Information Security Terms definition

Information Security Terms means the Information Security Terms of IHS Markit attached hereto and identified as Exhibit C;
Information Security Terms means the Information Security Terms of MSFA attached hereto and identified as Exhibit C;

Examples of Information Security Terms in a sentence

  • These IHS Markit Information Security Terms (“Information Security Terms”) constitute the information security terms with which IHS Markit shall use its reasonable efforts to comply in the course of providing the Services to Customer under the Agreement.

  • Yahoo may request suspension of any Personnel or Subcontractor (or Subcontractor personnel) if Yahoo reasonably believes (and reasonably demonstrates to HortonWorks) that such Personnel or Subcontractor (or Subcontractor personnel) has violated or risks violating any confidentiality obligations (as set forth in Section 10 (Confidentiality)) or Site access and data security obligations (as set forth in Section 11 (Site Access and Data Security) and Exhibit E (Information Security Terms)).

  • Agreement Collectively, all contract documents including any Order, Statement(s) of Work, Information Security Terms, Early Adopter Terms, Third Party Terms, Solution Terms, these Standard Terms, amendments and any attachments to the documents, and click-through terms.

  • Notifications pursuant to these Information Security Terms will take place via a telephone call and/or email by one Party to the other’s Notification Contact.

  • In connection with the Support Services, Yahoo may provide to HortonWorks remote access using the Supervised Access Sessions (“buddy system”) to certain Sandbox Servers, Research Servers, and Production Servers as further described in and subject to Section 11.7 (Access to Other Servers) and Exhibit E (Information Security Terms).

  • Where data must be encrypted under these Information Security Terms, the Agreement, or applicable law, HortonWorks will sign and encrypt using a Yahoo-approved algorithm.

  • HortonWorks will log all attempted accesses to its servers (including time and date thereof) involved in performing obligations to or for Yahoo or otherwise conducted pursuant to these Information Security Terms and/or the Agreement, and the result of such attempts, successful or unsuccessful.

  • HortonWorks will make Personnel available to Yahoo and Yahoo will provide reasonable access to the Yahoo QE, Sandbox, Research, or Production Servers, as applicable, in accordance with Section 11 (Site Access and Data Security) and Exhibit E (Information Security Terms) to enable HortonWorks to (i) further identify, validate, and replicate Errors (ii) identify a Workaround, and/or (iii) develop an Error Correction (including an Emergency Bug Fix).

  • HortonWorks will treat every Security Issue with high priority and commence working on each Security Issue immediately with sufficient numbers of competent personnel to meet the requirements of these Information Security Terms.

  • Yahoo will provide access to the Development Servers in accordance with this Agreement (including Section 11 (Site Access and Data Security) and Exhibit E (Information Security Terms)) to qualified HortonWorks Personnel with a valid business need to access the Development Servers.