Common use of Security Standards Clause in Contracts

Security Standards. ▇.▇.▇. ▇▇ is expected that partners of this agreement will have in place baseline security measures compliant with or be equivalent to BS17799: 2005 and ISO/IEC 27001:2013 and HMG standards in relation to information security. Partners are at liberty to request copies of each other’s: • Information Security Policy • Records Management Policy • Data Protection Policy 7.2.2. Each partner will implement and maintain appropriate technical and organisational measures to protect personal data against unauthorised or unlawful processing and against accidental loss or destruction of, or damage. 7.2.3. Each partner will ensure that employees or agents who have access to personal data have undergone appropriate Data Protection training to be competent to comply with the terms of this agreement.

Appears in 3 contracts

Sources: Information Sharing Agreement, Information Sharing Agreement, Information Sharing Agreement

Security Standards. ▇.▇.▇. ▇▇ is expected that partners of this agreement will have in place baseline security measures compliant with or be equivalent to BS17799: 2005 and ISO/IEC 27001:2013 and HMG standards in relation to information security. Partners are at liberty to request copies of each other’s: Information Security Policy Records Management Policy Data Protection Policy 7.2.29.2.2. Each partner will implement and maintain appropriate technical and organisational measures to protect personal data against unauthorised or unlawful processing and against accidental loss or destruction of, or damage. 7.2.39.2.3. Each partner will ensure that employees or agents who have access to personal data have undergone appropriate Data Protection training to be competent to comply with the terms of this agreement.

Appears in 2 contracts

Sources: Information Sharing Agreement, Information Sharing Agreement

Security Standards. ▇.▇.▇8.2.1. ▇▇ It is expected that partners of this agreement will have in place baseline security measures compliant with or be equivalent to BS17799: 2005 and ISO/IEC 27001:2013 and HMG standards in relation to information security. Partners are at liberty to request copies of each other’s: Information Security Policy Records Management Policy Data Protection Policy 7.2.28.2.2. Each partner will implement and maintain appropriate technical and organisational measures to protect personal data against unauthorised or unlawful processing and against accidental loss or destruction of, or damage. 7.2.38.2.3. Each partner will ensure that employees or agents who have access to personal data have undergone appropriate Data Protection training to be competent to comply with the terms of this agreement.

Appears in 2 contracts

Sources: Information Sharing Agreement, Information Sharing Agreement

Security Standards. ▇.▇.▇. ▇▇ is expected that partners of this agreement will have in place baseline security measures compliant with or be equivalent to BS17799: 2005 and ISO/IEC 27001:2013 and HMG standards in relation to information security. Partners are at liberty to request copies of each other’s: • Information Security  Informaiton Secuirty Policy Records Management Policy Data Protection Policy 7.2.28.2.2. Each partner will implement and maintain appropriate technical and organisational measures to protect personal data against unauthorised or unlawful processing and against accidental loss or destruction of, or damage. 7.2.38.2.3. Each partner will ensure that employees or agents who have access to personal data have undergone appropriate Data Protection training to be competent to comply with the terms of this agreement.

Appears in 2 contracts

Sources: Information Sharing Agreement, Information Sharing Agreement

Security Standards. ▇.▇.▇7.2.1. ▇▇ It is expected that partners of this agreement will have in place baseline security measures compliant with or be equivalent to BS17799: 2005 and ISO/IEC 27001:2013 and HMG standards in relation to information security. Partners are at liberty to request copies of each other’s: Information Security Policy Records Management Policy Data Protection Policy 7.2.2. Each partner will implement and maintain appropriate technical and organisational measures to protect personal data against unauthorised or unlawful processing and against accidental loss or destruction of, or damage. 7.2.3. Each partner will ensure that employees or agents who have access to personal data have undergone appropriate Data Protection training to be competent to comply with the terms of this agreement.

Appears in 2 contracts

Sources: Information Sharing Agreement, Information Sharing Agreement

Security Standards. ▇.▇.▇. ▇▇ is expected that partners of this agreement will have in place baseline security measures compliant with or be equivalent to BS17799: 2005 and ISO/IEC 27001:2013 and HMG standards in relation to information security. Partners are at liberty to request copies of each other’s: • Information  Informaiton Security Policy Records Management Policy Data Protection Policy 7.2.29.2.2. Each partner will implement and maintain appropriate technical and organisational measures to protect personal data against unauthorised or unlawful processing and against accidental loss or destruction of, or damage. 7.2.39.2.3. Each partner will ensure that employees or agents who have access to personal data have undergone appropriate Data Protection training to be competent to comply with the terms of this agreement.

