Information Security Audit Sample Clauses

Information Security Audit. BNY Mellon shall conduct penetration testing (including through a reputable third party recognized by the information security industry), at least once every rolling 12-month period, to review and assess the adequacy of BNY Mellon’s information security measures, and BNY Mellon shall, at Voya’s request, provide Voya with evidence that such testing has been performed.
AutoNDA by SimpleDocs
Information Security Audit. Cognizant Group agrees that, subject to the provisions set forth in Section 12.06, an NAIC Auditor may from time-to-time conduct penetration testing and on-site inspections to review and assess the adequacy of Cognizant Group’s information security measures and Cognizant Group shall, at no additional cost or expense to NAIC Group, promptly remedy all deficiencies found as a result of such assessment.
Information Security Audit. In addition to the audit rights granted in clause 13 above, NTT (and its representatives) will have the right to audit Supplier’s premises and information security program, upon reasonable advance notice, in order to confirm Supplier’s compliance with the terms set out in this Part 3.
Information Security Audit. Upon prior written notice and at a mutually acceptable time, Client or Client representatives (e.g., external audit consultants or regulators) may audit, test and/or inspect the Accenture’s Data Protection Procedures and the Accenture’s facilities to assure Client Confidential Information is adequately protected. This information security audit is in addition to other audit rights granted herein. The Parties will mutually agree upon the scope of such audits, tests or inspections, which may extend to Accenture subcontractor and Pre-Approved Subcontractors listed in the applicable SOW locations and other Accenture resources (other systems, environmental support, recovery processes, data centers, backup locations, call centers etc.) used to support the systems and handling of Confidential Information, provided that Client shall not be provided access to the data of any other Accenture client or to personal data of Accenture Personnel. Accenture shall inform Client of any internal auditing capability it possesses and permit Client to consult on a confidential basis with such auditors at all reasonable times. Accenture shall promptly take action at its expense to correct all issues identified by an information security audit that, Client, in its reasonable discretion, identifies as requiring correction.
Information Security Audit. (a) TSYS will use commercially reasonable security measures to safeguard its computer systems and physical facilities against (i) the unauthorized destruction, loss, alteration of, or access to COMPANY’s Confidential Information, whether such information is at or on TSYS’ systems or facilities or in transit; and (ii) interruption or disruption of the Services being provided hereunder to COMPANY. TSYS reserves the right to make changes in its security infrastructure and procedures from time to time, so long as TSYS maintains compliance with applicable Laws and Regulations as defined in Section 10.3 of this Agreement.
Information Security Audit. Notwithstanding the foregoing, Supplier agrees that, subject to the provisions set forth in Section 12.04, a Voya Auditor may from time-to-time conduct on-site inspections to review and assess the adequacy of Supplier's information security measures and Supplier shall, at no additional cost or expense to Voya Group, promptly remedy all deficiencies found as a result of such assessment.
Information Security Audit 
AutoNDA by SimpleDocs

Related to Information Security Audit

  • Information Security IET information security management practices, policies and regulatory compliance requirements are aimed at assuring the confidentiality, integrity and availability of Customer information. The UC Xxxxx Cyber-safety Policy, UC Xxxxx Security Standards Policy (PPM Section 310-22), is adopted by the campus and IET to define the responsibilities and key practices for assuring the security of UC Xxxxx computing systems and electronic data.

  • Information Security Program (1) DTI shall implement and maintain a comprehensive written information security program applicable to the Personal Information ("Information Security Program") which shall include commercially reasonable measures, including, as appropriate, policies and procedures and technical, physical, and administrative safeguards that are consistent with industry standards, providing for (i) the security and confidentiality of the Personal Information, (ii) protection of the Personal Information against reasonably foreseeable threats or hazards to the security or integrity of the Personal Information, (iii) protection against unauthorized access to or use of or loss or theft of the Personal Information, and (iv) appropriate disposal of the Personal Information. Without limiting the generality of the foregoing, the Information Security Program shall provide for (i) continual assessment and re-assessment of the risks to the security of Personal Information acquired or maintained by DTI and its agents, contractors and subcontractors in connection with the Services, including but not limited to (A) identification of internal and external threats that could result in unauthorized disclosure, alteration or destruction of Personal Information and systems used by DTI and its agents, contractors and subcontractors, (B) assessment of the likelihood and potential damage of such threats, taking into account the sensitivity of such Personal Information, and (C) assessment of the sufficiency of policies, procedures, information systems of DTI and its agents, contractors and subcontractors, and other arrangements in place, to control risks; and (ii) appropriate protection against such risks.

  • Information Regarding Collateral All information supplied to Administrative Agent by or on behalf of any Loan Party with respect to any of the Collateral (in each case taken as a whole with respect to any particular Collateral) is accurate and complete in all material respects.

  • Access to Information; Independent Investigation Prior to the execution of this Agreement, the Subscriber has had the opportunity to ask questions of and receive answers from representatives of the Company concerning an investment in the Company, as well as the finances, operations, business and prospects of the Company, and the opportunity to obtain additional information to verify the accuracy of all information so obtained. In determining whether to make this investment, Subscriber has relied solely on Subscriber’s own knowledge and understanding of the Company and its business based upon Subscriber’s own due diligence investigation and the information furnished pursuant to this paragraph. Subscriber understands that no person has been authorized to give any information or to make any representations which were not furnished pursuant to this Section 2 and Subscriber has not relied on any other representations or information in making its investment decision, whether written or oral, relating to the Company, its operations and/or its prospects.

Time is Money Join Law Insider Premium to draft better contracts faster.