Security Policy and Information Security Management Program Sample Clauses

Security Policy and Information Security Management Program. Without limiting the foregoing, and upon request by Distributor, CSR agrees to disclose in writing to Distributor a detailed description of CSR’s information and data security controls and policies (“Information Security Management Program”). Upon reasonable demand, Distributor shall have the right to examine CSR’s ongoing compliance with its stated written information controls and security policies.
AutoNDA by SimpleDocs
Security Policy and Information Security Management Program. Without limiting the foregoing, and upon request by Iron Bow, Customer agrees to disclose in writing to Iron Bow a detailed description of Customer’s information and data security controls and policies (“Information Security Management Program”).

Related to Security Policy and Information Security Management Program

  • Information Security Program (1) DTI shall implement and maintain a comprehensive written information security program applicable to the Personal Information ("Information Security Program") which shall include commercially reasonable measures, including, as appropriate, policies and procedures and technical, physical, and administrative safeguards that are consistent with industry standards, providing for (i) the security and confidentiality of the Personal Information, (ii) protection of the Personal Information against reasonably foreseeable threats or hazards to the security or integrity of the Personal Information, (iii) protection against unauthorized access to or use of or loss or theft of the Personal Information, and (iv) appropriate disposal of the Personal Information. Without limiting the generality of the foregoing, the Information Security Program shall provide for (i) continual assessment and re-assessment of the risks to the security of Personal Information acquired or maintained by DTI and its agents, contractors and subcontractors in connection with the Services, including but not limited to (A) identification of internal and external threats that could result in unauthorized disclosure, alteration or destruction of Personal Information and systems used by DTI and its agents, contractors and subcontractors, (B) assessment of the likelihood and potential damage of such threats, taking into account the sensitivity of such Personal Information, and (C) assessment of the sufficiency of policies, procedures, information systems of DTI and its agents, contractors and subcontractors, and other arrangements in place, to control risks; and (ii) appropriate protection against such risks.

  • Electronic and Information Resources Accessibility and Security Standards a. Applicability: The following Electronic and Information Resources (“EIR”) requirements apply to the Contract because the Grantee performs services that include EIR that the System Agency's employees are required or permitted to access or members of the public are required or permitted to access. This Section does not apply to incidental uses of EIR in the performance of the Agreement, unless the Parties agree that the EIR will become property of the State of Texas or will be used by HHSC’s clients or recipients after completion of the Agreement. Nothing in this section is intended to prescribe the use of particular designs or technologies or to prevent the use of alternative technologies, provided they result in substantially equivalent or greater access to and use of a Product.

  • Security Management The Contractor shall comply with the requirements of the DOD 5200.1-M and the DD Form 254. Security of the Contractor’s electronic media shall be in accordance with the above documents. Effective Program Security shall require the Contractor to address Information Security and Operations Security enabled by the Security Classification Guides. The Contractor’s facility must be able to handle and store material up to the Classification Level as referenced in Attachment J-01, DD Form 254.

  • Monitoring and Management Information C10.1 The Contractor shall comply with the monitoring arrangements set out in the Monitoring Schedule including, but not limited to, providing such data and information as the Contractor may be required to produce under the Contract.

  • Correspondence and Information 6.1 Except where otherwise specified in this Agreement, correspondence between the Association and the University arising out of this Agreement or incidental thereto shall pass between the President and the President of the Association, or their designates.

  • Access and Information The Company, on the one hand, and Parent and Acquisition Corp., on the other hand, shall each afford to the other and to the other’s accountants, counsel and other representatives full access during normal business hours throughout the period prior to the Effective Time to all of its properties, books, contracts, commitments and records (including but not limited to tax returns) and during such period, each shall furnish promptly to the other all information concerning its business, properties and personnel as such other party may reasonably request, provided that no investigation pursuant to this Section 6.01 shall affect any representations or warranties made herein. Each party shall hold, and shall cause its employees and agents to hold, in confidence all such information (other than such information that (a) is already in such party’s possession or (b) becomes generally available to the public other than as a result of a disclosure by such party or its directors, officers, managers, employees, agents or advisors or (c) becomes available to such party on a non-confidential basis from a source other than a party hereto or its advisors, provided that such source is not known by such party to be bound by a confidentiality agreement with or other obligation of secrecy to a party hereto or another party until such time as such information is otherwise publicly available; provided, however, that (i) any such information may be disclosed to such party’s directors, officers, employees and representatives of such party’s advisors who need to know such information for the purpose of evaluating the transactions contemplated hereby (it being understood that such directors, officers, employees and representatives shall be informed by such party of the confidential nature of such information), (ii) any disclosure of such information may be made as to which the party hereto furnishing such information has consented in writing and (iii) any such information may be disclosed pursuant to a judicial, administrative or governmental order or request; provided, further, that the requested party will promptly so notify the other party so that the other party may seek a protective order or appropriate remedy and/or waive compliance with this Agreement and if such protective order or other remedy is not obtained or the other party waives compliance with this provision, the requested party will furnish only that portion of such information that is legally required and will exercise its best efforts to obtain a protective order or other reliable assurance that confidential treatment will be accorded the information furnished. If this Agreement is terminated, each party will deliver to the other all documents and other materials (including copies) obtained by such party or on its behalf from the other party as a result of this Agreement or in connection herewith, whether so obtained before or after the execution hereof.

  • Services and Information for Persons with Limited English Proficiency A. Grantee shall take reasonable steps to provide services and information both orally and in writing, in appropriate languages other than English, to ensure that persons with limited English proficiency are effectively informed and can have meaningful access to programs, benefits and activities. Meaningful access may entail providing language assistance services, including oral interpretation and written translation, if necessary. More information can be found at xxxxx://xxx.xxx.xxx/.

  • Data and Information 12.1 The parties shall comply with all relevant UK and EU data protection legislation in delivering their obligations under the Agreement.

  • Information Management Information and Records

  • Management Information To be Supplied to CCS no later than the 7th of each month without fail. Report are to be submitted via MISO CCS Review 100% Failure to submit will fall in line with FA KPI CONTRACT CHARGES FROM THE FOLLOWING, PLEASE SELECT AND OUTLINE YOUR CHARGING MECHANISM FOR THIS SOW. WHERE A CHARGING MECHANISM IS NOT REQUIRED, PLEASE REMOVE TEXT AND REPLACE WITH “UNUSED”.

Time is Money Join Law Insider Premium to draft better contracts faster.