Measures for internal IT and IT security governance and management Sample Clauses

Measures for internal IT and IT security governance and management. Maintenance of a written, proportionally comprehensive information security program consistent with applicable industry standards that includes: • Information security policies, • Access management, • Change management, • Secure System Development Lifecycle (SSDLC), • Physical and environmental security, • Incident response plans and procedures, • Vulnerability management, • Patch management, • Business continuity/Disaster Recovery plans, • Continuous monitoring, • Asset criticality and data classification, • Data retention and destruction policies, • Third party and software supply chain security, • Hiring policies, • Employment termination policies, • Security awareness, • Privacy policies, and • Data security procedures. • Implementation of a risk management program to help address security vulnerabilities, and deploy security patches within a commercially reasonable timeframe; • Identification and assessment of reasonably foreseeable internal and external risks to the security, confidentiality, and/or integrity of any electronic, paper or other records containing Subscriber Data and evaluation and implementation of improvements, where necessary, of the effectiveness of the current safeguards for limiting such risks; • Annual employee security and privacy awareness training; • Written agreements with Domo sub-processors who have access to Subscriber Data;
AutoNDA by SimpleDocs
Measures for internal IT and IT security governance and management. Data importer has a dedicated Security Committee responsible for overseeing IT security. This Committee holds weekly meetings. 11. Opatření pro interní a bezpečnostní správu a řízení IT: Dovozce údajů má specializovaný bezpečnostní výbor odpovědný za dohled nad bezpečností IT. Tento výbor pořádá týdenní schůzky.
Measures for internal IT and IT security governance and management. Octai has internal information security policies and procedures communicated to all employees upon hire and annually thereafter. Information Security training is provided to employees to ensure they are aware of their responsibilities. The Information Security function reports to the Legal department, which is authorized by senior leadership to establish, implement, and manage Octai's Information Security Program.
Measures for internal IT and IT security governance and management. ConnectWise maintains a risk-based assessment security program. The framework for ConnectWise’s security program includes administrative, organizational, technical, and physical safeguards reasonably designed to protect the Offerings and confidentiality, integrity, and availability of Customer Data. ConnectWise’s security program is intended to be appropriate to the nature of the Offerings and the size and complexity of ConnectWise’s business operations. ConnectWise has a separate and dedicated Information Security team that manages ConnectWise’s security program. This team facilitates and supports independent audits and assessments performed by third parties. ConnectWise’s security framework is based on the ISO 27001 Information Security Management System and includes programs covering: Policies and Procedures, Asset Management, Access Management, Cryptography, Physical Security, Operations Security, Communications Security, Business Continuity Security, People Security, Product Security, Cloud and Network Infrastructure Security,
Measures for internal IT and IT security governance and management. The Motorola Solutions Enterprise Information Security organization is structured as follows: Governance/ Risk/ Compliance, Threat Intelligence & Vulnerability Management, Detection, Protection, and Response. Motorola assesses organization’s effectiveness annually via external assessors who report and share the assessment findings with Motorola Audit Services who tracks any identified remediations. For more information, please see the Motorola Trust Center at MSI Trust Center Motorola performs internal Secure Application Review and Secure Design Review security audits and Production Readiness Review security readiness reviews prior to service release. Where appropriate, privacy assessments are performed for Motorola's products and services. A risk register is created as a result of internal audits with assignments tasked to appropriate personnel. Security audits are performed annually with additional audits as needed. Additional privacy assessments, including updated data maps, occur when material changes are made to the products or services. Further, Motorola Solution has achieved AICPA SOC2 Type 2 reporting and ISO/IEC 27001:2013 certification for many of its development and support operations. Motorola Solutions policies require processing of all personal information in accordance with applicable law, including when that law requires data minimisation. Further, Motorola Solutions conducts privacy assessments of its products and services and evaluates if those products and services support the principles of processing, such as data minimisation, as set forth in Article 5 of the GDPR.
Measures for internal IT and IT security governance and management. Pleo maintains a risk-based assessment security program. The framework for Pleo’s security program includes administrative, organizational, technical, and physical safeguards reasonably designed to protect the Services and confidentiality, integrity, and availability of Customer Data. Xxxx’s security program is intended to be appropriate to the nature of the Services and the size and complexity of Pleo’s business operations. Security is managed at the highest levels of the company, with the DPO and Information Security Manager meeting with the Chief Technology Officer regularly to discuss issues and coordinate security initiatives. Information security policies and standards are reviewed and approved by management at least annually and are made available to all Pleo employees for their reference.
Measures for internal IT and IT security governance and management a) Anti-virus software and a firewall are installed on servers and clients to help avoid malicious software gaining unauthorised access to systems. b) An intrusion detection system is implemented. c) A formalized procedure for handling security incidents is in place. d) Remote access by external parties is monitored. e) IT hardware and software are checked at predefined intervals to assess whether they need to be updated or replaced for security reasons.
AutoNDA by SimpleDocs
Measures for internal IT and IT security governance and management. ○ Lxxxx has outsourced IT security for implementing and monitoring security measures. ○ Lxxxx has developed and enforced IT security policies and procedures including cybersecurity

Related to Measures for internal IT and IT security governance and management

  • RESPONSIBILITIES OF THE UNIVERSITY The UNIVERSITY shall designate in writing a faculty member to coordinate with a designee of the FIELDWORK SITE.

