ISMS Sample Clauses

ISMS. By the date specified in the Implementation Plan the Supplier shall develop and submit to the Customer for the Customer’s Approval an information security management system for the purposes of this Call Off Contract, which: if required by the Implementation Plan, shall have been tested in accordance with Call Off Schedule 5 (Testing); and shall comply with the requirements of paragraphs 108.3 to 108.5 of this Call Off Schedule 8 (Security). The Supplier acknowledges that the Customer places great emphasis on the confidentiality, integrity and availability of information and consequently on the security provided by the ISMS and that the Supplier shall be responsible for the effective performance of the ISMS. The ISMS shall: unless otherwise specified by the Customer in writing, be developed to protect all aspects of the Services and all processes associated with the delivery of the Services, the Supplier System and any ICT, information and data (including the Customer’s Confidential Information and the Customer Data) to the extent used by the Customer or the Supplier in connection with this Call Off Contract; meet the relevant standards in ISO/IEC 27001;and at all times provide a level of security which: is in accordance with Good Industry Practice, Law and this Call Off Contract; complies with the Security Policy; complies with at least the minimum set of security measures and standards as determined by the Security Policy Framework (Tiers 1-4); meets any specific security threats to the ISMS; complies with ISO/IEC27001 and ISO/IEC27002 in accordance with paragraph 112 (Compliance of the ISMS With ISO/IEC 27001); complies with the security requirements as set out in Annex 1 (Security) to this Call Off Schedule 8; and complies with the Customer’s ICT policies. Subject to Clause 34 of this call Off Contract (Security And Protection of Information) the references to standards, guidance and policies set out in paragraph 108.3 of this Call Off Schedule shall be deemed to be references to such items as developed and updated and to any successor to or replacement for such standards, guidance and policies, as notified to the Supplier from time to time. In the event that the Supplier becomes aware of any inconsistency in the provisions of the standards, guidance and policies set out in paragraph 108.3 of this Call Off Schedule, the Supplier shall immediately notify the Customer Representative of such inconsistency and the Customer Representative shall, as soon as p...
AutoNDA by SimpleDocs
ISMS. The Supplier shall develop and submit to the Customer for the Customer’s Approval, within twenty (20) working days after the Contract Commencement Date or such other date as agreed between the Parties, an information security management system for the purposes of this Contract, which shall comply with the requirements of paragraphs 98.3 to 98.5 of this Contract Schedule 7 (Security). The Supplier acknowledges that the Customer places great emphasis on the reliability of the performance of the Goods and/or Services, confidentiality, integrity and availability of information and consequently on the security provided by the ISMS and that the Supplier shall be responsible for the effective performance of the ISMS. The ISMS shall: unless otherwise specified by the Customer in writing, be developed to protect all aspects of the Goods and/or Services and all processes associated with the provision of the Goods and/or Services, including the Customer Premises, the Sites, any ICT, information and data (including the Customer’s Confidential Information and the Customer Data) to the extent used by the Customer or the Supplier in connection with this Contract; meet the relevant standards in ISO/IEC 27001 and ISO/IEC27002 in accordance with Paragraph 102;and at all times provide a level of security which: is in accordance with the Law and this Contract; as a minimum demonstrates Good Industry Practice; complies with the Security Policy; complies with at least the minimum set of security measures and standards as determined by the Security Policy DPS (Tiers 1-4) xxxxx://xxx.xxx.xx/government/uploads/system/uploads/attachment_data/file/255910/HMG_Security_Policy_Framework_V11.0.pdf ; takes account of guidance issued by the Centre for Protection of National Infrastructure on Risk Management xxxx://xxx.xxxx.xxx.xx/Documents/Publications/2005/2005003-Risk_management.pdf complies with HMG Information Assurance Maturity Model and Assurance DPS xxxx://xxx.xxxx.xxx.xx/publications/Documents/iamm-assessment-framework.pdf meets any specific security threats of immediate relevance to the Goods and/or Services and/or Customer Data; and complies with the Customer’s ICT policies: document the security incident management processes and incident response plans; document the vulnerability management policy including processes for identification of system vulnerabilities and assessment of the potential impact on the Goods and/or Services of any new threat, vulnerability or exploitation t...
ISMS. The Supplier shall develop and submit to the Contracting Authority for the Contracting Authority’s Approval, within twenty (20) working days after the Call Off Commencement Date or such other date as agreed between the Parties, an information security management system for the purposes of this Call Off Contract, which shall comply with the requirements of paragraphs 3.3 to 3.5 of this Call Off Schedule 7 (Security). The Supplier acknowledges that the Contracting Authority places great emphasis on the reliability of the performance of the Services, confidentiality, integrity and availability of information and consequently on the security provided by the ISMS and that the Supplier shall be responsible for the effective performance of the ISMS. The ISMS shall: unless otherwise specified by the Contracting Authority in writing, be developed to protect all aspects of the Services and all processes associated with the provision of the Services, including the Contracting Authority Premises, the Sites, any ICT, information and data (including the Contracting Authority’s Confidential Information and the Contracting Authority Data) to the extent used by the Contracting Authority or the Supplier in connection with this Call Off Contract; meet the relevant standards in ISO/IEC 27001 and ISO/IEC27002 in accordance with Paragraph 7;and at all times provide a level of security which: is in accordance with the Law and this Call Off Contract;
ISMS. Supplier operates an information security management system (ISMS) for the Services in accordance with the ISO 27001 international standard.
ISMS. The Supplier shall develop and submit to the Customer for the Customer’s Approval, within twenty (20) working days after the Contract Commencement Date or such other date as agreed between the Parties, an information security management system for the purposes of this Contract, which shall comply with the requirements of paragraphs 3.3 to 3.5 of this Contract Schedule 7 (Security). The Supplier acknowledges that the Customer places great emphasis on the reliability of the performance of the Goods and/or Services, confidentiality, integrity and availability of information and consequently on the security provided by the ISMS and that the Supplier shall be responsible for the effective performance of the ISMS. The ISMS shall: unless otherwise specified by the Customer in writing, be developed to protect all aspects of the Goods and/or Services and all processes associated with the provision of the Goods and/or Services, including the Customer Premises, the Sites, any ICT, information and data (including the Customer’s Confidential Information and the Customer Data) to the extent used by the Customer or the Supplier in connection with this Contract; meet the relevant standards in ISO/IEC 27001 and ISO/IEC27002 in accordance with Paragraph 7;and at all times provide a level of security which: is in accordance with the Law and this Contract; as a minimum demonstrates Good Industry Practice; complies with the Security Policy; complies with at least the minimum set of security measures and standards as determined by the Security Policy DPS (Tiers 1-4) xxxxx://xxx.xxx.xx/government/uploads/system/uploads/attach ment_data/file/255910/HMG_Security_Policy_Framework_V11.
ISMS. The Supplier shall develop and submit to the Customer for the Customer’s Approval, within twenty (20) working days after the Call Off Commencement Date or such other date as agreed between the Parties, an information security management system for the purposes of this Call Off Contract, which shall comply with the requirements of paragraphs 91.3 to 91.5 of this Call Off Schedule 8 (Security). The Supplier acknowledges that the Customer places great emphasis on the reliability of the performance of the Services, confidentiality, integrity and availability of information and consequently on the security provided by the ISMS and that the Supplier shall be responsible for the effective performance of the ISMS. The ISMS shall: unless otherwise specified by the Customer in writing, be developed to protect all aspects of the Services and all processes associated with the provision of the Services, including the Customer Premises, the Sites, any ICT, information and data (including the Customer’s Confidential Information and the Customer Data) to the extent used by the Customer or the Supplier in connection with this Call Off Contract; meet the relevant standards in ISO/IEC 27001 and ISO/IEC27002 in accordance with Paragraph 95; and at all times provide a level of security which: is in accordance with the Law and this Call Off Contract;
ISMS. The Information Security Management System ensures the confidentiality, integrity and availability of all information at Darktrace Plc, and all its affiliates (“Darktrace”). This is achieved through policies procedures and controls within the ISMS. To give the ISMS purpose and direction, measurable information security objectives have been agreed based upon a risk assessment and our overall business strategy.
AutoNDA by SimpleDocs

