Mobile Computing and Remote Working Clause Samples
Mobile Computing and Remote Working. To protect Confidential Information residing on Supplier Information Processing Systems from the risks inherent in mobile computing and remote working, Supplier will:
(a) Identify and mitigate risks to Confidential Information from mobile computing and remote working; and
(b) Develop policy and procedures for managing mobile computing and remote working.
Mobile Computing and Remote Working. To protect Protected Information from the risks inherent in mobile computing and remote working, TrueCar will:
i. Perform a risk assessment which at a minimum identifies and mitigates risks to Protected Information from mobile computing and remote working.
ii. Maintain a policy and procedures for managing mobile computing and remote working.
iii. Use security controls to manage authentication of mobile and remote users.
Mobile Computing and Remote Working. To protect ADT Data residing on ▇▇▇▇▇.▇▇▇ Information Processing Systems from the risks inherent in mobile computing and remote working, ▇▇▇▇▇.▇▇▇ will:
a. Identify and mitigate risks to ADT Data from mobile computing and remote working;
b. Develop policy and procedures for managing mobile computing and remote working;
c. Protect mobile computing devices that connect to the Internet outside of ▇▇▇▇▇.▇▇▇’s corporate network by using a personal firewall; and
d. Ensure remote access software (e.g., remote terminal, dial in or VPN) is configured with industry best practice security features including but not limited to: two-factor authentication, unique credentials, encryption, and prevention of split-tunneling.
