SYSTEMS AND PHYSICAL SECURITY Sample Clauses

SYSTEMS AND PHYSICAL SECURITY. You understand the importance of both systems and physical security to the daily operations of Cerner and to the protection of business information. You will, therefore, comply with and assist in the vigorous enforcement of all policies, practices, and procedures which may be developed to ensure the integrity of Cerner systems and facilities. Further, you understand that willful violation of such policies, practices, and procedures may result in termination of your employment.
AutoNDA by SimpleDocs
SYSTEMS AND PHYSICAL SECURITY. TSD Associate’s Initials 5 You understand the importance of both systems and physical security to the daily operations of Cerner and to the protection of business information. You will, therefore, comply with and assist in the vigorous enforcement of all policies, practices, and procedures which may be developed to ensure the integrity of Cerner systems and facilities. Further, you understand that willful violation of such policies, practices, and procedures may result in termination of your employment.

Related to SYSTEMS AND PHYSICAL SECURITY

  • Physical Security Contractor shall ensure that Medi-Cal PII is used and stored in an area that is physically safe from access by unauthorized persons during working hours and non- working hours. Contractor agrees to safeguard Medi-Cal PII from loss, theft or inadvertent disclosure and, therefore, agrees to:

  • Physical and Environmental Security DST shall: (i) restrict entry to DST’s area(s) where Fund Confidential Information is stored, accessed, or processed solely to DST’s personnel or DST authorized third party service providers for such access; and (ii) implement commercially reasonable practices for infrastructure systems, including fire extinguishing, cooling, and power, emergency systems and employee safety.

  • Physical Security of Media Transfer Agent shall implement controls, consistent with applicable prevailing industry practices and standards, that are designed to deter the unauthorized viewing, copying, alteration or removal of any media containing Fund Data. Removable media on which Fund Data is stored by Transfer Agent (including thumb drives, CDs, and DVDs, and PDAS) will be encrypted based on Transfer Agent encryption policies.

  • Personnel Security 6.1 Staff recruitment in accordance with government requirements for pre- employment checks;

  • Technical Security Controls 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.

  • ODUF Physical File Characteristics 6.2.1 The ODUF will be distributed to Dialtone & More via CONNECT:Direct or Secure File Transfer Protocol (FTP) or another mutually agreed medium. The ODUF feed will be a variable block format. The data on the ODUF feed will be in a non- compacted EMI format (175 byte format plus modules). It will be created on a daily basis Monday through Friday except holidays. Details such as dataset name and delivery schedule will be addressed during negotiations of the distribution medium. There will be a maximum of one dataset per workday per OCN.

  • Essential Security Nothing in this Chapter shall be construed to: (a) require a Party to furnish or allow access to any information, the disclosure of which determines to be contrary to its essential security interests; or (b) preclude a Party from applying measures that it considers necessary for the fulfillment of its obligations under United Nation Charter for the maintenance or restoration of international peace or security, or the protection of its own essential security interests (19).

  • Contractor Security Clearance Customers may designate certain duties and/or positions as positions of “special trust” because they involve special trust responsibilities, are located in sensitive locations, or have key capabilities with access to sensitive or confidential information. The designation of a special trust position or duties is at the sole discretion of the Customer. Contractor or Contractor’s employees and Staff who, in the performance of this Contract, will be assigned to work in positions determined by the Customer to be positions of special trust, may be required to submit to background screening and be approved by the Customer to work on this Contract.

  • System Security (a) If any party hereto is given access to the other party’s computer systems or software (collectively, the “Systems”) in connection with the Services, the party given access (the “Availed Party”) shall comply with all of the other party’s system security policies, procedures and requirements that have been provided to the Availed Party in advance and in writing (collectively, “Security Regulations”), and shall not tamper with, compromise or circumvent any security or audit measures employed by such other party. The Availed Party shall access and use only those Systems of the other party for which it has been granted the right to access and use.

  • Sleeping Rooms to be Blocked A. The Contractor shall block sleeping rooms as set forth in Table 1, below. Table 1: Dates Single Occupancy Total by Date Date1 60 60 Date4 60 60 Date 5 Check Out Check Out Total Rooms to be Blocked: 240 240

Time is Money Join Law Insider Premium to draft better contracts faster.