# Information Security Terms & Conditions

## 1. Overview

This document defines the Information Security requirements that must be met by Consultants engaged to deliver Services to iMerit, Inc.

## 2. Definitions

* “iMerit” includes iMerit, Inc and all its subsidiaries.
* “Consultant” includes Consultant engaged to deliver Products to iMerit whether directly or through a Third-Party.
* “System” includes the hardware, software, and network infrastructure the Consultant uses and/or provides to create iMerit deliverables.
* “Equipment” includes hardware, software and network devices that form part of a system.

## All Consultant Personnel

The following requirements are required of the Consultant providing professional technology services to iMerit:

{% stepper %}
{% step %}

### Requirement

The Consultant adheres to local and international environmental, social, health & safety and business integrity laws and regulations in each jurisdiction in which it operates.
{% endstep %}

{% step %}

### Requirement

The Consultant reviews and acknowledges their understanding of and commitment to comply with iMerit Code of Conduct, Anti-harassment and Information Security Management System (ISMS) policies.
{% endstep %}

{% step %}

### Requirement

The Consultant takes steps to prevent unauthorized access to the facilities or information used to create iMerit deliverables.
{% endstep %}

{% step %}

### Requirement

Consultant uses only Systems in performing Services that conform to iMerit SOW requirements. Use of personal equipment must be pre-authorized in writing by iMerit.
{% endstep %}

{% step %}

### Requirement

The Consultant returns or securely destroys all proprietary and/or confidential information provided to the Consultant at completion of each SOW in accordance with iMerit’s policies for secure data deletion.
{% endstep %}
{% endstepper %}

## Consultant Working using iMerit Provided Equipment

All Consultant Personnel when working from Consultant facilities or home offices using iMerit provided equipment, Consultant shall:

{% stepper %}
{% step %}

### Acknowledge receipt

Acknowledge receipt of the equipment and Consultant’s personal and financial responsibilities regarding use and protection of that equipment.
{% endstep %}

{% step %}

### ISMS compliance

Adhere to iMerit’s ISMS policies and procedures pertaining to use of such equipment.
{% endstep %}

{% step %}

### Authorized use

Use the equipment for iMerit Inc. business related purposes only.
{% endstep %}

{% step %}

### Software licensing

Avoid installing any unauthorized copies of software and comply with software copyright infringement laws.
{% endstep %}

{% step %}

### Report changes

Promptly report and document any changes in the status of such equipment to their iMerit supervisor.
{% endstep %}

{% step %}

### Report theft

Report any theft of equipment to local police as well.
{% endstep %}

{% step %}

### Return equipment

Promptly return equipment at completion of services in accordance with iMerit’s instructions.
{% endstep %}
{% endstepper %}


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://imerit-docs.gitbook.io/scholars/imerit-policies/information-security-terms-and-conditions.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
