Security Certifications Sample Clauses

Security Certifications. Provide list of security certifications you hold along with a copy of each. Providers should hold ISO 27001 for security controls or SAS 70 Type II audits for physical security.
AutoNDA by SimpleDocs
Security Certifications. Genesys has implemented and will maintain an information security program that follows generally accepted system security principles embodied in the ISO 27001 standard designed to protect the Customer Data as appropriate to the nature and scope of the Genesys PureConnect Cloud Services provided. Genesys has developed and will maintain an information security and awareness program that is delivered to all its employees and appropriate contractors at the time of hire or contract commencement and annually thereafter. The awareness program is delivered electronically and includes a testing aspect with minimum requirements to pass.
Security Certifications. Zendesk holds the following security-related certifications from independent third-party auditors: SOC 2 Type II, ISO 27001:2013, and ISO 27018:2014.
Security Certifications deepwatch maintains internal controls, policies, and procedures at least as effective as those described in deepwatch’s most recent SOC 2 Type 2 report (“SOC Report”). Additionally, deepwatch meets or exceeds the Payment Card Industry ("PCI") Security Standards Council ("SSC") requirements for Xxxxx 0 Xxxxxxx Xxxxxxxxx, as attested to in deepwatch’s most recent PCI Data Security Standard Attestation of Compliance ("AoC") for Onsite Assessments – Service Providers report (“PCI Report”) and has obtained TRUSTe Enterprise Certification.
Security Certifications. During the term of the Agreement, Medidata will maintain its Privacy Shield, Federal Information Systems Management Act (FISMA), Service Organization Controls 2 (SOC 2) and ISO/IEC 27001:2013 certifications.
Security Certifications. VENDOR represents and warrants to AGENCY that VENDOR incorporates ISO (International Organization for Standardization) and IEC (International Electrotechnical Commission) ISO/IEC 27000, series of Information Security Management Systems standards ("ISO Security Standards") in the development of its information security management and delivery of Services. If and when VENDOR becomes certified under the ISO Security Standards or other security services standard, VENDOR shall maintain such certification on an on-going basis and VENDOR shall provide AGENCY with a copy of such certifications upon request. VENDOR shall provide AGENCY with full and complete copies of any ISO Security Standards audits and reviews, and other security audits, reports and reviews, whether conducted internally by VENDOR or through a Third Party, within five (5) days of a request by AGENCY and within twenty (20) days of VENDOR's receipt of such audits, reports and reviews. If there are deficiencies cited and/or recommendations made, the VENDOR Information Security Officer, the VENDOR Executive Sponsor and other appropriate personnel from VENDOR shall meet to review the deficiencies and recommendations and develop a plan of action to address such items. The implementation of any measures to address deficiencies and/or recommendations shall not be chargeable to AGENCY.
Security Certifications. Client shall provide NDCHealth with annual Level II Certifications and an annual Security Certification in accordance with the Data Security Requirements.
AutoNDA by SimpleDocs
Security Certifications. Aruba Certified ClearPass Expert 2 Aruba Certified ClearPass Professional 4
Security Certifications. During the term of the Agreement, Medidata will maintain Federal Information Systems Management Act (FISMA), Service Organization Controls 2 (SOC 2) and ISO/IEC 27001:2013 certifications.
Security Certifications. Talend is SOC 2 Type 2 certified. Talend technical and organizational security measures are further described in Talend’s- current security attestation report, available upon request. Talend uses the Cloud Security Alliance (CSA) Security Trust Assurance and Risk (STAR) program to assess our security practices and validate the security posture of our cloud offerings.
Time is Money Join Law Insider Premium to draft better contracts faster.