Workforce Security Sample Clauses

Workforce Security. 1.1.1. Data repositories containing Customers Data shall be maintained by Xxxxxx Authorized Personnel who have passed sufficient background investigations that revealed no occurrences of criminal convictions or fraud.
AutoNDA by SimpleDocs
Workforce Security. 8.100 Union Membership
Workforce Security. Workforce Screening Supplier will perform a thorough background check that will include, at a minimum, criminal check, credit report, employment verification, drug testing, workers compensation report, name/address verification for all employees requiring access to information systems that transmit, transact or store Customer’s PII and/or PHI. Background checks will include married name and maiden name where appropriate. Termination Procedure Supplier will terminate access to information systems that transmit, transact or store Customer’s PII and/or PHI immediately upon termination of individual employment. Authorization and Supervision Supplier will: (i) ensure that workforce members have appropriate access to PII and/or PHI following the principles of Minimum Necessary and Least Privilege and (ii) prevent workforce members who do not have access to PII and/or PHI from obtaining access to PII and/or PHI. CERTAIN CONFIDENTIAL INFORMATION CONTAINED IN THIS DOCUMENT, MARKED BY [*], HAS BEEN OMITTED BECAUSE IT IS NOT MATERIAL AND WOULD LIKELY CAUSE COMPETITIVE HARM TO AUGMEDIX, INC. IF PUBLICLY DISCLOSED. Information Access Management Access Authorization Supplier must implement policies and procedures for granting access to Customer’s PII and/or PHI. Supplier will provide secure role-based account management granting privileges utilizing the principle of least privilege. Supplier will monitor all user accounts with administrative level access to Operating Systems and databases transmitting, transacting or storing Customer’s PII and/or PHI. Supplier will restrict the ability to install software to only authorized technical support personnel. Access Establishment and Modification Supplier will implement policies and procedures to establish, document, review, and modify a user’s right to access systems that transmit, transact or store Customer’s PII and/or PHI.
Workforce Security. BUSINESS ASSOCIATE will implement policies and procedures to ensure that all members of its workforce have appropriate access to electronic PHI and to prevent those workforce members who do not have access from obtaining access to electronic PHI.
Workforce Security. 3.3.1 Authorization and/or Supervision of Employees 12
Workforce Security. Implement policies and procedures to ensure that Vendor workforce members have appropriate access to EPHI, and to prevent those workforce members without authorized access from obtaining it.
Workforce Security 
AutoNDA by SimpleDocs

Related to Workforce Security

  • Site Security While providing services at a DSHS location, the Contractor, its agents, employees, or Subcontractors shall conform in all respects with physical, fire, or other security regulations specific to the DSHS location.

  • Performance Security If our Tender is accepted, we commit to obtain a performance security in accordance with the Tendering document;

  • Personnel Security 6.1 Staff recruitment in accordance with government requirements for pre- employment checks;

  • JOB SECURITY 23.01 Subject to the willingness and capacity of individual employees to accept relocation and retraining, the Employer will make every reasonable effort to ensure that any reduction in the work force will be accomplished through attrition.

  • Network Security 10.1 Protection of Service and Property. Each Party shall exercise the same degree of care to prevent harm or damage to the other Party and any third parties, its employees, agents or End User Customers, or their property as it employs to protect its own personnel, End User Customers and property, etc.

  • Password Security You are responsible for maintaining adequate security and control of any and all User IDs, Passwords, hints, personal identification numbers (PINs), or any other codes that you use to access the Account. Do not discuss, compare, or share information about your account number or password unless you are willing to give them full use of your money. Any loss or compromise of the foregoing information and/or your personal information may result in unauthorized access to your Account by third-parties and the loss or theft of any funds held in your Account and any associated accounts, including your Account. Checks and electronic withdrawals are processed by automated methods, and anyone who obtains your account number or access device could use it to withdraw money from your account, with or without your permission. You are responsible for keeping your email address and telephone number up to date in order to receive any notices or alerts that we may send you. We assume no responsibility for any loss that you may sustain due to compromise of your account login credentials due to no fault of ours and/or your failure to follow or act on any notices or alerts that we may send to you. If you believe your Account information has been compromised, or that someone has transferred or may transfer money from your account without your permission, contact us immediately, through Synapse, at xxxx@xxxxxxxxx.xxx or call at +0(000) 000-0000. You agree to promptly review all Account and transaction records and other Communications that we make available to you and to promptly report any discrepancy to us.

  • E7 Security E7.1 The Authority shall be responsible for maintaining the security of the Authority’s Premises in accordance with its standard security requirements. The Contractor shall comply with all security requirements of the Authority while on the Authority’s Premises, and shall ensure that all Staff comply with such requirements.

  • Protection of Reputation During Executive’s employment with the Company and thereafter, Executive agrees that he will take no action which is intended, or would reasonably be expected, to harm the reputation of the Company or any of its affiliates or which would reasonably be expected to lead to unwanted or unfavorable publicity to the Company or its affiliates. Nothing herein shall prevent Executive from making any truthful statement in connection with any investigation by the Company or any governmental authority or in any legal proceeding.

  • STATE SECURITY 4.01 Nothing in this Agreement shall be construed as requiring the Employer to do or refrain from doing anything contrary to any instruction, direction or regulations given or made by or on behalf of the Government of Canada in the interest of the safety or security of Canada or any state allied or associated with Canada.

  • Cybersecurity; Data Protection The Company’s information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company has implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect its material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (“Personal Data”)) used in connection with its business, and there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same. The Company is presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification, except where the failure to be in compliance would not, individually or in the aggregate, have a Material Adverse Effect.

Time is Money Join Law Insider Premium to draft better contracts faster.