take appropriate technical and organisational measures against the unauthorised or unlawful processing of Personal Data and against the accidental loss or destruction of, or damage to, Personal Data to ensure a level of security appropriate to: (i) the harm that might result from such unauthorised or unlawful processing or accidental loss, destruction or damage; and (ii) the nature of the data to be protected, and (b) take reasonable steps to ensure compliance with those measures. Tealium implements and maintains practices and procedures, which may be revised periodically, regarding the systems used to host and operate the Services. These practices and procedures are designed to reduce the vulnerability of Tealium's systems to accidental loss, unlawful intrusions, unauthorized access, disclosure or alteration or wrongful conduct that may interfere with, misappropriate, or otherwise damage the Services.
Time is Money Join Law Insider Premium to draft better contracts faster.