Formal Security Policy Sample Clauses

Formal Security Policy. Consistent with the requirement of this Document, Service Provider will create and provide to City an information security policy that is approved by Service Provider’s management, published and communicated and agreed to be adhered to by all Service Provider’s employees, contractors and affiliates. Security Policy Review. Service Provider will review the information security policy at planned intervals or if significant changes occur to ensure its continuing suitability, adequacy, and effectiveness and may revise such policy, from time to time. Changes resulting in a lower standard of security or service must be agreed to by PCMC prior to adoption.
AutoNDA by SimpleDocs
Formal Security Policy. Policy documents that govern the protection of the data are the Indian Health Manual, Part 8, and the HHS Information Security Program Policy (see Addendum A).
Formal Security Policy. DPS developed these procedures under this DSA to ensure the protection of DPS data when it is being provided to outside entities. Entity must comply with the procedures of this DSA for all systems used to store, process, or transmit DPS data. DPS may modify these requirements in its discretion, in accordance with its cyber security policies.
Formal Security Policy. Consistent with the requirement of this Attachment, Provider will create and provide to Recipient an information security policy that is approved by Provider’s management, published and communicated to all Provider’s employees and relevant Providers.
Formal Security Policy. Policy documents that govern the protection of the data are covered by HUD OCIO's IT Security Policy Handbook and <Organization B's "YYY Policy>."
Formal Security Policy. Consistent with the requirement of this Schedule 1, Supplier will create and provide to Company an information security policy that is approved by Supplier’s management, published and communicated to all Supplier Personnel and relevant Providers.
Formal Security Policy. Policy documents that govern the protection of the data are U.S. CBP Customs Information Security Handbook (CIS HB) (HB 1400-05D), and Department of Homeland Security (DHS) –4300A Sensitive Systems Policy.
AutoNDA by SimpleDocs
Formal Security Policy. Policies that govern the protection of the information/data for [VA Organization 1] include but are not limited to VA Directive and Handbook 6500 (or successors). Policies that govern the protection of the information/data for [Organization 2]'s include but are not limited to [Policy Name and Identifier]. All documents are available upon request.
Formal Security Policy. Policy documents that govern the protection of the data are listed below: ● NIST SP 800-35, Guide to Information Technology Security Services, October 2003. ● NIST SP 800-47, Security Guide for Interconnecting Information Technology Systems, August 2002. ● NIST SP 800-53, Rev. 4, Security and Privacy Controls for Federal Information Systems and Organizations, April 2013 (updated January 22, 2015). ● UCAR Cybersecurity Policies: ○ UCAR Corporate Policy 1-7, Information Security, March 2019. ○ UCAR Corporate Policy 3-6, Access to and Use of Computer and Information Systems, May 2019. ● INPE/INPE-COSMIC-PGD InfoSec Policies: ○ INPE´s RE-DIR-568 - Normative document for the acceptable use of computational resources.
Formal Security Policy. Policy documents that govern the protection of the data are Department of Housing and Urban Development's IT Security Policy Handbook and Organization B's TBD Policy.
Time is Money Join Law Insider Premium to draft better contracts faster.