Additional Security Controls Sample Clauses

Additional Security Controls. Google will make Additional Security Controls available to: (a) allow Customer to take steps to secure Customer Data; and (b) provide Customer with information about securing, accessing and using Customer Data.
Additional Security Controls. As an additional security control, Huawei validates the efficiency of the security measures of Service via periodical security tests by internal or independent third party as well as continues to upkeep the relevant security certificates.
Additional Security Controls. In addition to the Security Measures, IRIS Connect will make the Additional Security Controls available to: 10.8.1 Allow the Customer to take steps to secure Customer Data; and 10.8.2 Provide the Customer with information about securing, accessing and using Customer Data. 10.8.3 Additional Security Controls are outlined in the Security Measures and Controls Document
Additional Security Controls. Vendor will store and process Student Data in accordance with the industry best practices, which at a minimum shall be in accordance with the standards set forth in this Agreement, as may be amended in writing by the authorized representatives of the parties and with the approval of the Board’s General Counsel. This includes appropriate administrative, physical, and technical safeguards to secure Student Data from unauthorized access, disclosure, and use. All data must be secured in transit using secure FTP services or https/TLS 1.0+. Proposer is required to specify any personally identifiable information (PII) collected or used by their Products. In addition, Vendor must maintain industry recognized security practices to establish secure application(s), network, and infrastructure architectures. Industry certifications, such as International Organization for Standardization (ISO), SysTrust, Cloud Security Alliance (CSA) STAR Certification, or WebTrust security for SaaS environments are recommended. Such safeguards shall be no less rigorous than accepted industry practices, including specifically the NIST 800-53r4 moderate level, International Organization for Standardization’s standards ISO/IEC 27001:2005 (Information Security Management Systems – Requirements), and ISO-IEC 27002:2005 (Code of Practice for International Security Management). Vendor shall ensure that the manner in which Student Data is collected, accessed, used, stored, processed, disposed of and disclosed complies with applicable data protection and privacy laws, as well as the terms and conditions of this Agreement. Vendor will conduct periodic risk assessments and remediate any identified security vulnerabilities in a timely manner. Vendor will also have a written incident response plan, to include prompt notification of the Board in the event of a security or privacy incident, as well as best practices for responding to a breach of Student Data security practices. Vendor agrees to share its incident response plan upon request. Vendor shall assure that all data that is transmitted between the Board’s access points and the ultimate server, by Vendor or its recipients, will use Board-approved encryption of no less rigor than NIST-validated DES standards.
Additional Security Controls. Vendor will store and process Student Data in accordance with the industry best practices, which at a minimum shall be in accordance with the standards set forth in this Contract, as may be amended in writing by the authorized representatives of the parties and with the approval of the Board’s General Counsel. This includes appropriate administrative, physical, and technical safeguards to secure Student Data from unauthorized access, disclosure, and use. All data must be
Additional Security Controls. In addition to the Security Measures, Asana will make certain Additional Security Controls available to Customer (the “Additional Security Controls”), as described in Appendix
Additional Security Controls. In addition to the Security Measures, Enonic will make the Additional Security Controls available to: (a) allow Customer to take steps to secure Customer Data; and (b) provide Customer with information about securing, accessing and using Customer Data.
Additional Security Controls. In addition to the Security Measures, Google will make the Additional Security Controls available to: (a) allow Customer to take steps to secure Customer Data; and (b) provide Customer with information about securing, accessing and using Customer Data. ▪ 7.1.4. Google’s Security Assistance. Customer agrees that Google will (taking into account the nature of the processing of Customer Personal Data and the information available to Google) assist Customer in ensuring compliance with any of Customer’s obligations in respect of security of personal data and personal data breaches, including if applicable Customer’s obligations pursuant to Articles 32 to 34 (inclusive) of the GDPR, by: ▪ (a) implementing and maintaining the Security Measures in accordance with Section 7.1.1 (Google’s Security Measures); ▪ (b) making the Additional Security Controls available to Customer in accordance with Section 7.1.3 (Additional Security Controls); ▪ (c) complying with the terms of Section 7.2 (Data Incidents); and ▪ (d) providing Customer with the Security Documentation in accordance with Section 7.5.1 (Reviews of Security Documentation) and the information contained in the applicable Agreement including this Data Processing Amendment.
Additional Security Controls. Qwiklabs will make Additional Security Controls available to: (a) allow Customer to take steps to secure Customer Data; and (b) provide Customer with information about securing, accessing and using Customer Data.
Additional Security Controls. Actifio will make Additional Security Controls available to: (a) allow Customer to take steps to secure Customer Data; and (b) provide Customer with information about securing, accessing and using Customer Data.