Information Security Management Sample Clauses

Information Security Management. IPSX has utilised the Cyber Essentials certification to assess and develop its cyber security measures and adheres to industry standards in this respect. IPSX has a Patch Management Policy and deploys security patch updates to external software components in a scheduled manner. Unsupported software is removed and software installation is monitored. Clearly defined starter, leaver and mover processes are in place and are adhered to. Anti-malware software is installed on all relevant devices.
AutoNDA by SimpleDocs
Information Security Management. Cengage has established a Security Organization, led by the company’s Chief Security Officer and staffed with dedicated security personnel. This organization is independent from the various divisions or business units that manage and operate IT systems within the company. The Security Organization consists of cross-divisional security teams leveraging a multi-disciplinary approach to compliance with cyber and information security standards, operational risk management, client security management, workforce protection and business resilience. Roles and responsibilities have been formally defined in writing for all members of the security team.
Information Security Management. 15.1 The Provider shall provide the Administering Authority with either:
Information Security Management. The Contractor shall take all reasonable measures necessary to comply with the provisions of the International Standard ISO27001, “The Code of Practice for Information Security Management”, in connection with the provision of the Services.
Information Security Management iManage has appointed one or more security officers responsible for coordinating and monitoring security rules and procedures. iManage maintains an information security program designed to protect Customer Data against accidental or unlawful destruction, loss, alteration, unauthorized disclosure, or access. The information security program may be updated from time to time based on changes in applicable legal and regulatory requirements, best practices and industry standards related to privacy and data security.
Information Security Management. 2.1. Vendor has and shall maintain at all times during the Term a security policy that explicitly addresses and provides guidance to employees and non-employee workers to ensure the confidentiality, integrity and availability of information and systems maintained or processed by Vendor. The policies shall be approved by senior management and contain penalties or sanctions for non-compliance. Vendor’s security policy shall provide a framework for information security management within its overall organization. That policy must have an explicit section on the handling and management of personal information. Explicit procedures must exist that describe how personal information is to be managed, including disposal and destruction of data after its useful life.
Information Security Management. Annex This Information Security Management Annex (“Security Annex”) to the Agreement between Service Provider and Subscriber contains additional terms and conditions as agreed between the parties. In case of inconsistencies or discrepancies, between the terms and conditions in this Annex and the ones in the Agreement, the terms and conditions in this Annex take precedence.
AutoNDA by SimpleDocs
Information Security Management. The purpose of the information security management practice is to protect the information the organization needs to conduct business. This includes understanding and managing risks to the confidentiality, integrity, and availability of information, as well as other aspects of information security such as authentication (ensuring someone is who he claims to be) and non- repudiation (ensuring that someone cannot deny to have taken an action). 🠦 TrustBuilder has the necessary procedures in place with respect to the protection of the information in the Customer’s environment: - Data processing agreement; - GDPR register of data, privacy policies…; - Confidentiality clause with the staff. Our Software has been designed according to the principle of privacy by design, and is compliant with GDPR, including consent management verification. Specific security services include: - Internal security review after all changes; - Continuous vulnerability assessment of the production environment using automated tools; - Notification of significant security incidents to the Customer security team. Additional security measures include: - Follow-up and fixes of Customer or third-party penetration testing (lead by the Customer)
Information Security Management. 3.1 The Supplier shall ensure that:
Information Security Management. LogicMonitor shall maintain throughout the Term of the Agreement formal information security management program designed to protect the confidentiality, integrity and availability of Customer Data. The program shall be documented and updated based on changes in applicable legal and regulatory requirements related to privacy and data security practices and industry standards.
Time is Money Join Law Insider Premium to draft better contracts faster.