Information Security Standards Sample Clauses
Information Security Standards. Xxxxxx’x shall provide to Supplier its Information Security Standards that define information security controls and guidelines currently in place. The Supplier shall, in the performance by Supplier of services under the Agreement, comply with all commercially reasonable standards within thirty days of receipt of same, unless the parties agree otherwise. At any time during the term of the Agreement, and upon notice to Supplier, Xxxxxx’x may have a Security Review and an architectural design review of the facilities and applications used by Supplier to perform services for Xxxxxx’x, such a review will be performed by either Xxxxxx’x or a third party, at Xxxxxx’x discretion. If a security flaw is discovered, Xxxxxx’x shall give immediate notice of such flaw to Supplier and Supplier shall have five business days to formulate a plan to cure such flaw, unless the parties agree to a longer period of time for such cure. Unless otherwise agreed to by the parties, during the term of the Agreement, Supplier shall have thirty days from receipt of notice to comply with any change in the Information Security Standards.
Information Security Standards. As applicable to the services provided in this Contract, Contractor shall comply with the “Security Assessment Report and Attestation Guideline” and “HHS Information Security Controls” published by HHSC and currently accessed on the following webpage: xxxxx://xxx.xxxxx.xxx/doing-business-hhs/contracting-hhs/vendor-resources.
Information Security Standards. In the performance of all Work pursuant to this Agreement and Statement of Work, Customer and EESCO will comply with the following standards and practices:
Information Security Standards. Further to Section 12.2(l), the Manager shall promptly make available to the Initial Member information regarding the policies and procedures for protection of Customer Information described in Section 12.2(l) as requested by either of them from time to time. The Manager further agrees that any Customer Information transmitted electronically by it (or the Servicer or any Sub-Servicer) shall be encrypted.
Information Security Standards. Each Partner agrees to hold all information shared under this agreement in accordance with security standard ISO 27001 or an equivalent level of compatible security.
Information Security Standards. During the Term, the Supplier shall act in accordance with the Information Security Standards, including with regards to Cookies, set out in Appendix 1.
Information Security Standards. Contractor acknowledges that the State of Oregon has established minimum levels of security for all data and information processed, transmitted or otherwise used by Authorized Purchaser in connection with its performance under this Contract, whether it is submitted to, directly or indirectly, or accessed or accessible by Contractor pursuant to Contractor’s performance hereunder, including without limitation, Personal Information (as defined in Section 5.5), data concerning Authorized Purchaser or Authorized Purchaser’s employees or clients, and information provided to Contractor by Authorized Purchaser or an Authorized Purchaser related to Authorized Purchaser or the Authorized Purchaser or its information systems and operations, and all metadata associated with the foregoing and other Confidential Information of Authorized Purchaser or Authorized Purchasers or their customers or clients residing in or accessed by the Cloud Solutions or Related Services (collectively, “Protected Data”). The State of Oregon’s information
Information Security Standards. We represent and warrant that we will not request or have access to any HHSC Confidential Information or information databases or computer systems. HHSC shall not provide us with its Confidential Information, nor will it provide us with access to its information databases or computer systems. In the event the parties mutually agree that we should and do have access to HHSC Confidential Information, or HHSC information databases or computer systems, we will safeguard HHSC Confidential Information in compliance with all applicable federal and state privacy, security and breach notification statutes and regulations including the “Security Assessment Report and Attestation Guideline” and “HHS Information Security Controls” published by HHSC and currently accessed on the following webpage: xxxxx://xxx.xxxxx.xxx/doing-business-hhs/contracting-hhs/vendor-resources.
Information Security Standards. Contractor acknowledges that the State of Oregon has established minimum levels of security for all data and information processed, transmitted or otherwise used by DAS PS in connection with this Participating Addendum and each Contract, whether it is submitted to, directly or indirectly, or accessed or accessible by Contractor pursuant to Contractor’s performance hereunder, including without limitation, Personal Information (as defined in Section 8.5), data concerning DAS PS or Authorized Purchaser’s employees or clients, and information provided to Contractor by DAS PS or an Authorized Purchaser related to DAS PS or the Authorized Purchaser or its information systems and operations, and all metadata associated with the foregoing and other Confidential Information of DAS PS or Authorized Purchasers or their customers or clients residing in or accessed by the Cloud Solutions or Related Services (collectively, “Protected Data”). The State of Oregon’s information security policies are set forth in Exhibit F- Part I. The State of Oregon will have the right to amend these security policies on 30 days’ notice to Contractor or such shorter notice period as required in order to comply with law. If the State amends such security policies, Contractor will implement such amendments in the fulfillment of its obligations hereunder, and the parties will enter into an amendment to this Participating Addendum to document any technical or operational changes associated with or resulting from such amended policies. State Premises. Contractor will comply, and will cause its employees, agents and subcontractors to comply with the State of Oregon’s information security policies applicable to Contractor in its performance under this Participating Addendum or a Contract at any State of Oregon premises to which they have access in connection with the performance hereunder. Additional Standards. In addition to the standards established by the Information Security Policies described in Section 8.2, Contractor shall provide Related Services in compliance with the following, in each case to the extent applicable to Contractor in performing the services hereunder: Identity Theft. In the performance of this Participating Addendum or a Contract, Contractor may have possession or access to documents, records or items that contain “Personal Information” as that term is used in ORS 646A.602(11), including social security numbers. Prior to the receipt of, and during the period in which Con...
Information Security Standards. To the extent applicable, each party agrees to comply with applicable information security requirements for financial institutions, including mutual funds, and/or third parties servicing financial institutions based on the type of confidential information received, accessed or transmitted from or to each financial institution and/or the type of access to financial institution systems. DST AMS uses the National Institute of Standards and Technology (NIST) standards as the basis for its information security program and reviews other published guidelines periodically for applicability.