Information Security Sample Clauses

Information Security. IET information security management practices, policies and regulatory compliance requirements are aimed at assuring the confidentiality, integrity and availability of Customer information. The UC Xxxxx Cyber-safety Policy, UC Xxxxx Security Standards Policy (PPM Section 310-22), is adopted by the campus and IET to define the responsibilities and key practices for assuring the security of UC Xxxxx computing systems and electronic data.
AutoNDA by SimpleDocs
Information Security. 11.1 Supplier shall implement and maintain security measures to protect DXC Data, Services and Products in accordance with the Data Network Security Schedule ("DNSS") as set forth herein on the DXC Supplier Portal at: (xxxx://xxxxxx0.xxx.xxxxxxxxxx/contact_us/downloads/Data_Network_and_Secur ity_Schedule-DNSS.pdf). The DNSS forms part of the Agreement. Capitalized terms not specifically defined in this Agreement or in this section “Information Security”, shall have the meaning set forth in the DNSS.
Information Security. 10.1 The Transfer Agent shall maintain reasonable safeguards for maintaining in confidence any and all Fund Confidential Information, including, without limitation, the policies and procedures described in Section 10.2. The Transfer Agent shall not, at any time, use any such Fund Confidential Information for any purpose other than as specifically authorized by this Agreement, or in writing by the Fund.
Information Security. Without limiting Seller’s obligations elsewhere in this Order, Seller shall implement baseline security safeguards and controls that are no less rigorous than accepted industry practices, specifically those set forth in the latest published version of (i) National Institute of Standards and Technology Special Publication 800-53, or (ii) ISO/IEC 27001, in order to protect Buyer’s Confidential Information, any other data of Buyer or its personnel, and Xxxxx’s systems (all the foregoing referred to collectively as “Buyer’s Data and Systems”). Upon reasonable notice to Seller, Xxxxx shall have the right to review Seller’s policies, processes, controls, and results of internal and/or external reviews of processes and controls associated with Buyer’s Data and Systems (collectively, “Seller’s Processes and Controls”) prior to and during the performance of this Order, including immediately at any time after any security incident incurred by Seller that may impact Buyer’s Data and Systems. Upon discovery of any such security incident, Seller shall within twenty-four (24) hours inform Xxxxx of the incident and the nature of its impact on Buyer’s Data and Systems. Additionally, Buyer at its own expense shall be entitled to perform, or to have performed by an independent third-party, an on-site audit of Seller’s Processes and Controls. In lieu of an on-site audit, upon request by Xxxxx, Xxxxxx agrees to complete, within twenty (20) days of receipt, an audit questionnaire provided by Buyer regarding Seller’s information security program. Seller shall implement any required safeguards as identified by Buyer or information security program audits.
Information Security. The Transfer Agent has implemented and maintains at each service location physical and information security and data protection safeguards against the destruction, loss, theft, unauthorized access, unauthorized use, or alteration of the Fund’s Confidential Information, including Customer Information, in the possession of the Transfer Agent that will be no less rigorous than those in place at the Effective Date of this Agreement, and from time to time enhanced in accordance with changes in regulatory requirements. The Transfer Agent will, at a minimum, update its policies to remain compliant with applicable regulatory requirements, including those under the GLB Act and the Mass Privacy Act. The Transfer Agent will meet with the Fund, at its request, on an annual basis to discuss information security safeguards
Information Security. The Custodian has implemented information security controls and procedures reasonably designed to protect the information and data owned and/or used by the Custodian applicable to a Fund. Upon reasonable request, the Custodian shall discuss with senior management of the Funds such controls and procedures and/or provide a high-level presentation summarizing such controls and procedures.
Information Security. In order to provide sufficient protection for the confidentiality, integrity, and effective availability of information and resources and methods associated with it, the Contractor undertakes to comply with the requirements, details, and obligations with respect to information security described in the annex “Information Security Requirements & Technical and Organizational Measures for Data Protection” to the order.
AutoNDA by SimpleDocs
Information Security. Hitachi will comply with its global standards for information security, which will be provided to You at Your request.
Information Security. Security for all information technology (IT) systems employed in the performance of this award, including equipment and information, is the awardee’s responsibility. Within a time mutually agreed upon by the awardee and the cognizant NSF Program Officer, the awardee shall provide a written Summary of the policies, procedures and practices employed by the awardee as part of the awardee’s IT security program, in place or planned, to protect research and education activities in support of the award. The Summary shall describe the information security program appropriate for the project including, but not limited to: roles and responsibilities, risk assessment, technical safeguards, administrative safeguards, physical safeguards, policies and procedures, awareness and training and notification procedures in the event of a cyber-security breach. The Summary shall include the awardee’s evaluation criteria that will measure the successful implementation of the IT Security Program. In addition, the Summary shall address appropriate security measures required of all subrecipients, researchers and others who will have access to the systems employed in support of this award. The Summary will be the basis of a dialogue which NSF will have with the awardee, directly or through community meetings. Discussions will address several topics, such as, but not limited to, evolving security concerns and concomitant cyber-security policy and procedures within the Government and at the awardee, available education and training activities in cyber-security and coordination activities among NSF awardees.
Information Security. Except as would not reasonably be likely, either individually or in the aggregate, to have a Material Adverse Effect on the Company, to the knowledge of Company, since January 1, 2015, no third party has gained unauthorized access to any information technology networks controlled by and material to the operation of the business of the Company and its Subsidiaries.
Time is Money Join Law Insider Premium to draft better contracts faster.