Asset Classification and Control Sample Clauses

The Asset Classification and Control clause establishes procedures for identifying, categorizing, and managing an organization's assets to ensure their appropriate protection. It typically requires organizations to inventory assets such as hardware, software, data, and intellectual property, assign them to specific categories based on sensitivity or value, and implement controls tailored to each classification. This clause is essential for ensuring that valuable or sensitive assets receive the right level of security, thereby reducing the risk of loss, unauthorized access, or misuse.
Asset Classification and Control. Dell’s practice is to track and manage physical and logical assets. Examples of the assets that Dell IT might track include: • Information Assets, such as identified databases, disaster recovery plans, business continuity plans, data classification, archived information. • Software Assets, such as identified applications and system software. • Physical Assets, such as identified servers, desktops/laptops, backup/archival tapes, printers and communications equipment. The assets are classified based on business criticality to determine confidentiality requirements. Industry guidance for handling personal data provides the framework for technical, organizational and physical safeguards. These may include controls such as access management, encryption, logging and monitoring, and data destruction.
Asset Classification and Control. 3.1. LIT’s practice is to track and manage physical and logical assets. Examples of the assets that LIT IT might track include: 3.1.1. Information Assets, such as identified databases, disaster recovery plans, business continuity plans, data classification, archived information; 3.1.2. Software Assets, such as identified applications and system software; 3.1.3. Physical Assets, such as identified servers, desktops/laptops, backup/archival tapes, printers and communications equipment. 3.2. The assets are classified based on business criticality to determine confidentiality requirements. Industry guidance for handling personal information provides the framework for technical, organizational and physical safeguards. These may include controls such as access management, end point detection and response, document classification and labelling, data loss prevention, encryption, security incident event monitoring and logging, and data destruction.
Asset Classification and Control. Provider’s practice is to track and manage physical and logical assets. Examples of the assets that Provider IT might track include: • Information Assets, such as identified databases, disaster recovery plans, business continuity plans, data classification, archived information. • Software Assets, such as identified applications and system software. • Physical Assets, such as identified servers, desktops/laptops, backup/archival tapes, printers and communications equipment. The assets are classified based on business criticality to determine confidentiality requirements. Industry guidance for handling personal data provides the framework for technical, organizational and physical safeguards. These may include controls such as access management, encryption, logging and monitoring, and data destruction.
Asset Classification and Control. Secureworks’ practice is to track and manage physical and logical assets. Examples of the assets that Secureworks IT might track include: • Information Assets, such as identified databases, disaster recovery plans, business continuity plans, data classification, archived information; • Software Assets, such as identified applications and system software; • Physical Assets, such as identified servers, desktops/laptops, backup/archival tapes, printers and communications equipment. The assets are classified based on business criticality to determine confidentiality requirements. Industry guidance for handling personal data provides the framework for technical, organizational and physical safeguards. These may include controls such as access management, encryption, logging and monitoring, and data destruction.
Asset Classification and Control. Oracle provides guidelines for all Oracle personnel regarding information classification schemes and minimum handling requirements associated with those classifications in order to provide protection for Oracle and customer information assets. Oracle has defined three classes of confidential information – Internal, Restricted, and Highly Restricted – with each classification requiring corresponding levels of security controls (e.g., encryption requirements for data classified as Restricted or Highly Restricted). Customer data is classified as among Oracle's top two categories of confidential information, which have associated limits on access, distribution and handling. Oracle keeps the information confidential in accordance with the terms of customer’s order.
Asset Classification and Control. Secureworks’ practice is to track and manage physical and logical assets. Examples of the assets that Secureworks IT might track include:  Information Assets, such as identified databases, disaster recovery plans, business continuity plans, data classification, archived information.  Software Assets, such as identified applications and system software.  Physical Assets, such as identified servers, desktops/laptops, backup/archival tapes, printers and communications equipment. The assets are classified based on business criticality to determine confidentiality requirements. Industry guidance for handling personal data provides the framework for technical, organizational and physical safeguards. These may include controls such as access management, encryption, logging and monitoring, and data destruction. As part of the employment process, employees undergo a screening process applicable per regional law. Secureworks’ annual compliance training includes a requirement for employees to complete an online course and pass an assessment covering information security and data privacy. The security awareness program may also provide materials specific to certain job functions.
Asset Classification and Control. TCM’s practice is to track and manage physical and logical assets. Examples of the assets that TCM IT might track include: - Information Assets, such as identified databases, network resiliency and redundancy architecture, data classification, archived information. - Software Assets, such as identified applications and system software. - Physical Assets, such as identified servers, desktops/laptops, backup/archival tapes, printers and communications equipment. The assets are classified based on business criticality to determine confidentiality requirements. Technical, organizational and physical safeguards may include controls such as access management, encryption and monitoring.
Asset Classification and Control. Data importer’s practice is to track and manage physical and logical assets. Examples of the assets that data importer IT might track include: • Information assets, such as identified databases, disaster recovery plans, business continuity plans, data classification, archived information. • Software assets, such as identified applications and system software. • Physical assets, such as identified servers, desktops/laptops, backup/archival tapes, printers and communications equipment. The assets are classified based on business criticality to determine confidentiality requirements. Industry guidance for handling personal data provides the framework for technical, organizational and physical safeguards. These may include controls such as access management, encryption, logging and monitoring, and data destruction.
Asset Classification and Control. 4.1 Responsibility, Inventory, and Ownership of Assets Overarching controls related to assets are addressed by the Oracle Information Protection Policy, the Oracle Desktop and Laptop Security Policy, the Oracle Information Systems Inventory Policy, and the Oracle Acceptable Use Policy for Company Resources. All information assets have an owner who is responsible for the protection and inventory of assets based on the sensitivity and value of information. If ownership has not been assigned, it will default to the administrators of the application or system. This includes maintenance of operations guides and other documentation describing the environments.
Asset Classification and Control. 4.1 Responsibility, Inventory, and Ownership of Assets