Information Security Controls Sample Clauses

Information Security Controls. Agent has established and during the Term will maintain an Information Security Standard aligned with industry practice (such as the International Organization for Standardization’s standards: ISO/IEC 2700 I: 201 3). Information security responsibilities are defined in the Information Security Standard and the Information Security Policy is reviewed on a periodic basis and approved by senior management.
AutoNDA by SimpleDocs
Information Security Controls. On any of Company’s systems that interface with Moloco’s infrastructure or systems, Company is solely responsible for maintaining appropriate information security safeguards (including, without limitation, firewalls, anti-virus software, intrusion detection software, etc.) to protect those systems against unauthorized access, use or interference. Moloco shall have no liability for failures of Company’s systems or loss or unauthorized access to or use of data stored on Company’s systems that result from Company’s failure to comply with this section.
Information Security Controls. DOCUMENT means the security requirements documents to be prepared by IBM and approved by SCA pursuant to the Transition Plan.
Information Security Controls 

Related to Information Security Controls

  • Information Security IET information security management practices, policies and regulatory compliance requirements are aimed at assuring the confidentiality, integrity and availability of Customer information. The UC Xxxxx Cyber-safety Policy, UC Xxxxx Security Standards Policy (PPM Section 310-22), is adopted by the campus and IET to define the responsibilities and key practices for assuring the security of UC Xxxxx computing systems and electronic data.

  • Security Controls for State Agency Data In accordance with Senate Bill 475, Acts 2021, 87th Leg., R.S., pursuant to Texas Government Code, Section 2054.138, Contractor understands, acknowledges, and agrees that if, pursuant to this Contract, Contractor is or will be authorized to access, transmit, use, or store data for System Agency, Contractor is required to meet the security controls the System Agency determines are proportionate with System Agency’s risk under the Contract based on the sensitivity of System Agency’s data and that Contractor must periodically provide to System Agency evidence that Contractor meets the security controls required under the Contract.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!