Cloud Services and Systems. Any single image of data classified as Confidential defines the minimum-security requirement for all virtual instances in the cloud. • Cloud based systems may contain Confidential Information. We reserve the right to perform a Security review and Risk Assessment of applications and services containing Confidential Information in the cloud before implementation. (d) Existing services containing Confidential Information may not be pushed to the cloud or transferred to cloud service vendors without Our approval. It is subject to approval following a Security Review and Risk Assessment by Us.
Appears in 2 contracts
Samples: Data Processing and Security Agreement, Data Processing and Security Agreement
Cloud Services and Systems. Any single image of data classified as Confidential defines the minimum-minimum security requirement for all virtual instances in the cloud. • Cloud based systems may contain Confidential Informationconfidential data. We reserve McAfee Enterprise reserves the right to perform a Security review and Risk Assessment of applications and services containing Confidential Information confidential data in the cloud before implementation.
(d) Existing services containing Confidential Information may not be pushed to the cloud or transferred to cloud service vendors without Our approval. It is subject to approval following a Security Review and Risk Assessment by Us.
Appears in 1 contract
Cloud Services and Systems. ▪ Any single image of data classified as Confidential defines the minimum-minimum security requirement for all virtual instances in the cloud. • ▪ Cloud based systems may contain Confidential Informationconfidential data. We reserve McAfee Enterprise reserves the right to perform a Security review and Risk Assessment of applications and services containing Confidential Information confidential data in the cloud before implementation.
(d) Existing services containing Confidential Information may not be pushed to the cloud or transferred to cloud service vendors without Our approval. It is subject to approval following a Security Review and Risk Assessment by Us.
Appears in 1 contract