Examples of Information Security Requirements in a sentence
Last update 10/09/18 Exhibit KDHHS Information Security Requirements Page 1 of 9Contractor Initials Date mail, all of which may have the potential to put the data at risk of unauthorized access, use, disclosure, modification or destruction.
If HCA Confidential Information provided under this Contract is to be shared with a Subcontractor, the contract with the Subcontractor must include all of the Confidential Information Security Requirements.
Contractor agrees to implement physical, electronic, and managerial safeguards to prevent unauthorized access to Confidential Information (See Attachment 1: Confidential Information Security Requirements).
Requirements for the Information Security Plan are described in the Information Security Requirements Supplemental Provisions, attached hereto, and by reference made a part of this agreement.
Contractor is required to comply with CSU Information Security Requirements as per the attached Information Security Requirements Supplemental Provisions.