Requirement to Maintain Security Program Clause Samples

Requirement to Maintain Security Program. Contractor acknowledges that the City has implemented an information security program to protect the City’s information assets, which Program is available on the City website at ▇▇▇▇://▇▇▇.▇▇▇▇▇▇▇▇▇▇▇▇▇.▇▇▇/city/en/depts/doit/supp_info/is-and-it-policies.html (“City Program”). Contractor shall be responsible for establishing and maintaining an information security program that is designed to: (i) ensure the security and confidentiality of Protected Information; (ii) protect against any anticipated threats or hazards to the security or integrity of Protected Information; (iii) protect against unauthorized access to or use of Protected Information; (iv) ensure the proper disposal of Protected Information; and, (v) ensure that all subcontractors of Contractor, if any, comply with all of the foregoing.
Requirement to Maintain Security Program. Contractor shall be responsible for establishing and maintaining an information security program that is designed to: (i) ensure the security and confidentiality of United Confidential Information and United’s automated information assets; (ii) protect against any anticipated threats or hazards to the security or integrity of United Confidential Information and United’s automated information assets; (iii) protect against unauthorized access to or use of United Confidential Information and United’s automated information assets; (iv) ensure the proper disposal of United Confidential Information; and, (v) ensure that all Contractors of Contractor, if any, comply with all of the foregoing.
Requirement to Maintain Security Program. Contractor acknowledges that the City has implemented an information security program to protect the City’s information assets, which Program is available on the City website at: ▇▇▇▇://▇▇▇.▇▇▇▇▇▇▇▇▇▇▇▇▇.▇▇▇/city/en/depts/doit/supp_info/initiatives_-_informationsecurity.html (“City Programs”).
Requirement to Maintain Security Program. Auditor acknowledges that the City has implemented an information security program to protect the City’s information assets (“City Program”). Auditor shall be responsible for establishing and maintaining an information security program that is designed to: (i) ensure the security and confidentiality of Protected Information; (ii) protect against any anticipated threats or hazards to the security or integrity of Protected Information; (iii) protect against unauthorized access to or use of Protected Information; (iv) ensure the proper disposal of Protected Information; and, (v) ensure that all subcontractors of Auditor, if any, comply with all of the foregoing. Undertaking by Auditor. Without limiting Auditor’s obligation of confidentiality as further described herein, in no case shall the safeguards of Auditor’s information security program be less stringent than the information security safeguards used by the City Program.
Requirement to Maintain Security Program. Contractor acknowledges that United has implemented an information security program to protect United’s Data and Information Assets. Contractor shall be responsible for establishing and maintaining an information security program that is designed to: (i) ensure the security and confidentiality of Protected Information; (ii) protect against any anticipated threats or hazards to the security or integrity of Protected Information; (iii) protect against unauthorized access to or use of Protected Information; (iv) ensure the proper disposal of Protected Information; and, (v) ensure that all Subcontractors of Contractor that perform obligations with respect to Protected Information, if any, are subject to materially equivalent obligations as applied to Contractor in this Section 2.4.
Requirement to Maintain Security Program. Auditor acknowledges that the City has implemented an information security program to protect the City’s information assets (“City Program”). Auditor shall be responsible for establishing and maintaining an information security program that is designed to: (i) ensure the security and confidentiality of Protected Information; (ii) protect against any anticipated threats or hazards to the security or integrity of Protected Information; (iii) protect against unauthorized access to or use of Protected Information; (iv) ensure the proper disposal of Protected Information; and, (v) ensure that all subcontractors of Auditor, if any, comply with all of the foregoing.