Information Security Policies definition

Information Security Policies any policies which relate to information security, whether provided by the Client or Xxxxxxxxx, including but not limited to policies on access control, information, classification (and handling), physical and environmental security, back-up, information transfer, protection from malware and management of technical vulnerabilities; “Personal data” all personal data (as defined by Data Protection Act or the GDPR, whichever is in force in the United Kingdom at the relevant time) relating to individuals, which is processed by the Data Processor on behalf of the Data Controller in accordance with the Agreement; and
Information Security Policies means the security standards, definitions and policies endorsed by Authorized Purchaser, or if not addressed by Authorized Purchaser, then at least known to be generally accepted practice in the industry, unless otherwise approved in writing by Authorized Purchaser.
Information Security Policies means the security standards, definitions and policies endorsed by the State of Colorado, or if not addressed by the State, then at least known to be generally accepted practice in the industry, unless otherwise approved in writing by the State.

Examples of Information Security Policies in a sentence

  • These procedures shall be consistent with the Department of Health Information Security Policies, as amended, which is incorporated herein by reference and the receipt of which is acknowledged by the provider, upon execution of this agreement.

  • The audit shall include the Contractor’s and Subcontractor’s compliance with the State’s Enterprise Information Security Policies and all applicable requirements, laws, regulations or policies.

  • I understand that I am not authorised to use sensitive information for my own purposes, nor am I at liberty to provide this information to third parties without the express written consent of the internal manager who is the designated information owner.I have access to a copy of the Information Security Policies, I have read and understand these policies, and I understand how it impacts my job.

  • Vendor’s confidentiality procedures shall be consistent with the most recent edition of the Department of Health Information Security Policies, Protocols, and Procedures.

  • The State’s Enterprise Information Security Policies document is found at the following URL: https://www.tn.gov/finance/strategic-technology-solutions/strategic-technology- solutions/sts-security-policies.html.

  • The Contractor and all data centers used by the Contractor to host State data, including those of all Subcontractors, must comply with the State’s Enterprise Information Security Policies as amended periodically.

  • All Contractor and subcontractor software, hardware and personnel that interface with House offices (including Leadership, Member, Committee, Officer and subordinate offices, such as House Information Resources (“HIR”)) are subject to and shall comply with the rules, regulations and sanctions outlined in the House Information Security Policies (“HISPOLS”), House Information Security Publications (“HISPUBS”) and HIR Security Standards, which will be provided upon request, as required by the Contract.

  • Complying with the safeguard provisions in the COUNTY Information Security Policies or requirements set forth in State or Federal guidelines applicable.

  • Archival tapes containing any Confidential Information shall be used by Contractor solely for back-up purposes and shall be maintained and used in accordance with the LAUSD Information Security Policies.

  • All employees are expected to maintain the confidentiality and integrity of the information assets and comply with the Information Security Policies.

Related to Information Security Policies

  • Information Security shall have the same meanings as the terms “information technology” and “information security”, respectively, in §24-37.5-102, C.R.S. Capitalized terms used herein and not otherwise defined herein or in the HIPAA Rules shall have the meanings ascribed to them in the Contract.

  • Data Room Information means the information and documents listed in the index of documents contained in the Data Site attached to the Company Disclosure Letter;

  • Information Security Incident means (i) any actual or suspected incident involving Seller Information System that may involve Buyer’s Sensitive Information, or (ii) any actual or suspected unauthorized access to, use, or disclosure of Buyer’s Sensitive Information.

  • Confidential commercial information means records provided to the govern- ment by a submitter that arguably contain material exempt from release under Exemption 4 of the Freedom of Information Act, 5 U.S.C. 552(b)(4), be- cause disclosure could reasonably be expected to cause substantial competi- tive harm.