Information Security Management Program. Sumo Logic will maintain throughout the Term of the Agreement an information security management program (the “ISMP”) designed to protect and secure Your Data from unauthorized access or use. The ISMP will be documented and updated based on changes in applicable legal and regulatory requirements related to privacy and data security practices and industry standards.
Information Security Management Program. 2.1. Supplier shall have an Information Security Management Program ("ISMP") that addresses the overall security program of Supplier. The ISMP shall be formally documented, and such records shall be protected, controlled, and retained according to federal, state, and internal requirements.
Information Security Management Program. Ultimate Software shall maintain a documented, approved and implemented information security management program in accordance with generally accepted industry standard practices that include reasonable administrative, technical, and physical safeguards to protect assets and Customer Data from loss, misuse, unauthorized access, disclosure, alteration, and destruction. The information security management program will address the following areas: risk management, security policy, organization of information security, human resources security, asset management, access control, cryptography, physical and environmental security, operations security, communications security, system acquisition, development, and maintenance, supplier management, information security incident management, information security aspects of business continuity management, and compliance. Data Protection When working with Customer Data, Ultimate Software shall maintain the following: Designated security and privacy personnel and departments responsible for the development and implementation of the information security and privacy practices required by this Agreement and applicable law; Require background checks (including criminal) on its workforce; Implement reasonably appropriate security and privacy awareness training for all members of its workforce; Transfer and store Customer Data in an encrypted/secure manner; Shall not store Customer Data on unencrypted mobile devices or media, such as laptops, phones, USB drives, etc; Implement reasonably appropriate technical safeguards to protect Customer Data, such as firewalls, intrusions detection systems, logging and monitoring systems, access control systems and encryption; Restrict access to data, applications, systems, databases and networks to approved users with a business need/job responsibility. Reasonably timely de-provisioning, revocation or modification of user access to Ultimate Software’s systems, information assets and Customer Data shall be implemented by Ultimate Software upon any change in status of employees, contractors, customers, business partners or third parties. Any change in status is intended to include termination of employment, contract or agreement, change of employment, transfer within the organization or change in SaaS Service delivery. Maintain procedures for data retention and storage, and backup/redundancy mechanisms. Ultimate Software will test the recovery of backups at planned intervals Implement reasona...
Information Security Management Program. Administrative Safeguards Uberflip maintains an information security management program that includes a security policy, change management plan, patch management plan, incident management plan, backup and disaster recovery processes and procedures, business continuity procedures, and risk management standards. The information security management program is designed to help safeguard data transferred by Customer or its permitted agents to Uberflip, and any information derived or otherwise created by Uberflip in connection therewith, against unlawful loss, access or disclosure, as well as to identify and minimize reasonably foreseeable risks through risk assessment and regular testing. Access to Uberflip’s data centers is granted only when needed, and then only for a reasonable amount of time, and is reviewed regularly by engineering management. Uberflip has implemented specific human resource policies that every new employee must sign and agree to before beginning work at Uberflip: • Each employee goes through a detailed background check, including criminal record and reference checks.. • Employees are required to sign non-disclosure and confidentiality clauses as part of their employment agreements. These are both for internal technologies used by Uberflip (proprietary information), and any client-facing aspects (privacy policies, personal information on users, etc.).
Information Security Management Program. An Information Security Management Program (ISMP) shall be formally established, implemented, operated and maintained. [Core-15(b)] The ISMP shall be reviewed and updated at least annually considering the needs of the organization and changes on existing business requirements, technologies, threats and risk facing the organization. [Core-15(b)] TSM Senior Management support for the ISMP shall be demonstrated through signed acceptance or approval by management of the program. [Core-15(b)] The ISMP shall include the relevant security domains for proper management of the program as required by HITRUST. [Core-15(b)] Personnel assigned with formal responsibilities in the ISMP must be competent in information security tasks. [Core-15(b)]
Information Security Management Program. Box will maintain throughout the Term of the Agreement an information security management program (the “ISMP”) designed to protect and secure Content from unauthorized access or use. The ISMP will be documented and updated based on changes in applicable legal and regulatory requirements related to privacy and data security practices and industry standards.
Information Security Management Program. Kronos shall maintain a documented, approved and implemented information security management program in accordance with generally accepted industry standard practices that include reasonable administrative, technical, and physical safeguards to protect assets and Customer Data from loss, misuse, unauthorized access, disclosure, alteration, and destruction. The information security management program will address the following areas: risk management, security policy, organization of information security, human resources security, asset management, access control, cryptography, physical and environmental security, operations security, communications security, system acquisition, development, and maintenance, supplier management, information security incident management, information security aspects of business continuity management, and compliance.
Information Security Management Program. Team FanClub shall maintain a documented, approved and implemented information security management program to protect Personal Data from unauthorized access, acquisition, disclosure, destruction, alteration, accidental loss, misuse, or damage in accordance with generally accepted industry standard practices that include reasonable administrative, technical, and physical safeguards to protect assets and Personal Data from loss, misuse, unauthorized access, disclosure, alteration, and destruction. The information security management program will address the following areas: risk management, security policy, organization of information security, human resources security, asset management, access control, cryptography, physical and environmental security, operations security, communications security, system acquisition, development, and maintenance, supplier management, information security incident management, information security aspects of business continuity management, and compliance.
Information Security Management Program. UKG shall maintain a documented, approved and implemented information security management program in accordance with generally accepted industry standard practices that include reasonable administrative, technical, and physical safeguards to protect assets and Customer Data from loss, misuse, unauthorized access, disclosure, alteration, and destruction. The information security management program will address the following areas: risk management, security policy, organization of information security, human resources security, asset management, access control, cryptography, physical and environmental security, operations security, communications security, system acquisition, development, and maintenance, supplier management, information security incident management, information security aspects of business continuity management, and compliance.
Information Security Management Program. Ultimate Software shall maintain a documented, approved and implemented information security management program in accordance with generally accepted industry standard practices that include reasonable administrative, technical, and physical safeguards to protect assets and Customer Data from loss, misuse, unauthorized access, disclosure, alteration, and destruction. The information security management program will address the following areas: risk management, security policy, organization of information security, human resources security, asset management, access control, cryptography, physical and environmental security, operations security, communications security, system acquisition, development, and maintenance, supplier management, information security incident management, information security aspects of business continuity management, and compliance.