P&G INFORMATION definition
Examples of P&G INFORMATION in a sentence
SELLER will maintain a records retention process and a business continuity plan for all P&G INFORMATION in SELLER’s control or custody.
SELLER will restrict access to BUYER systems and P&G INFORMATION to authorized individuals on strict need basis and such individuals will be required to execute a confidentiality agreement.
SELLER will obtain BUYER’s written consent before providing P&G INFORMATION and/or access to BUYER’s networks/systems to any third party, including affiliates of SELLER (“SUBCONTRACTOR”).
For as long as SELLER has access to P&G INFORMATION or BUYER’s systems/networks, SELLER will update its security practices and controls at its own cost to continue to comply with accepted industry standards.
SELLER will destroy P&G INFORMATION using a secure means of disposal (e.g. incineration or cross-cut shredding) when such data is no longer required (either for the services or to be retained by law).
SELLER will use only securely configured, corporate-owned devices (i.e. non BYOD or hybrid/work personal use devices) to connect to BUYER networks and systems or to access or store P&G INFORMATION.
SELLER will notify BUYER, through BUYER’s project manager and ▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇@▇▇.▇▇▇, of any actual or suspected breach or compromise of P&G INFORMATION (“DATA BREACH”) as soon as possible after becoming aware of the incident, which may be sooner but no later than within 24 hours of learning of the incident.
SELLER will utilize organizational, administrative, physical, and technical policies, standards and controls to protect P&G INFORMATION against the unauthorized or unlawful processing and against accidental loss or destruction of, or damage to, P&G INFORMATION.
Hardware containing P&G INFORMATION and BUYER licensed software must be physically destroyed or securely overwritten prior to disposal or use for another purpose..
SELLER will provide information security awareness training to all its employees with access to P&G INFORMATION or P&G systems/networks that materially addresses the security requirement of this Exhibit.