Information Security Reviews Sample Clauses

Information Security Reviews. Jamf will independently review its approach to managing information security and its implementation (i.e., control objectives, controls, policies, processes, and procedures for information security) at planned intervals or when significant changes occur.
AutoNDA by SimpleDocs
Information Security Reviews. The Company has: (i) regularly conducted vulnerability testing, risk assessments, and external audits of, and tracks security incidents related to, the Company’s systems and products (collectively, “Information Security Reviews”); (ii) timely corrected any material exceptions or vulnerabilities identified in such Information Security Reviews; (iii) made available true and accurate copies of all Information Security Reviews; and (iv) timely installed software security patches and other fixes to identified technical information security vulnerabilities. The Company provides its employees with regular training on privacy and data security matters.
Information Security Reviews. The Consultant’s information security arrangements should be independently reviewed (audited) and reported to its management. The Consultant’s management are required to routinely review Personnel, Equipment, system’s compliance with security policies, procedures etc., and shall initiate and pursue all required corrective actions where necessary. Appendix 2 - Schedule of Data Categories of Data Subjects (tick as appropriate) University Employees Students Personal data (tick as appropriate) Date joined the University First name Last name Email Graduation year Field of study Degree Clubs and honours Address Post Code Phone number Special Category Data (Tick all that apply) Racial or ethnic origin Political opinions Religious/philosophical beliefs Trade union membership State of health Criminal convictions
Information Security Reviews. The Contractor’s information security arrangements should be independently reviewed (audited) and reported to its management. The Contractor’s management are required to routinely review Personnel, Equipment, system’s compliance with security policies, procedures etc., and shall initiate and pursue all required corrective actions where necessary. Appendix 2 - Schedule of Data Categories of Data Subjects (tick as appropriate) University Employees Students Personal data (tick as appropriate) Date joined the University First name Last name Email Graduation year Field of study Degree Clubs and honours Address Post Code Phone number Special Category Data (Tick all that apply) Racial or ethnic origin Political opinions Religious/philosophical beliefs Trade union membership State of health Criminal convictions SCHEDULE 2 DISPUTE RESOLUTION PROCEDURE
Information Security Reviews. 18.2.1 Independent review of information security Yes - In Place

Related to Information Security Reviews

  • Information Security IET information security management practices, policies and regulatory compliance requirements are aimed at assuring the confidentiality, integrity and availability of Customer information. The UC Xxxxx Cyber-safety Policy, UC Xxxxx Security Standards Policy (PPM Section 310-22), is adopted by the campus and IET to define the responsibilities and key practices for assuring the security of UC Xxxxx computing systems and electronic data.

  • Information Security Program (1) DTI shall implement and maintain a comprehensive written information security program applicable to the Personal Information ("Information Security Program") which shall include commercially reasonable measures, including, as appropriate, policies and procedures and technical, physical, and administrative safeguards that are consistent with industry standards, providing for (i) the security and confidentiality of the Personal Information, (ii) protection of the Personal Information against reasonably foreseeable threats or hazards to the security or integrity of the Personal Information, (iii) protection against unauthorized access to or use of or loss or theft of the Personal Information, and (iv) appropriate disposal of the Personal Information. Without limiting the generality of the foregoing, the Information Security Program shall provide for (i) continual assessment and re-assessment of the risks to the security of Personal Information acquired or maintained by DTI and its agents, contractors and subcontractors in connection with the Services, including but not limited to (A) identification of internal and external threats that could result in unauthorized disclosure, alteration or destruction of Personal Information and systems used by DTI and its agents, contractors and subcontractors, (B) assessment of the likelihood and potential damage of such threats, taking into account the sensitivity of such Personal Information, and (C) assessment of the sufficiency of policies, procedures, information systems of DTI and its agents, contractors and subcontractors, and other arrangements in place, to control risks; and (ii) appropriate protection against such risks.

  • Information Packages As soon as available and in any event not later than two (2) Business Days prior to each Settlement Date, an Information Package as of the most recently completed Fiscal Month.

  • Information Regarding Collateral All information supplied to Administrative Agent by or on behalf of any Loan Party with respect to any of the Collateral (in each case taken as a whole with respect to any particular Collateral) is accurate and complete in all material respects.

Time is Money Join Law Insider Premium to draft better contracts faster.