Information Security Framework Sample Clauses

Information Security Framework. Supplier shall follow a leading, industry recognized cyber security framework, e.g., National Institute of Standards and Technology (NIST), or International Organization for Standardization (ISO) 27001. Each year, Supplier shall complete UL Solutions’ supplier cybersecurity assessment questionnaire. If Supplier fails to satisfy UL Solutions’ supplier security assessment in UL Solutions’ sole opinion, UL Solutions may terminate any relevant SOW by giving Supplier fifteen (15) days’ prior written notice.
AutoNDA by SimpleDocs
Information Security Framework. Buyer highly recommends Supplier shall adopt and follow an industry recognized cybersecurity framework such as Health Information Trust Alliance (“HITRUST”) framework; or, National Institute of Standards and Technology (NIST), or International Organization for Standardization (ISO) 27001. Each year, Supplier shall complete Buyer’s vendor security assessment questionnaire and provide supporting documentary evidence. In the event, that there are security findings identified because of the Buyer’s security assessment, Supplier shall agree to remediate the security findings within the Buyer’s defined remediation timeframes. If Supplier fails to complete Xxxxx’s vendor security assessment questionnaire and/or vendor security assessment remediation efforts in Xxxxx’s sole opinion, Buyer may terminate any PA or SOW by giving Supplier fifteen (15) days’ prior written notice.
Information Security Framework. Buyer strongly encourages and highly recommends Vendor (a) obtain within 2 years from the Effective Date, and maintain thereafter, a Health Information Trust Alliance (“HITRUST”) certification; or, (b) promptly adopt and follow an alternative leading, industry recognized cyber security framework, e.g., National Institute of Standards and Technology (NIST), or International Organization for Standardization (ISO) 27001. Each year, Supplier shall either provide a HITRUST certification that covers the scope of services being provided to Buyer or complete Buyer’s vendor security assessment questionnaire. If Vendor fails to obtain or maintain a HITRUST certification or is unable to satisfy Buyer’s vendor security assessment in Buyer’s sole opinion, Buyer may terminate any PA or SOW by giving Vendor fifteen (15) days’ prior written notice.
Information Security Framework. The Operator must define, document, and assign ownership to oversee development, adoption, enforcement and compliance with Information Security requirements, policies, standards, and procedures. The Operator must ensure that the assigned role is of a sufficiently high-level classification in the organization that can be allowed to execute the responsibilities in an effective and independent manner.
Information Security Framework a) Security Accountability. Jamf will assign one or more security officers who will be responsible for coordinating and monitoring all information security functions, policies and procedures.
Information Security Framework 

Related to Information Security Framework

  • Information Security IET information security management practices, policies and regulatory compliance requirements are aimed at assuring the confidentiality, integrity and availability of Customer information. The UC Xxxxx Cyber-safety Policy, UC Xxxxx Security Standards Policy (PPM Section 310-22), is adopted by the campus and IET to define the responsibilities and key practices for assuring the security of UC Xxxxx computing systems and electronic data.

  • Personal Information security breach Supplier/Service Provider’s Obligations a) The Supplier/Service Provider shall notify the Information Officer of Transnet, in writing as soon as possible after it becomes aware of or suspects any loss, unauthorised access or unlawful use of any personal data and shall, at its own cost, take all necessary remedial steps to mitigate the extent of the loss or compromise of personal data and to restore the integrity of the affected Goods/Services as quickly as is possible. The Supplier/Service Provider shall also be required to provide Transnet with details of the persons affected by the compromise and the nature and extent of the compromise, including details of the identity of the unauthorised person who may have accessed or acquired the personal data. b) The Supplier/Service Provider shall provide on-going updates on its progress in resolving the compromise at reasonable intervals until such time as the compromise is resolved. c) Where required, the Supplier/Service Provider may be required to notify the South African Police Service; and/or the State Security Agency and where applicable, the relevant regulator and/or the affected persons of the security breach. Any such notification shall always include sufficient information to allow the persons to take protective measures against the potential consequences of the compromise. d) The Supplier/Service Provider undertakes to co‑operate in any investigation relating to security which is carried out by or on behalf of Transnet including providing any information or material in its possession or control and implementing new security measures.

  • Contractor Security Clearance Customers may designate certain duties and/or positions as positions of “special trust” because they involve special trust responsibilities, are located in sensitive locations, or have key capabilities with access to sensitive or confidential information. The designation of a special trust position or duties is at the sole discretion of the Customer. Contractor or Contractor’s employees and Staff who, in the performance of this Contract, will be assigned to work in positions determined by the Customer to be positions of special trust, may be required to submit to background screening and be approved by the Customer to work on this Contract.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!