General Security Policies Sample Clauses

General Security Policies. Provider takes the security and confidentiality of our Customer’s data (including Personal Data) seriously. Provider is committed to maintaining and improving its information security practices and minimizing exposure to security risks. To that end, details on Provider’s information security practices, data breach response policies, technical and organizational measures, and software development security practices are available at: xxx.xxxxx.xxx/xxxxx/xxxxxxxx.xxxx (collectively “Security Site”). Customer agrees that Provider may modify its Security Site so long as it does not materially decrease the overall level of protection provided.
AutoNDA by SimpleDocs
General Security Policies. Provider takes the security and confidentiality of our Customer’s data (including Personal Data) seriously. Provider is committed to maintaining and improving its information security practices and minimizing exposure to security risks. To that end, details on Provider’s information security practices, data breach response policies, technical and organizational measures, and software development security practices are available at: xxx.xxxxx.xxx/xxxxx/xxxxxxxx.xxxx (collectively “Security Site”). Customer agrees that Provider may modify its Security Site so long as it does not materially decrease the overall level of protection provided. In addition to the general security practices specified on the Security Site, for the KACE-as-a-Service Product, Provider will adhere to the security practices outlined in the KACE-as-a-Service Solutions Overview and FAQ document attached as Exhibit 3 to the Agreement. Customer agrees that Provider may modify policies specified therein so long as it does not materially decrease the overall level of protection provided. Provider will provide the then- current version of the Solutions Overview and FAQ document upon request.

Related to General Security Policies

  • Security Policies IBM maintains privacy and security policies that are communicated to IBM employees. IBM requires privacy and security training to personnel who support IBM data centers. We have an information security team. IBM security policies and standards are reviewed and re-evaluated annually. IBM security incidents are handled in accordance with a comprehensive incident response procedure.

  • Security Policy As part of PCI DSS, the Card Organizations require that you have a security policy that covers the security of credit card information.

Time is Money Join Law Insider Premium to draft better contracts faster.