Information Security Policies and Practices Sample Clauses

Information Security Policies and Practices. The Contractor shall develop and implement, and throughout the Term maintain and follow, a comprehensive information security program (the "Information Security Program"), including information security polices and practices, in accordance with (i) the Technical Specification, and (ii) this Contract Section entitled "Information Security Policies and Practices" (collectively, "Information Security Policies and Practices"). Such Information Security Policies and Practices at a minimum shall include the following:
AutoNDA by SimpleDocs
Information Security Policies and Practices. The SI shall implement, and throughout the Term maintain and follow, a comprehensive information security program (the "Information Security Program") with respect to (a) SI employees, consultants, Subcontractors and others engaged or relied upon by the SI for purposes of the Project, and (b) those elements of the SI's systems (including hardware, software and data) that interact or exchange information with the NFPS (collectively, the "NFPS Security-Sensitive SI Resources"). The SI's Information Security Program shall comply with: (i) this Section 23.4 (Information Security Policies and Practices); (ii) Good Industry Practices; and (iii) the Technical Specifications (where applicable). The Information Security Program at a minimum shall include the following:

Related to Information Security Policies and Practices

  • Security Policies IBM maintains privacy and security policies that are communicated to IBM employees. IBM requires privacy and security training to personnel who support IBM data centers. We have an information security team. IBM security policies and standards are reviewed and re-evaluated annually. IBM security incidents are handled in accordance with a comprehensive incident response procedure.

  • SECURITY POLICIES AND NOTIFICATIONS State Security Policies and Procedures The Contractor and its personnel shall review and be familiar with all State security policies, procedures and directives currently existing or implemented during the term of the Contract, including ITS Policy NYS-P03-002 Information Security Policy (or successor policy). Security Incidents Contractor shall address any Security Incidents in the manner prescribed in ITS Policy NYS-P03-002 Information Security Policy (or successor policy), including the New York State Cyber Incident Reporting Procedures incorporated therein or in such successor policy.

  • Security Practices A. Protected data provided to the contractor will be stored: (include where and how) B. The security protections taken to ensure data will be protected that align with the NIST Cybersecurity Framework and industry best practices include:

  • Violence Policies and Procedures The Employer agrees to have in place explicit policies and procedures to deal with violence. The policy will address the prevention of violence, the management of violent situations, provision of legal counsel and support to employees who have faced violence. The policies and procedures shall be part of the employee's health and safety policy and written copies shall be provided to each employee. Prior to implementing any changes to these policies, the employer agrees to consult with the Association.

  • Privacy Policies Each party will make available a Privacy Policy that complies with Law. Xxxxxx’s Privacy Policy explains how and for what purposes Stripe collects, uses, retains, discloses and safeguards the Personal Data you provide to Stripe.

  • Security Policy As part of PCI DSS, the Card Organizations require that you have a security policy that covers the security of credit card information.

  • CONFIDENTIALITY AND PRIVACY POLICIES AND LAWS The Contractor shall comply to the extent applicable with all State and Authorized User policies regarding compliance with various confidentiality and privacy laws, rules and regulations, including but not limited to the IRS Publication 1075, Family Educational Rights and Privacy Act (FERPA), the Health Insurance and Portability Act of 1996 (HIPAA) and the Health Information Technology for Economic and Clinical Health Act (HITECH). Contractor shall cooperate in executing a written confidentiality agreement under FERPA and/or a Business Associate Agreement (HIPAA/HITECH) or other contractual provisions upon request by the State or any Authorized User.

  • Policies and Procedures i) The policies and procedures of the designated employer apply to the employee while working at both sites.

  • Provisions for Covered Entity to Inform Business Associate of Privacy Practices and Restrictions (a) Covered Entity shall notify Business Associate of any limitation(s) in the notice of privacy practices of Covered Entity under 45 CFR 164.520, to the extent that such limitation may affect Business Associate’s use or disclosure of protected health information.

  • Security Policy for Contractors 1. The Department for Work and Pensions treats its information as a valuable asset and considers that it is essential that information must be protected, together with the systems, equipment and processes which support its use. These information assets may include data, text, drawings, diagrams, images or sounds in electronic, magnetic, optical or tangible media, together with any Personal Data for which the Department for Work and Pensions is the Data Controller.

Time is Money Join Law Insider Premium to draft better contracts faster.