Information Security Management Program. Sumo Logic will maintain throughout the Term of the Agreement an information security management program (the “ISMP”) designed to protect and secure Your Data from unauthorized access or use. The ISMP will be documented and updated based on changes in applicable legal and regulatory requirements related to privacy and data security practices and industry standards.
Information Security Management Program. 2.1. Supplier shall have an Information Security Management Program ("ISMP") that addresses the overall security program of Supplier. The ISMP shall be formally documented, and such records shall be protected, controlled, and retained according to federal, state, and internal requirements.
2.2. Supplier management support for the ISMP shall be demonstrated through signed acceptance or approval by Supplier’s management.
2.3. Buyer shall have the right to assess with reasonable notice the effectiveness of the ISMP by reviewing Supplier's information security policy, information security objectives, audit results, analysis of monitored events, corrective and preventive actions, and management support at least annually.
Information Security Management Program. UKG shall maintain a documented, approved and implemented information security management program in accordance with generally accepted industry standard practices that include reasonable administrative, technical, and physical safeguards to protect assets and Customer Data from loss, misuse, unauthorized access, disclosure, alteration, and destruction. The information security management program will address the following areas: risk management, security policy, organization of information security, human resources security, asset management, access control, cryptography, physical and environmental security, operations security, communications security, system acquisition, development, and maintenance, supplier management, information security incident management, information security aspects of business continuity management, and compliance.
Information Security Management Program. Team FanClub shall maintain a documented, approved and implemented information security management program to protect Personal Data from unauthorized access, acquisition, disclosure, destruction, alteration, accidental loss, misuse, or damage in accordance with generally accepted industry standard practices that include reasonable administrative, technical, and physical safeguards to protect assets and Personal Data from loss, misuse, unauthorized access, disclosure, alteration, and destruction. The information security management program will address the following areas: risk management, security policy, organization of information security, human resources security, asset management, access control, cryptography, physical and environmental security, operations security, communications security, system acquisition, development, and maintenance, supplier management, information security incident management, information security aspects of business continuity management, and compliance.
Information Security Management Program. Kronos shall maintain a documented, approved and implemented information security management program in accordance with generally accepted industry standard practices that include reasonable administrative, technical, and physical safeguards to protect assets and Customer Data from loss, misuse, unauthorized access, disclosure, alteration, and destruction. The information security management program will address the following areas: risk management, security policy, organization of information security, human resources security, asset management, access control, cryptography, physical and environmental security, operations security, communications security, system acquisition, development, and maintenance, supplier management, information security incident management, information security aspects of business continuity management, and compliance.
Information Security Management Program. Ultimate Software shall maintain a documented, approved and implemented information security management program in accordance with generally accepted industry standard practices that include reasonable administrative, technical, and physical safeguards to protect assets and Customer Data from loss, misuse, unauthorized access, disclosure, alteration, and destruction. The information security management program will address the following areas: risk management, security policy, organization of information security, human resources security, asset management, access control, cryptography, physical and environmental security, operations security, communications security, system acquisition, development, and maintenance, supplier management, information security incident management, information security aspects of business continuity management, and compliance.
Information Security Management Program. Administrative Safeguards
Information Security Management Program. Ultimate Software shall maintain a documented, approved and implemented information security management program in accordance with generally accepted industry standard practices that include reasonable administrative, technical, and physical safeguards to protect assets and Customer Data from loss, misuse, unauthorized access, disclosure, alteration, and destruction. The information security management program will address the following areas: risk management, security policy, organization of information security, human resources security, asset management, access control, cryptography, physical and environmental security, operations security, communications security, system acquisition, development, and maintenance, supplier management, information security incident management, information security aspects of business continuity management, and compliance. When working with Customer Data, Ultimate Software shall maintain the following: Designated security and privacy personnel and departments responsible for the development and implementation of the information security and privacy practices required by this Agreement and applicable law; Require background checks (including criminal) on its workforce; Implement reasonably appropriate security and privacy awareness training for all members of its workforce; Transfer and store Customer Data in an encrypted/secure manner; Shall not store Customer Data on unencrypted mobile devices or media, such as laptops, phones, USB drives, etc; Implement reasonably appropriate technical safeguards to protect Customer Data, such as firewalls, intrusions detection systems, logging and monitoring systems, access control systems and encryption; Restrict access to data, applications, systems, databases and networks to approved users with a business need/job responsibility. Reasonably timely de-provisioning, revocation or modification of user access to Ultimate Software’s systems, information assets and Customer Data shall be implemented by Ultimate Software upon any change in status of employees, contractors, customers, business partners or third parties. Any change in status is intended to include termination of employment, contract or agreement, change of employment, transfer within the organization or change in SaaS Service delivery. Maintain procedures for data retention and storage, and backup/redundancy mechanisms. Ultimate Software will test the recovery of backups at planned intervals Implement reasonable physical saf...
Information Security Management Program. Box will maintain throughout the Term of the Agreement an information security management program (the “ISMP”) designed to protect and secure Content from unauthorized access or use. The ISMP will be documented and updated based on changes in applicable legal and regulatory requirements related to privacy and data security practices and industry standards.
Information Security Management Program. An Information Security Management Program (ISMP) shall be formally established, implemented, operated and maintained. [Core-15(b)] The ISMP shall be reviewed and updated at least annually considering the needs of the organization and changes on existing business requirements, technologies, threats and risk facing the organization. [Core-15(b)] TSM Senior Management support for the ISMP shall be demonstrated through signed acceptance or approval by management of the program. [Core-15(b)] The ISMP shall include the relevant security domains for proper management of the program as required by HITRUST. [Core-15(b)] Personnel assigned with formal responsibilities in the ISMP must be competent in information security tasks. [Core-15(b)]