Information Security Safeguards Sample Clauses

Information Security Safeguards. Bank has established, and during the term of this Agreement Bank shall maintain, a Corporate Information Security Program (the “Information Security Program”) at each applicable service location. The Information Security Program shall, at a minimum, require physical and electronic information security safeguards against the loss, theft, damage, compromise, processing, transmission, storage, destruction and unauthorized disclosure of, and unauthorized access to, Customer Information in the possession of Bank. Bank will use commercially reasonable efforts to update the Information Security Program, at a minimum, as may be reasonably necessary to comply with changes in privacy and other similar laws applicable to Bank that become effective after the date of this Agreement. The Information Security Program is subject to change; provided, however, that the protections afforded by the Information Security Program will be not be diminished in comparison with those provided by Bank as of the execution of this Agreement.
AutoNDA by SimpleDocs
Information Security Safeguards a. Engineer shall implement appropriate administrative, physical, and technical safeguards, in accordance with TxDOT’s security requirements, that reasonably and appropriately protects the confidentiality, integrity, and availability of TxDOT data.
Information Security Safeguards. The Data Recipient and all of its Affiliates and Representatives have implemented, currently maintain, and will maintain throughout the term of this Agreement an information security program designed to protect Data, which program includes administrative, technical and physical safeguards (i) to ensure the security and confidentiality of Data; (ii) to protect against any anticipated threats or hazards to the security or integrity of such Data; and (iii) to protect against unauthorized access to or use of Data which could result in harm or inconvenience to the Data Provider or its customers ("Information Security Safeguards").
Information Security Safeguards. The Vendor agrees to implement and maintain an information security program, including appropriate administrative, technical, and physical safeguards, that is designed with the latest industry standards to accomplish the following:
Information Security Safeguards. Hearsay shall maintain throughout the Term an information security program that is reasonably designed to provide protection to the security, confidentiality, integrity and availability of Customer Confidential Information in accordance with applicable laws governing privacy of personal information in the United States, E.U. and Canada, and at a minimum, includes controls for (i) system access, (ii) system and application development and maintenance, (iii) change management, (iv) incident response, physical and environmental security, (v) disaster recovery/business continuity, and (vi) employee training. (“Information Security Safeguards”).
Information Security Safeguards. Vendor shall establish and maintain a comprehensive information security program detailing administrative, technical, and physical safeguards reasonably designed to protect against anticipated threats or hazards to the security, confidentiality, and integrity of The Hartford Data; and provide for the proper disposal of The Hartford Data (the “Information Security Safeguards”).
Information Security Safeguards. Access: Access rights for users of Partner information systems are centrally administered by the Partner information technology team. Partner users are divided into role profiles that determine the type of access they are granted. Partner Personnel’s access to Customer Personal Information is only on a need- to-know basis and to the extent necessary to perform services under the agreement with Proofpoint, or as otherwise instructed by Proofpoint in writing. • Risk Management: Partner will conduct regular testing and monitoring of the effectiveness of its safeguards, controls, and systems, including conducting penetration testing. Partner implements measures, as needed, to address vulnerabilities discovered in a timely manner. • Storage: Partner’s database servers are hosted in Partner facilities, or in a data center operated by a third-party vendor, that has been qualified per Partner’s management procedures. Partner maintains complete administrative control over the virtual servers, and no third-party vendors have logical access to Customer Personal Information. • Authentication: Each account through which Customer Personal Information may be accessed is attributable to a single user with a unique ID which is authenticated through a strong password, or another authentication method. • Passwords: Partner has a password policy that requires strong passwords for access to any Partner information system, including requirements for minimum password length, lockout after several failed attempts, expiration period, complexity, encryption, and changing of default passwords. Authentication credentials (employee and customer) are encrypted in transit, by SSL encryption, and at rest. Partner prohibits sharing user account credentials (e.g., login ID, password).
AutoNDA by SimpleDocs
Information Security Safeguards. Partner Organization shall, at all times that it accesses, stores, transmits, maintains or processes Confidential District Information have in place reasonable and appropriate administrative, physical and technical safeguards to protect the confidentiality, integrity and availability of such information.
Information Security Safeguards a. Surveyor shall implement appropriate administrative, physical, and technical safeguards, in accordance with TxDOT’s security requirements, that reasonably and appropriately protects the confidentiality, integrity, and availability of TxDOT data.
Information Security Safeguards. Partner Organization shall, at all times that it accesses, stores, transmits, maintains or processes Confidential District Information have in place reasonable and appropriate administrative, physical, and technical safeguards to protect the confidentiality, integrity, and availability of such information. These industry standard controls will include at a minimum: access controls, including multifactor authentication to the systems and accounts which will house the Student Records; audit records; malware and virus protection; system, network, computer, and application protections; employee training as to cybersecurity threats; and encryption of all data at rest, including on any device or system including USB drive, internal or removable hard drive, or any cloud-based platform; and, encryption of all data in transit, including the transfer of any data via email or to/from cloud storage platform. Any encryption processes or procedures shall meet the requirements of Federal Information Processing Standard 140-2.
Time is Money Join Law Insider Premium to draft better contracts faster.