Internal Security Sample Clauses

Internal Security. Vendors must attach to this document reasonable evidence that their system is secure from internal hacking and attacks. Describe the interactions vendor personal (or their representatives) will have directly with District data. How is uploaded data from the District handled and processed? Who has access to this data? What happens to the data after the upload is complete? What security safeguards are in place to protected unauthorized access to District data? How are backup performed and who has access to and custody of the backup media? How long are backup maintained; what happens to the District data once the backup is "expired"? If any data is printed, what happens to these hard copy records? Agree: Yes No
AutoNDA by SimpleDocs
Internal Security. It is expressly understood that the internal security of the Apartment shall always be the sole responsibility of the Purchaser(s).
Internal Security. Stifel will use technology such as computer “firewalls” and data encryption to prevent unauthorized access to your accounts via the Internet. However, you understand and agree that these security measures cannot provide absolute protection of information ac- cessed through the Internet. You acknowledge that by using www. xxxxxx.xxx, your access to your account information may be provided through the Internet by means of an unaffiliated Internet service provider chosen by you. Stifel shall use reasonable precautions to maintain the confidentiality of your account information, but because your account can be accessed through the Internet, you acknowledge and agree that there can be no assurance that your account information will remain secure.
Internal Security. The WPMC is responsible for the general security along the perimeter of the building and within the public areas of the WPMC. Should Organizers have special security requirements; these can be hired from the WPMC at an additional cost. The WPMC reserves the right to: • Request proof of identity and search anyone entering or leaving its premises. • Search any item or vehicle brought onto, or removed from, its premises.
Internal Security. There are only 2 team member at Pear Deck who can access this data and they will only do so for troubleshooting purposes with schools and teachers.
Internal Security. The WPMC is responsible for the general security along the perimeter of the building and within the public areas of the WPMC. Should Clients have special security requirements; these can be hired from the WPMC at an additional cost. The WPMC reserves the right to: • Request proof of identity and search anyone entering or leaving its premises. • Search any item or vehicle brought onto, or removed from, its premises. • Remove any article left unattended. All equipment, fittings and materials brought into the WPMC premises are subject to inspection by the WPMC’s security. It is the Client’s responsibility to ensure that their personnel are restricted to the relevant Event area. Entry to all other areas, including back-of-house, is strictly prohibited. The WPMC is not responsible for damage or loss of any merchandise, personal effects, equipment or articles brought onto its premises by the Client or any of its personnel or contractors.
Internal Security. Provide resources, programs and procedures to provide routine internal security for ROS vessels 24/7. Routine internal security involves responding to vessel alarms; maintaining operational shipboard equipment; and the prevention of unauthorized personnel from vessel entry. The vessel must be manned 24/7 by someone who can properly respond to a fire, security breach, or equipment failure. J4,3,105
AutoNDA by SimpleDocs
Internal Security. All secure data at rest is encrypted. We use https throughout our applications. District-uploaded data is handled through Clever. Transport Layer Security (TSL) protocol is employed, with authenticated API calls and Secure OAuth 2.0
Internal Security. Trained HMH personnel have access to the data which has been securely transmitted to the organization. For information on how uploaded data from the District is handled and processed, please see this video xxxx://xxxx.xxxxxxxxxx.xxx/services/player/bcpid3186031698001?bckey=AQ~~%2cAAAC5OpoGhE~%2cW9 HyF3F2n76lJzCmjTPl-kIkRCjebdoW&bctid=ref:da_userdata. Only authorized personnel have access to this data. Encryption is used to safeguard the data. Backups are GFS and databases are backed up nightly. All data is retained on-disk in AWS us-east-1 region (geographically).
Internal Security. The RoboBlockly Integrated Learning Environment does not require any uploaded data from the district, so no vendor personnel will have access to district data.
Time is Money Join Law Insider Premium to draft better contracts faster.