Security Policy and Procedures Sample Clauses

Security Policy and Procedures. Data Processor has adopted security policies and follows documented procedures for the Processing and protection of Personal Data. They are appropriately conveyed to relevant staff. Security Resources, Training and Organization Security Resource(s) Data Processor shall have a security-oriented team dedicated to ensuring the security of Data Processor’s assets and of Data Processor’s client services, including Personal Data, and to reacting to security vulnerabilities. Security Training Data Processor shall be responsible for verifying all members of the Data Processor team are trained in security practices, including cybersecurity. Evidence must be provided to Data Controller via artifacts upon request. Trustworthy Data Processors Data Processor agrees to perform background investigation of all team members to the maximum extent allowed by law, in compliance with all federal, state, provincial, local and national laws. Security of Premises
AutoNDA by SimpleDocs
Security Policy and Procedures. Processor must document a security policy with regard to the processing of personal data.
Security Policy and Procedures. Data Processor has adopted security policies and follows documented procedures for the processing and protection of Personal Data. They are appropriately conveyed to relevant staff.
Security Policy and Procedures. Contractor (Processor) must document a security policy regarding the processing of personal data.
Security Policy and Procedures. Data importer maintains a cybersecurity program that documents the policies, standards, and controls it uses that secure the information and resources related to the Services. The documentation includes organizational, administrative, technical, and physical safeguards and standards appropriate to the size and complexity, the scope of the activities, and the sensitivity of the Personal Data at issue
Security Policy and Procedures. ConnDOT has in effect a Security Policy that the Contractor must adhere to. The Contractor is responsible for being familiar with the policy and informing his employees of all security procedures, which must be strictly adhered to by all employees. Any violations created by the Contractor or his employees may subject the Contractor to assessment and/or cancellation of the contract. The State has the right to demand termination of any employee who has violated ConnDOT Security Regulations. Supervisory personnel shall include in their responsibilities overseeing that all entrances and exits in each area are secure during nightly operations and locking all doors and windows when leaving the premises.

Related to Security Policy and Procedures

  • Policy and Procedures If the resident leaves the facility due to hospitalization or a therapeutic leave, the facility shall not be obligated to hold the resident’s bed available until his or her return, unless prior arrangements have been made for a bed hold pursuant to the facility’s “Bed Reservation Policy and Procedure” and pursuant to applicable law. In the absence of a bed hold, the resident is not guaranteed readmission unless the resident is eligible for Medicaid and requires the services provided by the facility. However, the resident may be placed in any appropriate bed in a semi-private room in the facility at the time of his or her return from hospitalization or therapeutic leave provided a bed is available and the resident’s admission is appropriate and meets the readmission requirements of the facility.

  • Security Policies IBM maintains privacy and security policies that are communicated to IBM employees. IBM requires privacy and security training to personnel who support IBM data centers. We have an information security team. IBM security policies and standards are reviewed and re-evaluated annually. IBM security incidents are handled in accordance with a comprehensive incident response procedure.

  • Security Policy As part of PCI DSS, the Card Organizations require that you have a security policy that covers the security of credit card information.

  • Policy and Procedure Every employee has the right to work in an environment free of discrimination and harassment. This right includes the responsibility to eliminate harassment in our workplace, either as a participant or as an observer. This policy and procedure outlines the commitment of Chrysler Canada Inc. to ensure a harassment-free workplace as required under the Ontario Human Rights Code and will act as a guide to employees in adhering to legal and social guidelines regarding the recognition and prevention of harassment. This policy exists to underline the seriousness of workplace harassment and to establish that there is no acceptable level of harassment at Chrysler Canada Inc. Employees who feel that they are being harassed are encouraged to seek protection under this policy. Harassment, discrimination or solicitation, whether verbal, physical or environmental is not acceptable and will not be tolerated. (c05)

  • Safety Policy Each employer is required by law to have a safety policy and program. TIR will ask for and may require a copy of that policy and program.

  • Policies and Procedures i) The policies and procedures of the designated employer apply to the employee while working at both sites.

Time is Money Join Law Insider Premium to draft better contracts faster.