Jamf Relationships. a) If Jamf must use a third-party application or service to provide the Services, Jamf’s contract with that third- party vendor must clearly outline security requirements for the third-party vendor consistent with the security requirements of this Information Security Schedule. In addition, service level agreements with the third party must be clearly defined.
Appears in 2 contracts
Samples: Data Processing Agreement for Jamf Customers, Data Processing Agreement for Jamf Customers
Jamf Relationships. a) If Jamf must use a third-party application or service to provide the Services, Jamf’s contract with that third- third-party vendor must clearly outline security requirements for the third-party vendor consistent with the security requirements of this Information Security Schedule. In addition, service level agreements with the third party must be clearly defined.
Appears in 2 contracts
Samples: Data Processing Agreement for Jamf Customers, Data Processing Agreement for Jamf Customers
Jamf Relationships. a) If Jamf must use a a. Where other third-party application applications or service to provide the Servicesservices must be used by Jamf, Jamf’s contract with that third- party vendor must clearly outline security requirements for the any third-party vendor must clearly state security requirements consistent with the security requirements of this Information Security Schedule, which will be applied to the third party. In addition, service level agreements with the third party must be clearly defined.
Appears in 1 contract
Samples: Use Agreement