Related to ISMS

  • Mechanisms The Parties agree that their political dialogue shall be conducted:

  • Protocols Each party hereby agrees that the inclusion of additional protocols may be required to make this Agreement specific. All such protocols shall be negotiated, determined and agreed upon by both parties hereto.

  • Outputs 8. The objectives and outcomes of this Agreement will be achieved through a range of outputs. The outputs include the:

  • Vaccinations (1) Employees shall be provided with free influenza vaccination once annually.

  • Safety Measures Employees working in any unsanitary or dangerous jobs shall be supplied with all the necessary tools, safety equipment, and protective clothing.

  • Speed The relative importance we attach is “high”.

  • Trunk Group Architecture and Traffic Routing The Parties shall jointly engineer and configure Local/IntraLATA Trunks over the physical Interconnection arrangements as follows:

  • Safety Where an employee is prevented from working at the employee’s particular function as a result of unsafe conditions caused by the inclement weather, the employee may be transferred to other work in the employee’s classification on site, until the unsafe conditions are rectified. Where such alternative is not available and until the unsafe conditions are rectified, the employee shall remain on site. The employee shall be paid for such time without reduction of the employees’ inclement weather entitlement.

  • Safeguard Measures 1. The Parties note the multilateral negotiations pursuant to Article X of GATS on the question of emergency safeguard measures based on the principle of non- discrimination. Upon the conclusion of such multilateral negotiations, the Parties shall conduct a review for the purpose of discussing appropriate amendments to this Agreement so as to incorporate the results of such multilateral negotiations.

  • Animals The Hirer shall ensure that no animals (including birds) except guide dogs are brought into the premises, other than for a special event agreed to by the Village Hall. No animals whatsoever are to enter the kitchen at any time.

Time is Money Join Law Insider Premium to draft better contracts faster.