Appears in 1 contract

Sources: Information Sharing Agreement

Security Standards. ▇.▇.▇. ▇▇ is expected that partners of this agreement will have in place baseline security measures compliant with or be equivalent to BS17799: 2005 and ISO/IEC 27001:2013 and HMG standards in relation to information security. Partners are at liberty to request copies of each other’s: Information Security Policy Records Management Policy Data Protection Policy 7.2.28.2.2. Each partner will implement and maintain appropriate technical and organisational measures to protect personal data against unauthorised or unlawful processing and against accidental loss or destruction of, or damage. 7.2.38.2.3. Each partner will ensure that employees or agents who have access to personal data have undergone appropriate Data Protection training to be competent to comply with the terms of this agreement.

Appears in 1 contract

Sources: Information Sharing Agreement

Security Standards. ▇.▇.▇. ▇▇ is expected that partners of this agreement will have in place baseline security measures compliant with or be equivalent to BS17799: 2005 and ISO/IEC 27001:2013 and HMG standards in relation to information security. Partners are at liberty to request copies of each other’s: • Information Security Policy • Records Management Policy • Data Protection Policy 7.2.28.2.2. Each partner will implement and maintain appropriate technical and organisational measures to protect personal data against unauthorised or unlawful processing and against accidental loss or destruction of, or damage. 7.2.38.2.3. Each partner will ensure that employees or agents who have access to personal data have undergone appropriate Data Protection training to be competent to comply with the terms of this agreement.

Appears in 1 contract

Sources: Information Sharing Agreement

Security Standards. ▇.▇.▇9.2.1. ▇▇ It is expected that partners of this agreement will have in place baseline security measures compliant with or be equivalent to BS17799: 2005 and ISO/IEC 27001:2013 and HMG standards in relation to information security. Partners are at liberty to request copies of each other’s: Information Security Policy Records Management Policy Data Protection Policy 7.2.29.2.2. Each partner will implement and maintain appropriate technical and organisational measures to protect personal data against unauthorised or unlawful processing and against accidental loss or destruction of, or damage. 7.2.39.2.3. Each partner will ensure that employees or agents who have access to personal data have undergone appropriate Data Protection training to be competent to comply with the terms of this agreement.

Appears in 1 contract

Sources: Information Sharing Agreement

Security Standards. ▇.▇.▇10.2.1. ▇▇ It is expected that partners of this agreement will have in place baseline security measures compliant with or be equivalent to BS17799: 2005 and ISO/IEC 27001:2013 and HMG standards in relation to information security. Partners are at liberty to request copies of each other’s: • Information Security Informaiton Secuirty Policy • Records Management Policy • Data Protection Policy 7.2.210.2.2. Each partner will implement and maintain appropriate technical and organisational measures to protect personal data against unauthorised or unlawful processing and against accidental loss or destruction of, or damage. 7.2.310.2.3. Each partner will ensure that employees or agents who have access to personal data have undergone appropriate Data Protection training to be competent to comply with the terms of this agreement.

Appears in 1 contract

Sources: Information Sharing Agreement

Security Standards. ▇.▇.▇. ▇▇ is expected that partners of this agreement will have in place baseline security measures compliant with or be equivalent to BS17799: 2005 and ISO/IEC 27001:2013 and HMG standards in relation to information security. Partners are at liberty to request copies of each other’s: Information Security Policy Records Management Policy Data Protection Policy 7.2.2. Each partner will implement and maintain appropriate technical and organisational measures to protect personal data against unauthorised or unlawful processing and against accidental loss or destruction of, or damage. 7.2.3. Each partner will ensure that employees or agents who have access to personal data have undergone appropriate Data Protection training to be competent to comply with the terms of this agreement.

Appears in 1 contract

Sources: Information Sharing Agreement

Security Standards. ▇.▇.▇11.2.1. ▇▇ It is expected that partners of this agreement will have in place baseline security measures compliant with or be equivalent to BS17799: 2005 and ISO/IEC 27001:2013 and HMG standards in relation to information security. Partners are at liberty to request copies of each other’s: Information Security Policy Records Management Policy Data Protection Policy 7.2.211.2.2. Each partner will implement and maintain appropriate technical and organisational measures to protect personal data against unauthorised or unlawful processing and against accidental loss or destruction of, or damage. 7.2.311.2.3. Each partner will ensure that employees or agents who have access to personal data have undergone appropriate Data Protection training to be competent to comply with the terms of this agreement.

Appears in 1 contract

Sources: Information Sharing Agreement