Technology Security Sample Clauses

Technology Security. MinnState shall be solely responsible for all MinnState Systems, and CONTRACTOR shall be responsible for all non-MinnState Systems, including taking the necessary security and privacy protections as are reasonable under the circumstances. Reasonable security and privacy protections shall include, but not be limited to, network firewall protection, anti-virus software and the ability to maintain regular patching levels of software. Each party shall use commercially reasonable procedures to check for commonly known viruses and to check the integrity of data before sending information electronically to the other party, but each party recognizes that such procedures cannot be a guarantee that transmissions will be virus free. Each party agrees that the receiving party shall be responsible for carrying out virus checks on any attachments before opening any electronic files whether received on disk or otherwise.
AutoNDA by SimpleDocs
Technology Security a. You are responsible for the security of your password, and should take all reasonable precautions to prevent others from being able to use your password. Under no circumstances should you give your password to another person.
Technology Security. The Company shall cause SB Oils to appoint a technology officer (recommended by Solazyme, Inc.) at SB Oils who shall, in consultation with Solazyme, Inc. and Bunge Brazil (subject to the consent of Bunge Brazil and Solazyme, Inc.), determine, establish, implement and audit appropriate security procedures regarding Technology used or developed by the JV Companies, including (i) rules regarding visitation to SB Oils’ facilities, (ii) confidentiality documentation requirements and (iii) Technology access procedures and policies, including regarding the transfer of Microbes used or developed by or on behalf of the JV Companies.
Technology Security. The District will comply fully with all County information technology security policies, which are detailed in Countywide Policies 1400-1, 1400-2, 1400-3, 1400-4, 1400-5, 1400-6, 1400-7, and 1400-8, and any other information technology policies that may be adopted during the term of this Agreement. If County policies conflict with District policies, the Parties shall meet and confer pursuant to section 23, and if the conflict cannot be resolved, then either Party may terminate the Agreement in accordance with section 8. The District shall hold the County harmless from any loss or damage resulting from the violation of such security procedures or policies by the District, its officers, agents, employees, and subcontractors.

Related to Technology Security

  • Internet Security The Service utilizes a comprehensive security strategy to protect your accounts and transactions conducted over the Internet. Prior to activating your access to the Service, our Internet Banking Department will verify your identity and authorization against information associated with the Eligible Account (s) that you request to be linked to the Service. Access IDs and Passcodes - One of the main security features protecting the Service is the unique combination of your Access Identification Code (Access ID) and Passcode. During the enrollment process, you will be asked to select a unique Access ID, and then choose a Passcode that will be used to gain access to the Service. You determine your own Passcode, which is encrypted in our database. Neither this Institution nor its Service Providers have access to this information. The Service will automatically deactivate your account after three unsuccessful login attempts within a 24-hour time frame. You may reset your passcode online or you may contact this Institution for assistance. Because your Passcode is used to access your accounts, you should treat it as you would any other sensitive personal data. • You should carefully select a Passcode that is hard to guess. • You should not use words based on your name, address or other personal information. • Special characters may be used to increase security. • Do NOT use dictionary words. The “Help” link within the Service will offer tips on choosing a secure Passcode that you can remember. • Keep your Passcode safe. • Memorize your Passcode and do NOT write it down. • You should also change your Passcode occasionally, such as every 90 days. • A Passcode should be changed immediately if you suspect that your Passcode has been compromised. This can be done at any time from the “User Services” menu after you log on to the Service. NEITHER THIS INSTITUTION NOR ITS SERVICE PROVIDERS WILL CONTACT YOU VIA TELEPHONE OR EMAIL REQUESTING PERSONAL INFORMATION, YOUR ACCESS ID, OR YOUR PASSCODE. IF YOU ARE CONTACTED BY ANYONE REQUESTING THIS INFORMATION, PLEASE CONTACT US IMMEDIATELY.

  • Password Security You are responsible for maintaining adequate security and control of any and all User IDs, Passwords, hints, personal identification numbers (PINs), or any other codes that you use to access the Account. Do not discuss, compare, or share information about your account number or password unless you are willing to give them full use of your money. Any loss or compromise of the foregoing information and/or your personal information may result in unauthorized access to your Account by third-parties and the loss or theft of any funds held in your Account and any associated accounts, including your Account. Checks and electronic withdrawals are processed by automated methods, and anyone who obtains your account number or access device could use it to withdraw money from your account, with or without your permission. You are responsible for keeping your email address and telephone number up to date in order to receive any notices or alerts that we may send you. We assume no responsibility for any loss that you may sustain due to compromise of your account login credentials due to no fault of ours and/or your failure to follow or act on any notices or alerts that we may send to you. If you believe your Account information has been compromised, or that someone has transferred or may transfer money from your account without your permission, contact us immediately, through Synapse, at xxxx@xxxxxxxxx.xxx or call at +0(000) 000-0000. You agree to promptly review all Account and transaction records and other Communications that we make available to you and to promptly report any discrepancy to us.

  • Airport Security The Contractor shall be familiar with and conduct its operations in accordance with all regulations and directives of the Authority and the Transportation Security Administration, and any other federal, state or local government having jurisdiction over the airport, with respect to the maintenance of airport security.

  • Information Security IET information security management practices, policies and regulatory compliance requirements are aimed at assuring the confidentiality, integrity and availability of Customer information. The UC Xxxxx Cyber-safety Policy, UC Xxxxx Security Standards Policy (PPM Section 310-22), is adopted by the campus and IET to define the responsibilities and key practices for assuring the security of UC Xxxxx computing systems and electronic data.

  • E7 Security E7.1 The Authority shall be responsible for maintaining the security of the Authority’s Premises in accordance with its standard security requirements. The Contractor shall comply with all security requirements of the Authority while on the Authority’s Premises, and shall ensure that all Staff comply with such requirements.

  • Safety; Security Contractor’s failure to comply with any of the requirements in this Section shall be cause for termination.

  • Personnel Security 6.1 Staff recruitment in accordance with government requirements for pre- employment checks;

  • Data and Security If Contractor is granted access to Court Data, Confidential Information or Court Work Locations in the performance of the Work;

  • JOB SECURITY 23.01 Subject to the willingness and capacity of individual employees to accept relocation and retraining, the Employer will make every reasonable effort to ensure that any reduction in the work force will be accomplished through attrition.

  • Network Security 10.1 Protection of Service and Property. Each Party shall exercise the same degree of care to prevent harm or damage to the other Party and any third parties, its employees, agents or End User Customers, or their property as it employs to protect its own personnel, End User Customers and property, etc.

Time is Money Join Law Insider Premium to draft better contracts faster.