Information sharing instructions and security controls Sample Clauses

Information sharing instructions and security controls. All relevant information sharing instructions, including but not exclusively any work instructions, policies or procedures, are listed in Appendix 1 and accepted by all parties. The applicable security classification for the data in this agreement are as follows:  Official Sensitive
Information sharing instructions and security controls. ‌ There is no need to add anything in this section, but confirm the parties acknowledge their obligations to follow the work instructions, policies and procedures in Appendix 1. You may also want to use this section to outline any security classifications (e.g. OFFICIAL SENSITIVE) that are relevant to the information being shared and confirm that the security controls are adequate.
Information sharing instructions and security controls. All signatories must have appropriate technical and organisational measures in place to ensure that any personal data shared between partners is handled and processed in accordance with the requirements of the Data Protection Act 2018, EU GDPR, and Privacy and Electronic Communication Regulations (PECR). The information sharing and security controls applicable by each organisation will be: Jointly agreed between the parties x Independently decided by each party NES Information Governance policy is available on request.

Related to Information sharing instructions and security controls

  • PERSONAL INFORMATION PRIVACY AND SECURITY CONTRACT 11 Any reference to statutory, regulatory, or contractual language herein shall be to such language as in 12 effect or as amended. 13 A. DEFINITIONS

  • Operator’s Security Contact Information ▇▇▇▇▇▇▇ ▇. ▇▇▇▇▇▇▇ Named Security Contact ▇▇▇▇▇▇▇▇@▇▇▇▇▇▇▇▇▇.▇▇▇ Email of Security Contact (▇▇▇) ▇▇▇-▇▇▇▇ Phone Number of Security Contact

  • Technical Security Controls 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.

  • Security Controls Annually, upon Fund’s reasonable request, DST shall provide Fund’s Chief Information Security Officer or his or her designee with a summary of its corporate information security policy and an opportunity to discuss DST’s information security measures, and a high level and non-confidential summary of any penetration testing related to the provision of in-scope services . DST shall review its Security Policy annually.

  • Covenant to Provide Financial Information and Maintain Sufficient Capital The Administrator shall obtain and maintain the necessary capital to fulfill its obligations under this Agreement and shall remain solvent. The Administrator will report to the Issuer on a semi-annual basis its current and total assets, current and total liabilities, and total equity and the Company intends to include such amounts in its SEC reports.