Information Security Management System Sample Clauses

Information Security Management System. 1. A general security policy has been developed, along with specific security policies regarding organization security, information security, IT system security and security of people and property, all of them defining the basic objectives of the actions related to implementation of the policies.
AutoNDA by SimpleDocs
Information Security Management System. Box will maintain throughout the Term of the Agreement a comprehensive information security management system (the “ISMS”) which includes administrative, technical and physical safeguards designed to: (a) protect and secure Content from unauthorized access, use or disclosure; and (b) protect against anticipated threats or hazards to the security or integrity of Customer’s Content. The ISMS will be documented and kept current by Box based on changes to industry standard information security practices and legal and regulatory requirements applicable to Box.
Information Security Management System. 2.1. Xxxx & Xxxxxx’x Information Security Polices set a clear direction for Information Security and demonstrate support for, and commitment to the management of Information Security throughout the company.
Information Security Management System. Processes for regularly testing, assessing and evaluating the effectiveness of technical and organizational measures in order to ensure the security of the processing Cloudinary has an ISMS (Information Security Management System) in place to evaluate risks to the security of data, to manage the assessment and treatment of these risks and to continually improve its information security. It includes all aspects of the company – people, processes, and systems – by applying a risk-based approach. Cloudinary ISMS has been inspired and based upon industry best practices, frameworks and standards such as ISO/IEC 27001:2013.
Information Security Management System. 1. A general security policy has been developed, along with specific security policies regarding organization security, information security, IT system security and security of people and property, all of them defining the basic objectives of the actions related to implementation of the policies. 2. General and specific security standards have been defined that implement the assumptions of the security policies in terms of information security, IT system security, and security of people and property. 3. Specific procedures and operating instructions have been developed for the implementation of the security standards in terms of information security, IT system security, and security of people and property. 4. The policies, standards, procedures, and instructions are subject to periodic reviews and revisions, to be approved by the Company’s top management. 5. A system to monitor changes in personal data processing legislation has been developed and put in place, and the continuity of its operations has been ensured.
Information Security Management System. 8.10.1 Critical The Service Provider must develop and maintain an Information Security Management System (ISMS) and ensure alignment of their technical controls with both the Cyber Essentials scheme and the specific Census technical security controls. Response
Information Security Management System. Cloudinary has an ISMS (Information Security Management System) in place to evaluate risks to the security of data, to manage the assessment and treatment of these risks and to continually improve its information security. It includes all aspects of the company – people, processes, and systems – by applying a risk-based approach. Cloudinary ISMS has been inspired and based upon industry best practices, frameworks and standards such as ISO/IEC 27001:2013.
AutoNDA by SimpleDocs
Information Security Management System. Cohesity implements an Information Security Management System (“ISMS”) that establishes security controls to meet its objectives. The ISMS is aligned to ISO 27001 and the NIST CyberSecurity Framework. The ISMS policy and associated controls are reviewed no less than once per annum.
Information Security Management System. In carrying out the Works, the Contractor may be required to comply with Sarawak Energy's information security management system ("ISMS") requirements as may be notified by Sarawak Energy to the Contractor from time to time. Such requirements may include the vetting of those personnel required to work within identified restricted access zones across Sarawak Energy's generation, transmission and distribution assets, including any related IT networks and services. Subject to Sarawak Energy's specific ISMS requirements, the Contractor may also be required to establish its own procedures and protocol with respect to the security of any third party software required to be installed within Sarawak Energy's network.
Information Security Management System. Provider will maintain and continually make improvements to a documented information security management system in accordance with standard practices and accepted frameworks in Provider’s industry for the delivery of Services which its personnel are to be made aware of and comply with (“Information Security Management System”).
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!