Continued Evaluation. AWS will conduct periodic reviews of the security of its AWS Network and adequacy of its information security program as measured against industry security standards and its policies and procedures. AWS will continually evaluate the security of its AWS Network and associated Services to determine whether additional or different security measures are required to respond to new security risks or findings generated by the periodic reviews.
Appears in 15 contracts
Samples: Data Processing Addendum, Data Processing Addendum, Data Processing Addendum
Continued Evaluation. AWS will conduct periodic reviews of the information security of its program for the AWS Network and adequacy of Network. AWS will update or alter its information security program as measured against industry security standards and its policies and procedures. AWS will continually evaluate the security of its AWS Network and associated Services to determine whether additional or different security measures are required necessary to respond to new security risks or findings generated by the periodic reviewsand to take advantage of new technologies.
Appears in 1 contract
Samples: Data Processing Addendum
Continued Evaluation. AWS will conduct periodic reviews of the security of its AWS Network and adequacy of its information security program as measured against industry security standards and its policies and procedures. AWS will continually evaluate the security of its AWS Network and associated Services AWS web services to determine whether additional or different security measures are required to respond to new security risks or findings generated by the periodic reviews.
Appears in 1 contract
Samples: Master Subscription Agreement
Continued Evaluation. AWS will conduct periodic reviews of the security of its AWS Network and adequacy of its information security program as measured against industry security standards and its policies and procedures. AWS will continually evaluate the security of its AWS Network and associated Services to determine whether additional or different security measures are required to respond to new security risks or findings generated by the periodic reviews.its
Appears in 1 contract
Samples: Data Processing Addendum