Technical Security Sample Clauses

Technical Security. The Microsoft Teams site is hosted by North East Scotland College and can only be accessed by named individuals who are designated as participants and/or site owners.
AutoNDA by SimpleDocs
Technical Security. Munters has adequate and sufficient anti-virus systems and firewalls in place.
Technical Security. 3.1 Firewalls and anti-virus The systems are protected by firewalls, anti-virus software has been installed on relevant servers and the systems are protected against malicious code execution, in accordance with current industry standards. 15.2
Technical Security. 1. The establishment of a method to communicate and/or push security patch updates for operating systems, software, and applications deployed in its environments. Critical patches and or updates must be deployed within thirty (30) days of release.
Technical Security.  I understand that after completing work at a computer that has access to the Heart IS application, I will logoff from the computer. If I have to leave a computer unattended, I will logoff or use a password protected screen saver to prevent unauthorized access to the system.  I understand and agree that I am responsible for maintaining the confidentiality of my Heart IS user ID and password, and that any misuse of my user ID and password, intentional or unintentional, violates PHC and Heart IS Policy and this Agreement and could subject me to disciplinary, legal and/or other actions, including suspension or revocation of my access to the Heart IS application by CSBC.  I will be accountable for any access to Information performed using my Heart IS user ID and password. I will not share these with anyone else under any conditions. I will inform the Heart IS Administrator at my hospital immediately upon loss of my password or suspected disclosure of my password to another person.  I will treat all electronically stored Heart IS personal and confidential Information as strictly confidential and will ensure that they are kept in a secure location and not subject to access by unauthorized persons. I will not store Heart IS confidential and personal identifiable Information on the hard drive of a home computer or other personal computing device.
Technical Security. In the event User Agency utilizes a computer system or network to store or transmit criminal justice information it shall implement or ensure implementation of the following technical security controls in order to safeguard criminal justice information received from DCIN:
Technical Security. (a) Requests for Personal Data and all responses shall be sent as an email attachment through the relevant secure networks: Police National Network (“PNN”), and email domains that follow the latest Government secure email policy.
AutoNDA by SimpleDocs
Technical Security a. System Configuration - The Data Importer is responsible for ensuring that the systems containing personal data provide a safe and reliable platform, which includes configuring systems and applications to "time out" and enter a locked state after a set period of user inactivity, using firewalls to secure the entry points to the network, protecting against viruses (e.g. installing virus protection software on all systems and reviewing such protection regularly) and securing emails. WPO Policy references include, without limitation:
Technical Security. DS Security Engineering Officers (SEOs) will include post Defense Component offices in routine technical security countermeasures (TSCM) inspections of controlled access areas at post, where the technical threat warrants such routine inspections. DOD is responsible for the costs of TSCM inspections of Defense Component offices at posts where DS has determined that the technical threat does not warrant more frequent inspections. The Defense Component Headquarters or the DOD Executive Agent may dispatch people and equipment to post to conduct technical security inspections and investigations of post Defense Component Offices. Such activities will be coordinated in advance with DS, the RSO and the DOD Executive Agent. All information obtained from such investigations will be shared with the RSO, the Defense Component Office at post, DS and the DOD Executive Agent and reported to them following the DCI Procedural Guide I-II-III.
Technical Security. DS Security Engineering Officers (SEOs) will include post DOC offices in routine technical security countermeasures (TSCM) inspections of controlled access areas at post, where the technical threat warrants such routine inspections.
Time is Money Join Law Insider Premium to draft better contracts faster.