Security Roles and Responsibilities Sample Clauses

Security Roles and Responsibilities. The Contractor’s personnel with access to personnel data are subject to confidentiality obligations.
AutoNDA by SimpleDocs
Security Roles and Responsibilities. Cisco shall define and allocate information security re- sponsibilities in accordance with Cisco’s approved policies for information security. Such poli- cies (or summaries thereof) shall be published and communicated to employees and relevant external parties required to comply with such policies.
Security Roles and Responsibilities. Microsoft personnel with access to Customer Data are subject to confidentiality obligations.
Security Roles and Responsibilities. The Data Importer has appointed Xxxxx Xxxxxx as the security officer responsible for coordinating and monitoring the security rules and procedures.
Security Roles and Responsibilities. Acuity personnel with access to Customer Data are subject to confidentiality obligations.
Security Roles and Responsibilities. 13.1 Roles and responsibilities for information security have been formally assigned, with reporting lines that ensure the independence of the function.
Security Roles and Responsibilities. All Mirantis personnel with access to User Content are subject to confidentiality obligations and regular security trainings.
AutoNDA by SimpleDocs
Security Roles and Responsibilities. Security Roles and Responsibilities ACS Symetra
Security Roles and Responsibilities. Supplier shall define and allocate information security responsibilities in accordance with Supplier’s approved policies for information security. Such policies (or summaries thereof) shall be published and communicated to Representatives re- quired to comply with such policies.
Security Roles and Responsibilities. SkyKick staff with access to Personal Data are subject to confidentiality obligations. Risk Management Program. SkyKick performed a risk assessment before processing Personal Data through their Services and retains related documents pursuant to applicable retention requirements. Asset Management Asset Inventory. SkyKick maintains an inventory of all media on which Personal Data is stored. Access to the inventories of such media is restricted to SkyKick employees authorized to have such access. Asset Handling SkyKick classifies Personal Data to help identify it and to allow for access to it to be appropriately restricted. SkyKick imposes restrictions on printing Personal Data and has procedures for disposing of printed materials that contain Customer Data. SkyKick staff must obtain SkyKick authorization prior to storing Personal Data on portable devices, remotely accessing Customer Data, or processing Personal Data outside SkyKick’s facilities. Human Resources Security Security Training. SkyKick informs its staff about relevant security procedures and their respective roles. SkyKick also informs its staff of possible consequences of breaching the security rules and procedures. SkyKick will only use anonymous data in training. Physical and Environmental Security Physical Access to Facilities. SkyKick limits access to facilities where information systems that process Personal Data are located to identified authorized staff members. Physical Access to Components. Where applicable, SkyKick maintains records of the incoming and outgoing media containing Customer Data, including the kind of media, the authorized sender/recipients, date and time, the number of media and the types of Personal Data they contain.
Time is Money Join Law Insider Premium to draft better contracts faster.