Common use of Information Security Procedures Clause in Contracts

Information Security Procedures. Maintain, update and monitor procedures designed to protect Red Hat’s information systems from loss, damage, unauthorized disclosure or disruption of business, which includes the physical and logical protection of information systems including Personal Data that is processed or transmitted.

Appears in 2 contracts

Sources: Data Processing Addendum, Data Processing Addendum