Security Governance Clause Samples

Security Governance. Supplier must: a. Develop, document, periodically update, and implement security plans for information systems that describe the security controls in place or planned for the information systems and the rules of behavior for individuals accessing the information systems.
Security Governance. Zapier maintains an information security program (including the adoption and enforcement of internal policies and procedures) designed to: (a) help our customers secure their data processed using Zapier’s online product against accidental or unlawful loss, access, or disclosure, (b) identify reasonably foreseeable and internal risks to security and unauthorised access to the Zapier online product, and (c) minimise security risks, including through risk assessment and regular testing. ▇▇▇▇▇▇’s head of security coordinates and is primarily responsible for the company’s information security program. The team covers the following core functions: • Application security (secure development, security feature design, the Security Champions program, and secure development training) • Infrastructure security (data centers, cloud security, and strong authentication) • Monitoring and incident response (cloud native and custom) • Vulnerability management (vulnerability scanning and resolution) • Compliance and technical privacy • Security awareness (onboarding training and awareness campaigns)
Security Governance. ● Develop and conduct security risk assessments focused on the identification and remediation of risks collected through a well defined assessment process.
Security Governance. 8.6.1 Critical The Authority security requirements differ from and, in many cases exceed, those for other government services operating at the same classification. As such, all services and products will require the validation of security controls implementation and efficacy via the governance process before they can be used to support the Rehearsal in 2019 or the Census in 2021. The Authority is establishing a rigorous Information Security Governance and management Framework programme to provide assurance of the solutions and activities undertaken to deliver the Census in 2021. Formal Accreditation of the systems, services or products supplied for the use of the Census 2021 Programme is mandatory and will be owned and facilitated by the Authority’s in-house Security and Assurance Team. It will be the responsibility of the Technical Representative and/or Subject Matter Expert to manage the progress of the systems, services or products through the Formal Accreditation Process to gain accreditation. Successful completion of this process shall be one of the factors contributing to the successful delivery and completion of contractual milestones. The Formal Accreditation process will involve the signed approval from various business teams including, but not limited to, Architecture, Security, Testing and specific Subject Matter teams. This signed approval will attest to the satisfactory completion of deliverables and any associated remediation activities for the Governance arrangements under their specific remit e.g. formal acceptance of security Health Checks etc. The Service Provider must comply with the policies, standards, processes and any other measures involved in the Governance Framework Programme.
Security Governance. (i) The Vendor will appoint an individual (the “Supplier Security Manager”), to: • coordinate and manage all aspects of security in accordance with the Agreement; and • act as the single point of contact on behalf of the Vendor and Vendor’s Subcontractors in the event of a Security Incident. (ii) In the event that the Vendor wishes to change the Supplier Security Manager it will notify the Customer in writing, providing contact details for the replacement individual. (iii) If the Vendor has any questions in relation to any aspect of IT Security or the implementation of the requirements in this Schedule, it will consult with the Customer.
Security Governance a. UserTesting’s security policy is approved by its executive team and formally reviewed annually. It requires that all employees be trained on their responsibilities in protecting personal and confidential information. New employees are trained during orientation. All employees are required to refresh their training at least yearly. b. UserTesting has obtained SOC 2 Type 2 certification. The certification report is shared upon requests from customers and prospects (under NDA). UserTesting is also self-certified under Privacy Shield although we do not rely on Privacy Shield as a legal basis for transfers of Customer Personal Data.
Security Governance. (i) The Vendor will appoint an individual (the “Supplier Security Manager”), to: • coordinate and manage all aspects of security in accordance with the Agreement; and • act as the single point of contact on behalf of the Vendor and Vendor’s Subcontractors in the event of a Security Incident. (ii) In the event that the Vendor wishes to change the Supplier Security Manager it will notify the Customer in writing, providing contact details for the replacement individual. Annex 2: Voith Conditions for Supplies of Software/Hardware and/or OT & E/E systems solutions incl. documentation | U.S. Version 2024 7 | 11 Voith General Purchase Conditions, in their current version, are supplemented by the following terms and conditions, which apply to all supplies and services relating to information technology (IT)/operational technology (OT) (Part A) and the creation or adaptation of software or the rendering of associated services (Part B). These terms and conditions apply additionally and, in the event of contradictions, shall take precedence over the Voith General Purchase Conditions.
Security Governance