Our Security Practices Sample Clauses

Our Security Practices. We implement and follow an enterprise security program, with the policies, plans, and procedures set forth here xxx.xxxxxx.xxx/xxxx-xxxx-xxx. Our Personnel will be subject to the data protection and confidentiality obligations set forth in these General Terms with respect to any of your data that we may have access to in connection with the C&I Services.
AutoNDA by SimpleDocs
Our Security Practices. We maintain a security program that is designed to protect the security, privacy, confidentiality and integrity of the student personal information that is submitted to our Site, including by using SSL and secure firewalls and storing our data in highly secure AWS data centers. We collect only limited amounts of personal information and our limited use of outside services helps to secure against unintended transfer of personal information. Although we take great measures to ensure the security of the personal information entrusted to us, no company can guarantee that there will never be a security breach. However, if there ever is such a security breach, we will do everything we can to protect your personal information. Should a breach occur, DBQ will work with the school to notify parents of all affected student users. DBQ’s response to a breach is fully detailed in its Data Breach Policy. Modifications to This Privacy Policy DBQ may make changes to this policy from time to time. Any changes to our privacy policy will be posted on the Site so that you are always aware of what information we collect and how we use it. We encourage you to review this privacy policy on a regular basis so you can see any changes that we make. Any changes become effective immediately once we notify you by posting the new policy. Because we take student data protection very seriously, no material changes to the collection, use and sharing of student data will be made without the school agreeing to it in writing. We Comply With State and Federal Laws DBQ takes the privacy of student data very seriously. It is DBQ’s policy to comply with all applicable state and federal laws, including the Children’s Online Privacy Protection Act (COPPA). We work in partnership with our schools and our parents to ensure that any consent provisions that may be applicable are met and our hope is that schools will diligently safeguard the personal information of each student having access to DBQ Online and will not post or otherwise communicate personal information of students on the DBQ Online.

Related to Our Security Practices

  • Security Practices A. Protected data provided to the contractor will be stored: (include where and how) B. The security protections taken to ensure data will be protected that align with the NIST Cybersecurity Framework and industry best practices include:

  • SAFETY PRACTICES (a) The employer will take reasonable measures to prevent and eliminate any present or potential job hazards which the employees may encounter at their places of work.

  • Safety and Security Procedures Contractor shall maintain and enforce, at the Contractor Work Locations, industry-standard safety and physical security policies and procedures. While at each Court Work Location, Contractor shall comply with the safety and security policies and procedures in effect at such Court Work Location.

  • Pay Practices The Employer recognizes the importance of regularity in pay practices and to the greatest extent possible the Employer will not alter the payment routines. Nurses will be notified in writing by the Employer not less than sixty (60) days in advance of a change to the pay practices.

  • Data Practices The Parties acknowledge that this Agreement is subject to the requirements of Minnesota’s Government Data Practices Act, Minnesota Statutes, Section 13.01

  • Security Protocols Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.

  • Security Program Contractor will develop and implement an effective security program for the Project Site, which program shall require the Contractor and subcontractors to take measures for the protection of their tools, materials, equipment, and structures. As between Contractor and Owner, Contractor shall be solely responsible for security against theft of and damage of all tools and equipment of every kind and nature and used in connection with the Work, regardless of by whom owned.

  • Security Policies IBM maintains privacy and security policies that are communicated to IBM employees. IBM requires privacy and security training to personnel who support IBM data centers. We have an information security team. IBM security policies and standards are reviewed and re-evaluated annually. IBM security incidents are handled in accordance with a comprehensive incident response procedure.

  • Security Procedures The Fund shall comply with data access operating standards and procedures and with user identification or other password control requirements and other security procedures as may be issued from time to time by State Street for use of the System on a remote basis and to access the Data Access Services. The Fund shall have access only to the Fund Data and authorized transactions agreed upon from time to time by State Street and, upon notice from State Street, the Fund shall discontinue remote use of the System and access to Data Access Services for any security reasons cited by State Street; provided, that, in such event, State Street shall, for a period not less than 180 days (or such other shorter period specified by the Fund) after such discontinuance, assume responsibility to provide accounting services under the terms of the Custodian Agreement.

  • Notice of Privacy Practices Business Associate shall abide by the limitations of Covered Entity’s Notice of which it has knowledge. Any use or disclosure permitted by this Agreement may be amended by changes to Covered Entity’s Notice; provided, however, that the amended Notice shall not affect permitted uses and disclosures on which Business Associate relied prior to receiving notice of such amended Notice.

Time is Money Join Law Insider Premium to draft better contracts faster.