Information Security Program Requirements definition

Information Security Program Requirements shall have the meaning set forth in Section 3.05(c).
Information Security Program Requirements has the meaning set forth in Section 5.1(f)(x)(B).

Examples of Information Security Program Requirements in a sentence

  • Agent agrees that it will implement all appropriate safeguards, including at least the minimum provisions set forth in Company’s Vendor Information Security Program Requirements Document, the terms of which are incorporated into this Business Associate Agreement by reference to prevent the access, use or disclosure of PHI other than pursuant to the terms and conditions of this Addendum.

  • Analysis of the Board’s Progress in Implementing Key FISMA Information Security Program Requirements The Board’s overall information security program continues to operate effectively at a level-4 (managed and measurable) maturity (figure 2).7 Although the Board has strengthened its program since our 2019 FISMA report, it can mature its processes across specific FISMA domains in all five NIST Cybersecurity Framework security functions: identify, protect, detect, respond, and recover.

  • Education Christopher Newport University 2021-01: Develop and Implement Database Configuration Procedures2021-02: Develop and Implement a Process to Maintain Oversight over Service Providers 2021-03: Implement Cybersecurity Requirements of the Gramm-Leach-Bliley Act George Mason University 2021-01: Implement Information Security Program Requirements for the Gramm-Leach-Bliley Act2021-02: Continue Improving Security Awareness Training.

  • Analysis of the Bureau’s Progress in Implementing Key FISMA Information Security Program Requirements The Bureau’s overall information security program is operating at a level-3 (consistently implemented) maturity.

  • During the Term and thereafter for as long as Xxxxxxxx Xxxxx retains Claimant information or other personal information, BP and its representatives and agents shall be entitled to conduct audits of Xxxxxxxx Rozen’s and its Subcontractors’ relevant operations, facilities, and systems to confirm that Xxxxxxxx Rozen and its Subcontractors have complied with the Security Requirements and the Information Security Program Requirements (the “Security Audits”).

  • During the Term and thereafter for as long as Feinberg Rozen retains Claimant information or other personal information, BP and its representatives and agents shall be entitled to conduct audits of Xxxxxxxx Rozen’s and its Subcontractors’ relevant operations, facilities, and systems to confirm that Xxxxxxxx Rozen and its Subcontractors have complied with the Security Requirements and the Information Security Program Requirements (the “Security Audits”).

  • Analysis of the Bureau’s Progress in Implementing Key FISMA Information Security Program Requirements The Bureau’s overall information security program is operating effectively at a level-4 (managed and measurable) maturity (figure 2).7 For instance, within the identify function, the Bureau strengthened its hardware asset management program by employing automation to track the life cycle of its hardware assets.

  • Length of contract shall be January 1st, 2021 through December 31st, 2021.

  • This includes Request-Based Access initiative, Segregation of Duties identification and review, establishment of a System Access Working Group.Status Summary: In Progress (Delayed) Finding 21-04: Implement Information Security Program Requirements for the Gramm-Leach-Bliley ActStatus: The Academic Division continues to progress towards full implementation of all required components of the Gramm-Leach-Bliley Act.

  • Instructions for submitting suggestions or questions regarding the NRC’s Classified Information Security Program Requirements regarding the NRC’s Classified Information Security Program are contained in NRC Management Directive 12.2, ‘‘NRC Classified Information Security Program,’’ which is available for review and printing in ADAMS under Accession No. ML14142A085.

Related to Information Security Program Requirements

  • Information Security Program means the administrative, technical, and physical safeguards that a licensee uses to access, collect, distribute, process, protect, store, use, transmit, dispose of, or otherwise handle nonpublic information.

  • Program Requirements means that Partner has to fulfill certain program requirements as described in detail in the applicable SAP PartnerEdge Model and the PartnerEdge Program Guide.

  • Information Security shall have the same meanings as the terms “information technology” and “information security”, respectively, in §24-37.5-102, C.R.S. Capitalized terms used herein and not otherwise defined herein or in the HIPAA Rules shall have the meanings ascribed to them in the Contract.

  • Data Security Requirements means the following, in each case to the extent relating to any sensitive or confidential information, or any matters relating to data privacy, protection, or security or the access, collection, use, processing, storage, sharing, distribution, transfer, disclosure, destruction, or disposal of any personally identifiable information: (i) all applicable Laws and any related security breach notification requirements, (ii) the Conveyed Companies’ own respective rules, policies, and procedures, and (iii) Contracts to which the Conveyed Companies are bound.

