Formal Security Policy Sample Clauses

Formal Security Policy. Policy documents that govern the protection of the data are the Indian Health Manual, Part 8, and the HHS Information Security Program Policy (see Addendum A).
AutoNDA by SimpleDocs
Formal Security Policy. Consistent with the requirement of this Document, Service Provider will create and provide to City an information security policy that is approved by Service Provider’s management, published and communicated and agreed to be adhered to by all Service Provider’s employees, contractors and affiliates. Security Policy Review. Service Provider will review the information security policy at planned intervals or if significant changes occur to ensure its continuing suitability, adequacy, and effectiveness and may revise such policy, from time to time. Changes resulting in a lower standard of security or service must be agreed to by PCMC prior to adoption.
Formal Security Policy. Policy documents that govern the protection of the data are covered by HUD OCIO's IT Security Policy Handbook and <Organization B's "YYY Policy>."
Formal Security Policy. Policy documents that govern the protection of the data are CBP (Customs) CIS HB 1400-05C and Department of Homeland (DHS) –4300A Sensitive Systems Policy.
Formal Security Policy. Consistent with the requirement of this Schedule E-1, Supplier will create and provide to Company an information security policy that is approved by Supplier’s management, published and communicated to all Supplier Personnel and relevant Providers.
Formal Security Policy. DLA Transaction Services policy documents that govern the protection of the data are Department of Defense Directive 8500.1, Information Assurance, Department of Defense Directive 8500.2, Information Assurance Implementation and NIST SP 800.53. CompanyName will be expected to comply with any applicable security bulletins released by the providers of their hardware, operating system and commercial software.
Formal Security Policy. Provider shall protect the confidentiality, integrity, availability and safety of the Institution data and systems, regardless of how its data is created, distributed or stored. Digital security controls will be tailored accordingly so that cost-effective controls can be applied commensurate with the risk and sensitivity of the data and system, in accordance with all statutory, regulatory and contractual obligations. Provider privacy and security policies and standards shall be available upon request in a consolidated document, the Information Security Program (ISP) that shall be: Endorsed by executive management;
AutoNDA by SimpleDocs
Formal Security Policy. Policies that govern the protection of the information/data for [VA Organization 1] include but are not limited to VA Directive and Handbook 6500 (or successors). Policies that govern the protection of the information/data for [Organization 2]'s include but are not limited to [Policy Name and Identifier]. All documents are available upon request.
Formal Security Policy. [Enter the titles of the formal security policy(ies) that govern each system. For example, "Information Systems Policy And Procedures, Number xxxx" for Organization A.]
Formal Security Policy. The formal security policy(ies) that govern the protection of each system are the {ETS Contractor} {Security Policy } dated {date of latest version} or later, in accordance with the GSA Security Policy, and the {Agency or governing agency } {Security Policy} dated {date of latest version} or later. Furthermore, both {ETS Contractor} and the {Agency} agree to comply with the E-Gov Travel {these are the ETS System ROB that have been approved by the PMO }“Rules of Behavior”.
Time is Money Join Law Insider Premium to draft better contracts faster.