Information Security Infrastructure. Notwithstanding anything to the contrary, Vendor shall implement, maintain, comply with and enforce at least the following Info-Sec Policies and Info-Sec Controls:
Information Security Infrastructure
Information Security IET information security management practices, policies and regulatory compliance requirements are aimed at assuring the confidentiality, integrity and availability of Customer information. The UC Xxxxx Cyber-safety Policy, UC Xxxxx Security Standards Policy (PPM Section 310-22), is adopted by the campus and IET to define the responsibilities and key practices for assuring the security of UC Xxxxx computing systems and electronic data.