Additional Security Controls Sample Clauses

Additional Security Controls. Google will make Additional Security Controls available to: (a) allow Customer to take steps to secure Customer Data; and (b) provide Customer with information about securing, accessing and using Customer Data.
AutoNDA by SimpleDocs
Additional Security Controls. As an additional security control, Huawei validates the efficiency of the security measures of Service via periodical security tests by internal or independent third party as well as continues to upkeep the relevant security certificates.
Additional Security Controls. Vendor will store and process Student Data in accordance with the industry best practices, which at a minimum shall be in accordance with the standards set forth in this Agreement, as may be amended in writing by the authorized representatives of the parties and with the approval of the Board’s General Counsel. This includes appropriate administrative, physical, and technical safeguards to secure Student Data from unauthorized access, disclosure, and use. All data must be secured in transit using secure FTP services or https/TLS 1.0+. Proposer is required to specify any personally identifiable information (PII) collected or used by their Products. In addition, Vendor must maintain industry recognized security practices to establish secure application(s), network, and infrastructure architectures. Industry certifications, such as International Organization for Standardization (ISO), SysTrust, Cloud Security Alliance (CSA) STAR Certification, or WebTrust security for SaaS environments are recommended. Such safeguards shall be no less rigorous than accepted industry practices, including specifically the NIST 800-53r4 moderate level, International Organization for Standardization’s standards ISO/IEC 27001:2005 (Information Security Management Systems – Requirements), and ISO-IEC 27002:2005 (Code of Practice for International Security Management). Vendor shall ensure that the manner in which Student Data is collected, accessed, used, stored, processed, disposed of and disclosed complies with applicable data protection and privacy laws, as well as the terms and conditions of this Agreement. Vendor will conduct periodic risk assessments and remediate any identified security vulnerabilities in a timely manner. Vendor will also have a written incident response plan, to include prompt notification of the Board in the event of a security or privacy incident, as well as best practices for responding to a breach of Student Data security practices. Vendor agrees to share its incident response plan upon request. Vendor shall assure that all data that is transmitted between the Board’s access points and the ultimate server, by Vendor or its recipients, will use Board-approved encryption of no less rigor than NIST-validated DES standards.
Additional Security Controls. In addition to the Security Measures, IRIS Connect will make the Additional Security Controls available to:
Additional Security Controls. In addition to the Security Measures, Asana will make certain Additional Security Controls available to Customer (the “Additional Security Controls”), as described in Appendix 2. Customer is responsible for enabling and/or using the Additional Security Controls offered by Xxxxx in Customer’s own discretion in compliance with applicable law. 5.4
Additional Security Controls. In addition to the Security Measures, Google will make the Additional Security Controls available to: (a) allow Customer to take steps to secure Customer Data; and (b) provide Customer with information about securing, accessing and using Customer Data. ▪ 7.1.4. Google’s Security Assistance. Customer agrees that Google will (taking into account the nature of the processing of Customer Personal Data and the information available to Google) assist Customer in ensuring compliance with any of Customer’s obligations in respect of security of personal data and personal data breaches, including if applicable Customer’s obligations pursuant to Articles 32 to 34 (inclusive) of the GDPR, by: ▪ (a) implementing and maintaining the Security Measures in accordance with Section 7.1.1 (Google’s Security Measures); ▪ (b) making the Additional Security Controls available to Customer in accordance with Section 7.1.3 (Additional Security Controls); ▪ (c) complying with the terms of Section 7.2 (Data Incidents); and ▪ (d) providing Customer with the Security Documentation in accordance with Section 7.5.1 (Reviews of Security Documentation) and the information contained in the applicable Agreement including this Data Processing Amendment.
Additional Security Controls. Actifio will make Additional Security Controls available to: (a) allow Customer to take steps to secure Customer Data; and (b) provide Customer with information about securing, accessing and using Customer Data.
AutoNDA by SimpleDocs
Additional Security Controls. In addition to the Security Measures, Enonic will make the Additional Security Controls available to: (a) allow Customer to take steps to secure Customer Data; and (b) provide Customer with information about securing, accessing and using Customer Data.
Additional Security Controls. Qwiklabs will make Additional Security Controls available to: (a) allow Customer to take steps to secure Customer Data; and (b) provide Customer with information about securing, accessing and using Customer Data.

Related to Additional Security Controls

  • Technical Security Controls 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.

  • Security Controls Annually, upon Fund’s reasonable request, DST shall provide Fund’s Chief Information Security Officer or his or her designee with a summary of its corporate information security policy and an opportunity to discuss DST’s information security measures, and a high level and non-confidential summary of any penetration testing related to the provision of in-scope services . DST shall review its Security Policy annually.

  • Additional Security This guarantee is in addition to and is not in any way prejudiced by any other guarantee or security now or subsequently held by any Finance Party.

  • NATIONAL SECURITY Nothing in this Agreement shall be construed:

  • Security Controls for State Agency Data In accordance with Senate Bill 475, Acts 2021, 87th Leg., R.S., pursuant to Texas Government Code, Section 2054.138, Contractor understands, acknowledges, and agrees that if, pursuant to this Contract, Contractor is or will be authorized to access, transmit, use, or store data for System Agency, Contractor is required to meet the security controls the System Agency determines are proportionate with System Agency’s risk under the Contract based on the sensitivity of System Agency’s data and that Contractor must periodically provide to System Agency evidence that Contractor meets the security controls required under the Contract.

  • Organizational Security It is the responsibility of the individuals across the organization to comply with these practices and standards. To facilitate the corporate adherence to these practices and standards, the function of information security provides:

  • Provision of Interconnection Financial Security The Interconnection Customer is obligated to provide all necessary Interconnection Financial Security required under Section 11 of the GIDAP in a manner acceptable under Section 11 of the GIDAP. Failure by the Interconnection Customer to timely satisfy the GIDAP’s requirements for the provision of Interconnection Financial Security shall be deemed a breach of this Agreement and a condition of Default of this Agreement.

  • Additional Service Requirements Grantee shall:

  • Additional Service Characteristics 3.12 The technical specification of the Bitstream 2a Service is set out in Appendix B.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!