  • Information Regulator means the Information Regulator as established in terms of Section 39 of POPIA;

  • Covered contractor information system means an information system that is owned or operated by a contractor that processes, stores, or transmits Federal contract information.

  • Information Security Breach means the unauthorized acquisition, access, use, disclosure, transmittal, storage or transportation of Confidential Information which is not permitted by law or by the terms of this Amendment, including, but not limited to, a Security Incident.

  • Security Procedures means rules and regulations governing access to, and health and safety procedures while on, Government premises; and information technology security protocols;

  • Privacy Requirements shall have the meaning set forth in Section 3.19.

  • Phone/Electronic Transaction Security Procedures means security procedures for Phone/ Electronic Transactions as provided in writing to the Underwriter.

  • Contractor information system means an information system belonging to, or operated by or for, the Contractor.

  • Phone/Electronic Transaction Security Procedures means security procedures for Phone/ Electronic Transactions as provided in writing to the Underwriter.

  • Privacy and Security Requirements means (a) all Privacy Laws; (b) all applicable Privacy Contracts, and (c) all applicable Privacy Policies.

  • ISM Code Documentation includes, in respect of a Ship:

  • Regulatory Requirement means any law, regulation or court order, or any rule, direction, guideline, code, notice or restriction (whether or not having the force of law) issued by any regulatory authority, governmental agency (including tax authority), clearing or settlement bank or exchange, or industry or self-regulatory body, whether in or outside Hong Kong, to which HKICL, we or any other Participant or the respective affiliates or group companies, or you are subject or are expected to comply with from time to time.

  • Customer information systems means any methods used to access, collect, store, use, transmit, protect, or dispose of customer in- formation.

  • Cardholder Information means any non-public, sensitive information about a Cardholder, including any combination of Cardholder name plus the Cardholder’s social security number, driver’s license or other identification number or credit or debit card number, or other bank account number.

  • Information Provider means the person or organisation providing the Information under this licence.

  • technical and organizational security measures means those measures aimed at protecting personal data against accidental or unlawful destruction or accidental loss, alteration, unauthorized disclosure or access, in particular where the processing involves the transmission of data over a network, and against all other unlawful forms of processing.

  • Regulatory Requirements means all applicable federal and state statutes, regulations, regulatory guidance, judicial or administrative rulings, requirements of Governmental Contracts and standards and requirements of any accrediting or certifying organization, including, but not limited to, the requirements set forth in a Product Attachment.

  • Information Service Traffic means Local Traffic or IntraLATA Toll Traffic which originates on a Telephone Exchange Service line and which is addressed to an information service provided over a Party's information services platform (e.g., 976).

  • Information processing system means an electronic system for creating, generating, sending, receiving, storing, displaying, or processing information.

  • Capital Requirements Directive means Directive 2013/36/EU of the European Parliament and of the Council of 26 June 2013 on access to the activity of credit institutions and the prudential supervision of credit institutions and investment firms, as amended or replaced from time to time.

  • Coordinated licensure information system means an integrated process for collecting, storing, and sharing information on nurse licensure and enforcement activities related to nurse licensure laws that is administered by a nonprofit organization composed of and controlled by licensing boards.

  • Applicable Technical Requirements and Standards means those certain technical requirements and standards applicable to interconnections of generation and/or transmission facilities with the facilities of an Interconnected Transmission Owner or, as the case may be and to the extent applicable, of an Electric Distributor, as published by Transmission Provider in a PJM Manual provided, however, that, with respect to any generation facilities with maximum generating capacity of 2 MW or less (synchronous) or 5 MW or less (inverter-based) for which the Interconnection Customer executes a Construction Service Agreement or Interconnection Service Agreement on or after March 19, 2005, “Applicable Technical Requirements and Standards” shall refer to the “PJM Small Generator Interconnection Applicable Technical Requirements and Standards.” All Applicable Technical Requirements and Standards shall be publicly available through postings on Transmission Provider’s internet website.

  • Security Requirements means the requirements regarding the security of Personal Data, as set out in the Data Protection Laws (including, in particular, the seventh data protection principle of the DPA and/ or the measures set out in Article 32(1) of the GDPR (taking due account of the matters described in Article 32(2) of the GDPR)) as applicable;