Information Security Controls Sample Clauses
Information Security Controls. Agent has established and during the Term will maintain an Information Security Standard aligned with industry practice (such as the International Organization for Standardization’s standards: ISO/IEC 2700 I: 201 3). Information security responsibilities are defined in the Information Security Standard and the Information Security Policy is reviewed on a periodic basis and approved by senior management.
Information Security Controls. DOCUMENT means the security requirements documents to be prepared by IBM and approved by SCA pursuant to the Transition Plan.
Information Security Controls. Without limiting any other provisions of the Agreement, Supplier must comply with Client's reasonable requirements from time to time in relation to:
(a) appropriate Information Security Controls to protect Client Material and New Material;
(b) mechanisms for detecting, responding to, remediating, and the notification of Data Security Incidents; and
(c) assurance, testing, evaluations, reviews and audits of the Information Security Controls and mechanisms referred to in this clause 7.
Information Security Controls. On any of Company’s systems that interface with Moloco’s infrastructure or systems, Company is solely responsible for maintaining appropriate information security safeguards (including, without limitation, firewalls, anti-virus software, intrusion detection software, etc.) to protect those systems against unauthorized access, use or interference. Moloco shall have no liability for failures of Company’s systems or loss or unauthorized access to or use of data stored on Company’s systems that result from Company’s failure to comply with this section.
Information Security Controls. Each Party shall be responsible for establishing and maintaining the information security program that includes appropriate technical and organizational measures to (i) ensure the security and confidentiality of Partner Data; (ii) protect against unauthorized access, alteration, destruction, disclosure, loss, or use of Partner Data that could result in substantial harm to Partner or any of its customers and/or End-Users; (iii) protect against any anticipated threats or hazards to the security or integrity of Partner Data. Parties acknowledge that Partner remains ultimately responsible for maintaining information security of its systems, equipment (including but not limited to servers, workstations, routers, switches), network, data communication lines, as required to operate the Platform or use the Services.
Information Security Controls
