Common use of Information Security Requirements Clause in Contracts

Information Security Requirements. Xxxxxx will maintain an information security program (including the adoption and enforcement of internal policies and procedures) designed to (a) secure the Services and Customer Property against accidental or unlawful loss, access, or disclosure, (b) identify reasonably foreseeable and internal risks to security and unauthorized access, and (c) minimize security risks, including through risk assessment and regular testing. As part of this information security program, Xxxxxx shall implement the security measures set forth at xxxxx.xxxxxx.xx/#xxxxxxxx-xxxxxxxxxxxx.

Appears in 3 contracts

Samples: Software as a Service Agreement, Software as a Service Agreement, Software as a Service Agreement

AutoNDA by SimpleDocs

Information Security Requirements. Xxxxxx will maintain an information security program (including the adoption and enforcement of internal policies and procedures) designed to (a) secure the Services and Customer Property against accidental or unlawful loss, access, or disclosure, (b) identify reasonably foreseeable and internal risks to security and unauthorized access, and (c) minimize security risks, including through risk assessment and regular testing. As part of this information security program, Xxxxxx shall implement the security measures set forth available at xxxxx.xxxxxx.xx/#xxxxxxxx-xxxxxxxxxxxxxxx.xxxxxx.xx/xxxxx/xxxxxxxx.

Appears in 1 contract

Samples: Software as a Service Agreement

AutoNDA by SimpleDocs
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!