Information Security Advice, Guidance Sample Clauses

Information Security Advice, Guidance. Reporting Information security advice and relay important events to client information governance/information security leads and senior managers. Electronic prompts to staff to agree the staff confidentiality agreement Represent Information Security at client forums and meetings. Provide Customers with the necessary evidence to deliver their Information Governance agenda and compliance requirements.
AutoNDA by SimpleDocs
Information Security Advice, Guidance. Reporting The Provider can provide the Customer with the necessary advice and guidance to make informed decisions on their Information Governance agenda and compliance requirements. This service includes: - Provision of information security advice and relay important events to client information governance/information security leads and senior managers. - Electronic prompts to staff to agree the staff confidentiality agreement - Represent Information Security at client forums and meetings. Provide Customers with the necessary evidence to deliver their Information Governance agenda and compliance requirements.

Related to Information Security Advice, Guidance

  • Information Security IET information security management practices, policies and regulatory compliance requirements are aimed at assuring the confidentiality, integrity and availability of Customer information. The UC Xxxxx Cyber-safety Policy, UC Xxxxx Security Standards Policy (PPM Section 310-22), is adopted by the campus and IET to define the responsibilities and key practices for assuring the security of UC Xxxxx computing systems and electronic data.

  • Information Security Program (1) DTI shall implement and maintain a comprehensive written information security program applicable to the Personal Information ("Information Security Program") which shall include commercially reasonable measures, including, as appropriate, policies and procedures and technical, physical, and administrative safeguards that are consistent with industry standards, providing for (i) the security and confidentiality of the Personal Information, (ii) protection of the Personal Information against reasonably foreseeable threats or hazards to the security or integrity of the Personal Information, (iii) protection against unauthorized access to or use of or loss or theft of the Personal Information, and (iv) appropriate disposal of the Personal Information. Without limiting the generality of the foregoing, the Information Security Program shall provide for (i) continual assessment and re-assessment of the risks to the security of Personal Information acquired or maintained by DTI and its agents, contractors and subcontractors in connection with the Services, including but not limited to (A) identification of internal and external threats that could result in unauthorized disclosure, alteration or destruction of Personal Information and systems used by DTI and its agents, contractors and subcontractors, (B) assessment of the likelihood and potential damage of such threats, taking into account the sensitivity of such Personal Information, and (C) assessment of the sufficiency of policies, procedures, information systems of DTI and its agents, contractors and subcontractors, and other arrangements in place, to control risks; and (ii) appropriate protection against such risks.

  • Trade Secrets, Commercial and Financial Information It is expressly understood that Mississippi law requires that the provisions of this contract which contain the commodities purchased or the personal or professional services provided, the price to be paid, and the term of the contract shall not be deemed to be a trade secret or confidential commercial or financial information and shall be available for examination, copying, or reproduction.

  • Personal Information security breach Supplier/Service Provider’s Obligations

  • HOW WE MAY USE YOUR PERSONAL INFORMATION 8.1 We will use the personal information You provide to Us to:

  • Personal Information Protection Each party represents and warrants that procedures compatible with relevant personal information and data protection laws and regulations will be employed so that processing and transfer of such information and data identifiers will not be impeded. d.

  • Information provision In respect of any Restriction of Use Day for which compensation may be payable in a Period under paragraphs 3 and 4, Network Rail shall accurately record such information as it uses and as may properly and reasonably be required to make the calculations required under paragraphs 3 and 4 (including the determination of NF and the relevant version of the Working Timetable referred to in paragraph 9.1(b)(ii) or paragraph 9.2(b)(i)). Network Rail shall maintain that information until the compensation payable under paragraphs 3 and 4 in respect of that Period is finally agreed or determined and provide such information to the Train Operator at its reasonable request.

  • Securities Law Information The Participant acknowledges that he or she is permitted to sell the Shares acquired under the Plan through the designated broker appointed by the Company, provided the sale of the Shares takes place outside of Canada through facilities of a stock exchange on which the Shares are listed (i.e., the NYSE).

  • INFORMATION OF THE GROUP The Group is principally engaged in the provision of high quality and comprehensive range of liquid petrochemical terminal and storage services in the PRC. Ningbo Ningxiang is an indirect jointly controlled entity of the Company.

  • Information Security Requirements In cases where the State is not permitted to manage/modify the automation equipment (server/computer/other) that controls testing or monitoring devices, the Contractor agrees to update and provide patches for the automation equipment and any installed operating systems or applications on a quarterly basis (at minimum). The Contractor will submit a report to the State of updates installed within 30 days of the installation as well as a Plan of Actions and Milestones (POA&M) to remediate any vulnerabilities ranging from Critical to Low. The contractor will provide an upgrade path or compensatory security controls for any operating systems and applications listed as beyond “end-of-life” or EOL, within 90 days of the EOL and complete the EOL system’s upgrade within 90 days of the approved plan.

Time is Money Join Law Insider Premium to draft better contracts faster.