Information Security Compliance. 3.1 Supplier is responsible for the security of any Buyer Data to the extent it Processes such data. Supplier shall, at its sole cost and expense, implement Security Measures that are no less rigorous than, and shall only Process Buyer Data in such a manner so as to comply with: (a) a Security Framework; (b) Privacy and Security Laws; (c) MBN 9666 Standards (to the extent applicable to the Services), and (d) any other requirements of this Addendum or the Agreement.
Information Security Compliance. Ellucian will design and maintain a control environment for the Hosting Services aligned with global information security practices and standards such as ISO 27001 and third party attestation frameworks such as SSAE 16 / SOC 1 and SOC 2.
Information Security Compliance. Ellucian will design and maintain a control environment for the Cloud Software aligned with global information security practices and standards such as ISO 27001 and third-party attestation frameworks such as SSAE 18 / SOC 1 and SOC 2.
Information Security Compliance. 3.1 Agency is responsible for the Security of any Company Data to the extent it Processes such data. Agency shall, at its sole cost and expense, implement Security that is no less rigorous than, and shall only Process Company Data in such a manner so as to comply with: (a) a Security Framework; (b) Privacy and Security Laws; and (c) MBN 9666 Standards (to the extent applicable to the Services), and (d) any other requirements of this Addendum or the Agreement.
Information Security Compliance. 9.5.1 Contractor must comply with the following County Board of Supervisors approved information security policies, as applicable:
Information Security Compliance. Contractor shall perform periodic audits and maintain relevant security based certifications and/or independent assessments to demonstrate and substantiate the Contractor's compliance with applicable laws and terms and conditions governing the Contractor services. Xxxxxxx College reserves the right to request evidence of this compliance and Xxxxxxx College agrees to maintain any such evidence as Confidential Information of the Contractor and will not disclose such information unless under legal obligation or with the explicit permission of the Contractor to do so.
Information Security Compliance. Contractor warrants to the State that it is familiar with the requirements of the State of Tennessee Enterprise Information Security Policies, and has measures in place that ensure that all data records are transported, stored and accessed in a secure manner. All data is property of the State of Tennessee. The system or contractor must meet or exceed the State’s information security requirements for access control, authentication, storage, data destruction, system maintenance and patching and must be compliant with best practices for secure application development as defined in ISO/IEC 27000 series. The State of Tennessee Information Security policy can be found at the following link: xxxx://xxx.xx.xxx/assets/entities/finance/oir/attachments/PUBLIC-Enterprise-Information-Security-Policies-v2.0_1.pdf Contractor warrants that it will cooperate with the State in the course of performance of the Contract so that both parties will be in compliance with State Enterprise Information Security Policies requirements and any other state and federal computer security regulations including cooperation and coordination with State computer security officials and other compliance officers required by its regulations. The State may conduct audits of Contractor’s compliance with the State’s Enterprise Information Security Policy (“The Policy”) or under this Contract, including those obligations imposed by Federal or State law, regulation or policy. The State’s or State’s designee’s right to conduct security audits is independent of any other audit or monitoring required by this Contract. The timing and frequency of such audits shall be at the State’s discretion and may but not necessarily shall, be in response to a security incident. A security audit may include the following: (i) review of access logs, screen shots and other paper or electronic documentation relating to Contractor’s compliance with the Policy. This may include review of documentation relevant to subcontractors or suppliers of security equipment and services used with respect to State data; (ii) physical inspection of controls such as door locks, file storage, communications systems, and employee identification procedures; and (iii) interviews of responsible technical and management personnel regarding security procedures. Contractor shall provide reports or additional information upon request of the State and access by the State or the State's designated staff to Contractor’s facilities and/or any location...
Information Security Compliance a. The Contractor warrants to the State that Sub-vendor shall comply with information security as follows:
Information Security Compliance. 3.1 Licensee is responsible for the Security of any MBUSA Data to the extent it Processes such data. Licensee shall, at its sole cost and expense, implement Security that is no less rigorous than, and shall only Process MBUSA Data in such a manner so as to comply with: (a) the Security Framework; (b) Privacy and Security Laws; and (c) any other requirements of this Addendum or the Agreement. Licensee shall immediately notify MBUSA if Licensee knows that any written instruction by MBUSA would cause either or both parties to violate Privacy and Security Laws.
Information Security Compliance