SAFEGUARD STANDARD Sample Clauses

SAFEGUARD STANDARD. Contractor agrees to protect the security of Confidential Information according to all applicable laws and regulations by generally accepted information risk management security control frameworks, standards or guidelines such as the ISO/IEC 27000-series, NIST800-53, CIS Critical Security Controls for Effective Cyber Defense or HIPAA Security Rule – 45 CFR Part 160 and Subparts A and C of Part 164 and no less rigorously than it protects its own confidential information, but in no case less than reasonable care. Contractor will implement, maintain and use appropriate administrative, technical and physical security measures to preserve the confidentiality, integrity and availability of the Confidential Information. Contractor will ensure that all security measures are regularly reviewed including ongoing monitoring, monthly vulnerability testing and annual penetration and security incident response tests, revised, no less than annually, to address evolving threats and vulnerabilities while Contractor has responsibility for the Confidential Information under the terms of this Agreement.
AutoNDA by SimpleDocs
SAFEGUARD STANDARD. As required by TRINITY policy, ENTERTAINER/PERFORMER agrees that it will conduct local, state, and national criminal background checks and review of the national sex offender database, in addition to any other background checks required by applicable law and consistent with the duties and responsibilities associated with such individuals’ positions, locations of work and other possible factors, prior to allowing an employee to perform Services on campus or to have access to TRINITY’s Confidential Information, as determined by TRINITY, and will require the same of any subcontractors, agents, or consultants assigned to do work for TRINITY. ENTERTAINER/PERFORMER further agrees that all employees, subcontractors, agents, or consultants are obligated to observe covenants of confidentiality. A credit history report is also required for individuals who may be assigned to finance and accounting positions. Any individuals who have criminal or civil convictions may not be assigned to TRINITY without consultation with TRINITY in accordance with local, state, and federal law, including the Equal Employment Opportunity Commission’s Enforcement Guidance on the Consideration of Arrest and Conviction Records in Employment Decisions. Xxxxxxx reserves the right to not allow assignment to Trinity. Any individuals with civil convictions related to financial wrongdoing including, but not limited to, embezzlement, fraud, money laundering, theft or other acts indicating dishonesty may not be assigned to TRINITY if such assignment would involve access to financial information, private personal information, social security numbers, or other types of confidential or proprietary information as determined by TRINITY. Any individuals who have criminal convictions that suggest that they could pose a threat to the health and safety of children may not be assigned to TRINITY if such assignment would involve access to or interaction with children. For any individuals who will have access to residence halls or other secure areas a criminal background check is required. This group includes, but is not limited to residence hall assistants, supervisors and counselors; Physical Plant and janitorial staff; food services, concessions, and auxiliary services personnel. Any individuals who have a criminal history may not be assigned to TRINITY if such assignment would involve access to residence halls or secure areas. This check must also include a social security trace to ensure identity.
SAFEGUARD STANDARD. Supplier agrees to protect the privacy and security of Non-public Information according to all applicable laws and regulations, by commercially-acceptable standards, and no less rigorously than it protects its own confidential information, but in no case less than reasonable care. Supplier will implement, maintain and use appropriate administrative, technical and physical security measures to preserve the confidentiality, integrity and availability of the Non-public Information. All Protected Information stored on portable devices or media must be encrypted in accordance with the Federal Information Processing Standards (FIPS) Publication 140-2. Supplier will ensure that such security measures are regularly reviewed and revised to address evolving threats and vulnerabilities while Supplier has responsibility for the Non-public Information under the terms of this Appendix. Prior to agreeing to the terms of this Appendix, and periodically thereafter (no more frequently than annually) at UC’s request, Supplier will provide assurance, in the form of a third-party audit report or other documentation acceptable to UC, such as SOC2 Type II, demonstrating that appropriate information security safeguards and controls are in place.
SAFEGUARD STANDARD. Contractor agrees to protect the privacy and security of Protected Information according to all applicable laws and regulations, by commercially-acceptable standards, and no less rigorously than it protects its own confidential information, but in no case less than reasonable care. Contractor shall implement, maintain and use appropriate administrative, technical and physical security measures to preserve the confidentiality, integrity and availability of the Protected Information. All Protected Information that Customer backs up using the Software will be encrypted using 256-bit AES encryption as described in more detail on the Security Addendum. Contractor shall ensure that its security measures are regularly reviewed and revised to address evolving threats and vulnerabilities while Contractor has responsibility for the Protected Information under the terms of this Appendix. In addition, Contractor will ensure compliance with the requirements of ISO27001 and will ensure that its US data centers are SSAE-16 certified. Prior to execution of the Agreement, and periodically thereafter (no more frequently than annually) at the University's request, Contractor will provide assurance, in the form of a third party audit report or other documentation reasonably acceptable to the University, demonstrating that appropriate information security safeguards and controls are in place.
SAFEGUARD STANDARD. The CONTRACTOR agrees that it will protect the Covered Data and Information it receives from or on behalf of MINNESOTA STATE according to commercially acceptable standards and no less rigorously than it protects its own confidential information.
SAFEGUARD STANDARD. The Parties agree that they will protect the Covered Data and Information pursuant to the Agreement no less rigorously than they protects their own confidential information.
SAFEGUARD STANDARD. Receiving Party agrees that it will protect the Confidential Information that it receives from or on behalf of Arcadia according to commercially acceptable standards and no less rigorously than it protects its own confidential information.
AutoNDA by SimpleDocs
SAFEGUARD STANDARD. A. Contractor shall implement, maintain and use appropriate administrative, technical and physical security measures to preserve the confidentiality (authorized access), integrity and availability of the Protected or Private Information. While Contractor has responsibility for the Protected or Private Information under the terms of its contract or agreement, Contractor shall ensure that such security measures are regularly reviewed and revised to address evolving threats and vulnerabilities.
SAFEGUARD STANDARD. Vendor agrees to use reasonable care to protect the privacy and security of Confidential Information by commercially acceptable standards and no less rigorously than it protects its own confidential information. Vendor shall implement, maintain and use appropriate administrative, technical and physical security measures to preserve the confidentiality, integrity and availability of the Confidential Information. If Vendor stores Confidential Information on portable devices or media, such devices or media must be encrypted in accordance with the Federal Information Processing Standards (FIPS) Publication 140-2, as may be amended or superseded. Vendor shall ensure that security measures are regularly reviewed and revised to address evolving threats and vulnerabilities while Vendor has responsibility for the Confidential Information under the terms of this Agreement.
SAFEGUARD STANDARD. Service Provider agrees that it will protect the Covered Data and Information it receives from or on behalf of Middlebury according to commercially acceptable standards and no less rigorously than it protects its own confidential data and information of similar nature.
Time is Money Join Law Insider Premium to draft better contracts faster.