Compliance with security policies and standards. Cisco’s management shall regularly review the compliance of information processing and procedures with the appropriate applicable security policies and standards.
Compliance with security policies and standards. HTL continuously reviews and audits operations, security arrangements and controls for compliance, evaluating and implementing appropriate actions to ensure conformance with the ISMS.
Compliance with security policies and standards. Managers review the compliance of information processing and procedures within their area of responsibility with the appropriate security policies, standards, and any other security requirements.
Compliance with security policies and standards. Supplier’s management shall regularly review the compliance of information processing and procedures with the appropriate applicable security policies and standards.
Compliance with security policies and standards. Supplier’s management shall regularly re- view the compliance of information processing and procedures with the appropriate applicable se- curity policies and standards.
Compliance with security policies and standards. Vertice’s management shall regularly review the compliance of information processing and procedures with the appropriate applicable security policies and standards.