Information Security Management Program Sample Clauses

Information Security Management Program. Sumo Logic will maintain throughout the Term of the Agreement an information security management program (the “ISMP”) designed to protect and secure Your Data from unauthorized access or use. The ISMP will be documented and updated based on changes in applicable legal and regulatory requirements related to privacy and data security practices and industry standards.
AutoNDA by SimpleDocs
Information Security Management Program. 2.1. Supplier shall have an Information Security Management Program ("ISMP") that addresses the overall Security Program of Supplier. The ISMP shall be formally documented, and such records shall be protected, controlled, and retained according to federal, state, and internal requirements.
Information Security Management Program. “ISMP”) Okta maintains a comprehensive information security management program that contains administrative, technical, and physical safeguards that are appropriate to (a) the size, scope and type of Okta’s business; (b) the amount of resources available to Okta; (c) the type of information that Okta will store and process; and (d) the need for security and protection from unauthorized disclosure of such Customer Data. The ISMP is documented and updated based on changes in legal and regulatory requirements related to privacy and data security practices and industry standards applicable to the Service. Okta’s ISMP is designed to: • Protect the integrity, availability, and prevent the unauthorized disclosure by Okta or its agents, of Customer Data in Okta’s possession or control; • Protect against any anticipated threats or hazards to the integrity, and availability, and prevention of unauthorized disclosure of Customer Data by Okta or its agents; • Protect against unauthorized access, use, alteration, or destruction of Customer Data; • Protect against accidental loss or destruction of, or damage to, Customer Data; and • Safeguard information as set forth in any local, state or federal regulations by which Okta may be regulated.
Information Security Management Program. Kronos shall maintain a documented, approved and implemented information security management program in accordance with generally accepted industry standard practices that include reasonable administrative, technical, and physical safeguards to protect assets and Customer Data from loss, misuse, unauthorized access, disclosure, alteration, and destruction. The information security management program will address the following areas: risk management, security policy, organization of information security, human resources security, asset management, access control, cryptography, physical and environmental security, operations security, communications security, system acquisition, development, and maintenance, supplier management, information security incident management, information security aspects of business continuity management, and compliance.
Information Security Management Program. Ultimate Software shall maintain a documented, approved and implemented information security management program in accordance with generally accepted industry standard practices that include reasonable administrative, technical, and physical safeguards to protect assets and Customer Data from loss, misuse, unauthorized access, disclosure, alteration, and destruction. The information security management program will address the following areas: risk management, security policy, organization of information security, human resources security, asset management, access control, cryptography, physical and environmental security, operations security, communications security, system acquisition, development, and maintenance, supplier management, information security incident management, information security aspects of business continuity management, and compliance.
Information Security Management Program. Box will maintain throughout the Term of the Agreement an information security management program (the “ISMP”) designed to protect and secure Content from unauthorized access or use. The ISMP will be documented and updated based on changes in applicable legal and regulatory requirements related to privacy and data security practices and industry standards.
Information Security Management Program. Administrative Safeguards Uberflip maintains an information security management program that includes a security policy, change management plan, patch management plan, incident management plan, backup and disaster recovery processes and procedures, business continuity procedures, and risk management standards. The information security management program is designed to help safeguard data transferred by Customer or its permitted agents to Uberflip, and any information derived or otherwise created by Uberflip in connection therewith, against unlawful loss, access or disclosure, as well as to identify and minimize reasonably foreseeable risks through risk assessment and regular testing. Access to Uberflip’s data centers is granted only when needed, and then only for a reasonable amount of time, and is reviewed regularly by engineering management. Uberflip has implemented specific human resource policies that every new employee must sign and agree to before beginning work at Uberflip: • Each employee goes through a detailed background check, including criminal record and reference checks.. • Employees are required to sign non-disclosure and confidentiality clauses as part of their employment agreements. These are both for internal technologies used by Uberflip (proprietary information), and any client-facing aspects (privacy policies, personal information on users, etc.).
AutoNDA by SimpleDocs
Information Security Management Program. “ISMP”) FloQast maintains a comprehensive information security management program that contains administrative, technical, and physical safeguards that are appropriate to (a) the size, scope and type of FloQast’s business; (b) the amount of resources available to FloQast; (c) the type of information that FloQast will store and process; and (d) the need for security and protection from unauthorized disclosure of such Customer Data. The ISMP is documented and updated based on changes in legal and regulatory requirements related to privacy and data security practices and industry standards applicable to the Service. FloQast’s ISMP is designed to: • Protect the integrity, availability, and prevent the unauthorized disclosure by FloQast or its agents, of Customer Data in FloQast’s possession or control; • Protect against any anticipated threats or hazards to the integrity, and availability, and prevention of unauthorized disclosure of Customer Data by FloQast or its agents; • Protect against unauthorized access, use, alteration, or destruction of Customer Data; • Protect against accidental loss or destruction of, or damage to, Customer Data; and • Safeguard information as set forth in any local, state or federal regulations by which FloQast may be regulated.
Information Security Management Program. Team FanClub shall maintain a documented, approved and implemented information security management program to protect Personal Data from unauthorized access, acquisition, disclosure, destruction, alteration, accidental loss, misuse, or damage in accordance with generally accepted industry standard practices that include reasonable administrative, technical, and physical safeguards to protect assets and Personal Data from loss, misuse, unauthorized access, disclosure, alteration, and destruction. The information security management program will address the following areas: risk management, security policy, organization of information security, human resources security, asset management, access control, cryptography, physical and environmental security, operations security, communications security, system acquisition, development, and maintenance, supplier management, information security incident management, information security aspects of business continuity management, and compliance.
Information Security Management Program. An Information Security Management Program (ISMP) shall be formally established, implemented, operated and maintained. [Core-15(b)] The ISMP shall be reviewed and updated at least annually considering the needs of the organization and changes on existing business requirements, technologies, threats and risk facing the organization. [Core-15(b)] TSM Senior Management support for the ISMP shall be demonstrated through signed acceptance or approval by management of the program. [Core-15(b)] The ISMP shall include the relevant security domains for proper management of the program as required by HITRUST. [Core-15(b)] Personnel assigned with formal responsibilities in the ISMP must be competent in information security tasks. [Core-15(b)]
Time is Money Join Law Insider Premium to draft better contracts faster.