Information Security Procedures Sample Clauses

The Information Security Procedures clause establishes the requirements and standards for protecting sensitive data and information within an organization or between contracting parties. It typically outlines the specific security measures, such as encryption, access controls, and regular audits, that must be implemented to safeguard information from unauthorized access or breaches. By setting clear expectations for information handling and security protocols, this clause helps prevent data loss, ensures compliance with relevant regulations, and mitigates the risk of cyber threats.
Information Security Procedures. It is critical that Highly Confidential Information be kept secure and protected from unauthorized disclosure. Therefore, all the Highly Confidential Information shared pursuant to this Agreement must be stored securely so that only authorized users within the organization have access to it. This means that computer data bases should be password protected; that precautions are taken to ensure that access through modems, networks, and the Internet is carefully monitored and limited to authorized users; and that data tapes, disks, paper files and other storage media are kept in secure locations.
Information Security Procedures. The Transfer Agent will maintain and enforce at the Transfer Agent’s service locations information protection procedures that are at least equal to the highest of the following: (a) the procedures employed by the Transfer Agent at locations utilized by the Transfer Agent to provide services to other similarly situated Transfer Agent customers, or (b) any higher standard or other procedures otherwise agreed upon by the Parties in writing.
Information Security Procedures. All ClientTrack employees and volunteers are responsible for protecting the confidentiality and security of ClientTrack systems and the human services client information they contain. Information concerning the security related tasks an employee is responsible for are included in the employee’s job description. The agency is responsible for ensuring that information that is printed from the ClientTrack system is also kept confidential, private and secure. Agencies that are covered by HIPAA include health care providers, health care plans, or healthcare clearinghouse should ensure that they are in compliance with all HIPAA regulations. For more information about HIPAA visit the following website: ▇▇▇▇://▇▇▇.▇▇▇.▇▇▇/ocr/privacy/hipaa/understanding/coveredentities/index.html
Information Security Procedures. Blue Planet employs industry standard security practices in accordance with Blue Planet's information security policies and procedures, as amended from time to time, a current copy of which is available here.
Information Security Procedures. Maintain, update and monitor procedures designed to protect Red Hat’s information systems from loss, damage, unauthorized disclosure or disruption of business, which includes the physical and logical protection of information systems including Personal Data that is processed or transmitted.
Information Security Procedures. These procedures are in addition to the requirements of the Agreement and present a minimum standard only. However, it is Transfer Agent’s sole obligation to (i) implement appropriate measures to secure its systems and data, including Portfolio Confidential Information, internal and external threats and risks; and (ii) continuously review and revise those measures to address ongoing threats and risks. Failure to comply with the minimum standards set forth in this Schedule will constitute a material, non-curable breach of the Agreement by Transfer Agent, entitling the Trust, in addition to and cumulative of all other remedies available to it at law, in equity, or under the Agreement, to immediately terminate the Agreement. Unless specifically defined in this Schedule, capitalized terms shall have the meanings set forth in the Agreement.
Information Security Procedures. All Vendor employees and volunteers are responsible for protecting the confidentiality and security of the GA DV Comparable Database and the Client information. Information concerning the security related tasks a Vendor employee is responsible for are included in the employee’s job description. Agencies are responsible for ensuring that information printed from the GA DV Comparable Database is also kept confidential, private and secure. Agencies that are covered by HIPAA should ensure that they are in compliance with all HIPAA regulations.
Information Security Procedures information security program for its hosted “software as a service” decision support system (the “Services”) is described below.