Written Information Security Program Sample Clauses

Written Information Security Program. At all times during the term of the Agreement, Vendor will implement and maintain a written information security program (“WISP”), which must include appropriate administrative, technical, physical, and operational safeguards to maintain the security, privacy, availability, integrity, and confidentiality of University Data in use, in motion, and at rest. Vendor will implement and maintain a formalized risk governance plan, policy, and a continuous risk assessment process demonstrating Vendor’s ability to identify, quantify, prioritize, and mitigate risks. If requested by University, Vendor will (and/or cause subcontractors to) certify its compliance with the requirements of this ISPA and provide written responses to any reasonable questions submitted to Vendor by University. Vendor agrees to conduct and provide to University a Data Protection Impact Assessment (“DPIA”) or an independent audit report, if reasonably requested by University. Data Privacy and Security Vendor agrees to implement and maintain administrative, technical, physical, and operational safeguards in accordance with industry best practices at a level sufficient to secure University Data. Vendor agrees to maintain the following enterprise controls for any Networks or Systems that host, Process, or provide access to University Data: Asset and Information Management. Vendor will maintain and enforce policies and controls that include, without limitation, asset inventory/management, encryption (in transit and at rest), storage of data on portable hardware, and third party access to and use of University Data.
AutoNDA by SimpleDocs
Written Information Security Program. The Contractor shall ensure that it maintains a written information security Program (WISP) incompliance with the terms of this Agreement and the requirements set forth in, M.G.L. c. 93H, to the extent that the PI subject to this Agreement meets the definition ofPersonal Information”, as such term is defined by such statute.
Written Information Security Program a. At all times during the term of the Agreement, Vendor will implement and maintain a written information security program (“WISP”), which must include appropriate administrative, technical, physical, and operational safeguards to maintain the security, privacy, availability, integrity, and confidentiality of University Data in use, in motion, and at rest.
Written Information Security Program. Unizin will maintain a written information security program to govern the protection of all Personal Information the University maintains, pursuant to which it applies industry standard best practices and the requirements of each applicable law to all covered Personal Information.
Written Information Security Program. AgilLink will maintain a comprehensive WISP designed and implemented with administrative, physical, and technical safeguards to ensure the confidentiality, integrity, and availability of Personal Data, including Personal Data. The WISP shall have documented policies, standards, and procedures designed to ensure that all such Safeguards, including the manner in which Personal Data is collected, accessed, used, stored, processed, disposed of, and disclosed, are clearly defined, developed, and implemented to manage risks to information assets.
Written Information Security Program. For detailed information, please contact Xxxx Xxx Xxxx at xxxxxxxx@xxxxxx.xxx.
Written Information Security Program. Agency shall maintain a written program of administrative, technical and physical safeguards to protect against Security Incidents that involve Confidential Information in the custody or control of the Agency or Agency Personnel. Appropriate safeguards shall include, but are not limited to, policies Formatted: Font: Italic
AutoNDA by SimpleDocs
Written Information Security Program. The Agent acknowledges and agrees that Agent and Agent Personnel are bound by the Agency’s Written Information Security Program adopted as per the terms of the Agency Agreement and agrees to comply with the terms of such program.
Written Information Security Program. Agency shall maintain a written program of administrative, technical and physical safeguards to protect against Security Incidents that involve Confidential Information in the custody or control of the Agency or Agency Personnel. Appropriate safeguards shall include, but are not limited to, policies and procedures that are designed to: 1) protect the security of Confidential Information; 2) protect against any anticipated threats to the security or integrity of Confidential Information; 3) protect against Security Incidents; 4) ensure the proper and secure disposal of Confidential Information; 5) secure business facilities, data centers, paper files, servers, back-up systems and computing equipment including, but not limited to, all mobile devices and other equipment with information storage capability; 6) provide for personnel security and integrity including, but not limited to, background checks consistent with applicable law; and 7) require ongoing privacy and information security training for all personnel. The Agency must ensure that all of its Agency Personnel are bound by and comply with such program.
Written Information Security Program. CloudWave shall maintain a written information security program appropriate for CloudWave’s Services as related to Customer Data (“Security Program”) and shall operate in compliance with the Security Program. The Security Program will provide for effective administrative, physical, and technical safeguards to protect Customer Data from unauthorized access, acquisition, or disclosure, destruction, alteration, accidental loss, misuse, or damage, and include corresponding policies, procedures, and risk assessments that are reviewed at least annually.
Time is Money Join Law Insider Premium to draft better contracts faster.