Enterprise Security Controls Sample Clauses

Enterprise Security Controls. All Services Area Control(s) Security Program Management Security Ownership. Citrix has appointed one or more security officers responsible for coordinating and monitoring the security controls for the Services. Security Roles and Responsibilities. Citrix personnel with access to Partner Personal Data are subject to confidentiality obligations. Service Security Policies. Citrix maintains a comprehensive Global Security Framework (GSF), which provides the overarching security and safety principles established and approved by Citrix executive management. Policies provide security requirements in a clear and concise manner. Standards define the process or methodology of meeting policy requirements. The GSF security program undergoes regular reviews and evaluations. Citrix maintains a summary of the GSF program and will provide it to Partners upon request. Product Risk Management. Citrix performs assessments of key areas of risk associated with the Services including, by way of example only and as applicable, privacy risk assessments, open source reviews and export control analysis. Asset Management Asset Inventory. Citrix maintains an inventory of Citrix-managed equipment used to perform the Services (“Assets”). Identified system owners are responsible for maintaining and updating the inventory as needed. Area Control(s) Asset and Data Handling Citrix identifies and classifies Partner Personal Data to ensure access is appropriately restricted. Citrix imposes restrictions on printing Partner Personal Data and disposing of printed materials that contain Partner Personal Data. Citrix personnel must obtain authorization prior to storing Partner Personal Data on portable devices, remotely accessing Partner Personal Data, or processing Partner Personal Data outside facilities managed by Citrix or its service providers. Access Management Access Policy. Citrix maintains a record of security privileges of individuals having access to Partner Personal Data and follows the principle of least- privilege. Access Authorization Citrix maintains and updates a record of personnel authorized to access Citrix systems that contain Partner Personal Data. New access to systems is reviewed and approved by management prior to being granted. Citrix performs regular reviews of user accounts and assigned permissions for key systems. Citrix identifies those personnel who may grant, alter or cancel authorized access to data and resources. Citrix ensures that where more than one individua...
AutoNDA by SimpleDocs
Enterprise Security Controls. All Services Area Control(s) Security Program Management Security Ownership. Citrix has appointed one or more security officers responsible for coordinating and monitoring the security controls for the Services. Security Roles and Responsibilities. Citrix personnel with access to Customer Content are subject to confidentiality obligations. Service Security Policies. Citrix maintains a comprehensive Global Security Framework (GSF), which provides the overarching security and safety principles established and approved by Citrix executive management. Policies provide security requirements in a clear and concise manner. Standards define the process or methodology of meeting policy requirements. The GSF security program undergoes regular reviews and evaluations. Citrix maintains a summary of the GSF program and will provide it to customers upon request. Product Risk Management. Citrix performs assessments of key areas of risk associated with the Services including, by way of example only and as applicable, privacy risk assessments, open source reviews and export control analysis. Asset Management Asset Inventory. Citrix maintains an inventory of Citrix-managed equipment used to perform the Services (“Assets”). Identified system owners are responsible for maintaining and updating the inventory as needed. Asset and Data Handling Citrix identifies and classifies Customer Content to ensure access is appropriately restricted. Citrix imposes restrictions on printing Customer Content and disposing of printed materials that contain Customer Content. Citrix personnel must obtain authorization prior to storing Customer Content on portable devices, remotely accessing Customer Content, or processing Customer Content outside facilities managed by Citrix or its service providers.

Related to Enterprise Security Controls

  • Security Controls Annually, upon Fund’s reasonable request, Transfer Agent shall provide Fund’s Chief Information Security Officer or his or her designee with a copy of its corporate information security controls that form the basis for Transfer Agent’s Security Policy and an opportunity to discuss Transfer Agent’s information security measures, and a high level summary of any vulnerability testing conducted by Transfer Agent on its information security controls, with a qualified member of Transfer Agent’s information technology management team. Transfer Agent shall review its Security Policy annually.

  • Technical Security Controls 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.

  • Audit Controls P. Contractor agrees to an annual system security review by the County to assure that systems processing and/or storing Medi-Cal PII are secure. This includes audits and keeping records for a period of at least three (3) years. A routine procedure for system review to catch unauthorized access to Medi-Cal PII shall be established by the Contractor.

  • Financial Management System Subrecipient shall establish and maintain a sound financial management system, based upon generally accepted accounting principles. Contractor’s system shall provide fiscal control and accounting procedures that will include the following:

  • Management and Financial Controls At all times, the School shall maintain appropriate governance and management procedures and financial controls which shall include, but not be limited to: (a) budgets, (b) accounting policies and procedures, (c) payroll procedures,

  • Institutional and Controls The controls and requirements listed in the Department approved Site Management Plan ("SMP") including any and all Department approved amendments to the SMP are incorporated into and made part of this Environmental Easement. These controls and requirements apply to the use of the Controlled Property, run with the land, are binding on the Grantor and the Grantor's successors and assigns, and are enforceable in law or equity against any owner of the Controlled Property, any lessees and any person using the Controlled Property.

  • Financial Controls At all times, the Charter School shall maintain appropriate governance and managerial procedures and financial controls which procedures and controls shall include, but not be limited to: (1) commonly accepted accounting practices and the capacity to implement them (2) a checking account; (3) adequate payroll procedures; (4) procedures for the creation and review of monthly and quarterly financial reports, which procedures shall specifically identify the individual who will be responsible for preparing such financial reports in the following fiscal year; (5) internal control procedures for cash receipts, cash disbursements and purchases; and (6) maintenance of asset registers and financial procedures for grants in accordance with applicable state and federal law.

  • Supervisory Control and Data Acquisition (SCADA) Capability The wind plant shall provide SCADA capability to transmit data and receive instructions from the ISO and/or the Connecting Transmission Owner for the Transmission District to which the wind generating plant will be interconnected, as applicable, to protect system reliability. The Connecting Transmission Owner for the Transmission District to which the wind generating plant will be interconnected and the wind plant Developer shall determine what SCADA information is essential for the proposed wind plant, taking into account the size of the plant and its characteristics, location, and importance in maintaining generation resource adequacy and transmission system reliability in its area.

  • Operator’s Security Contact Information Xxxxxxx X. Xxxxxxx Named Security Contact xxxxxxxx@xxxxxxxxx.xxx Email of Security Contact (000) 000-0000 Phone Number of Security Contact

  • Personnel Controls The County Department/Agency agrees to advise County Workers who have access to Pll, of the confidentiality of the information, the safeguards required to protect the information, and the civil and criminal sanctions for non- compliance contained in applicable federal and state laws. For that purpose, the County Department/Agency shall implement the following personnel controls:

Time is Money Join Law Insider Premium to draft better contracts faster.