  • Project Monitoring Reporting and Evaluation The Recipient shall furnish to the Association each Project Report not later than forty-five (45) days after the end of each calendar semester, covering the calendar semester.

  • Corporate Governance Matters (a) Holdco and Sorin shall take all actions within their power as may be necessary to cause (i) for a period beginning as of the Cyberonics Merger Effective Time and ending on the date of the first annual meeting of the members of Holdco following the completion of the second full fiscal year of Holdco (such period, the “Initial Period”) the number of directors constituting the Holdco board of directors as of the Effective Times to be nine (9) and (ii) the Holdco board of directors during the Initial Period to be composed as follows: (A) four (4) individuals designated by Cyberonics prior to the Closing Date (each, a “Cyberonics Designee”), (B) four individuals designated by Sorin prior to the Closing Date (each, a “Sorin Designee”) and (C) one (1) director mutually agreed to by Sorin and Cyberonics, who shall meet the independence standards of the NASDAQ applicable to non-controlled domestic U.S. issuers. (b) Sorin and Holdco shall take all corporate actions as may be necessary to cause, effective as of the Sorin Merger Effective Time and Cyberonics Merger Effective Time, as the case may be: (i) the Chief Executive Officer of Sorin as of immediately prior to the Sorin Merger Effective Time to serve as the Chief Executive Officer of the Sorin Merger Surviving Company immediately following the Sorin Merger Effective Time until the end of the Initial Period, (ii) the Chief Executive Officer of Cyberonics as of immediately prior to the Cyberonics Merger Effective Time to serve as the Chairman of the Holdco board of directors for the Initial Period, (iii) a Cyberonics Designee to serve as the Chairman of the audit and compensation committees of the Holdco board of directors for the Initial Period, (iv) each committee of the Holdco board of directors to have at least three (3) members and (v) a Sorin Designee to serve as a member of each committee of the Holdco board of directors during the Initial Period. (c) For as long as the Holdco Shares are listed on the NASDAQ, Holdco shall comply with all NASDAQ corporate governance standards set forth in Rule 5600 of the NASDAQ Stock Market Rules applicable to non-controlled domestic U.S. issuers, regardless of whether Holdco is a foreign private issuer. For as long as the Holdco Shares are listed on the LSE, Holdco shall comply with all Listing Rules and any other Laws applicable to it. (d) Prior to the Closing Date, Sorin and Holdco shall procure the passing of resolutions of the shareholders of Holdco providing for the reregistration of Holdco as a public limited company. (e) Subject to applicable Law, Sorin and Cyberonics shall take all requisite action to cause the organizational documents of those entities that will be Subsidiaries of Holdco to be substantially in such form as agreed by Cyberonics and Sorin, effective as of the Cyberonics Merger Effective Time. (f) As promptly as practicable after the Effective Times, the Sorin Merger Surviving Company shall take all requisite action to cause the composition of the board of directors or other governing body of each of the Subsidiaries of the Sorin Merger Surviving Company to reflect representation by directors designated by Cyberonics immediately prior to the Effective Times, on the one hand, and directors designated by Sorin immediately prior to the Effective Times, on the other hand, that is proportionate to the relative representation of directors designated by such party on the Holdco board of directors as of the Effective Times as provided in Section 5.18(a), unless otherwise mutually agreed by Sorin and Cyberonics. (g) The Cyberonics Designees, the Sorin Designees and each of their respective successors on the Holdco board of directors during the first three (3) years following the Effective Times are express third-party beneficiaries of Sections 5.18(a) and 5.18(b).

  • External Arbitration Procedures Any arbitration initiated under this Agreement shall be conducted before a single neutral arbitrator appointed by the Parties. If the Parties fail to agree upon a single arbitrator within ten

  • Internal Accounting and Disclosure Controls The Company and each of its Subsidiaries maintains internal control over financial reporting (as such term is defined in Rule 13a-15(f) under the 0000 Xxx) that is effective to provide reasonable assurance regarding the reliability of financial reporting and the preparation of financial statements for external purposes in accordance with generally accepted accounting principles, including that (i) transactions are executed in accordance with management’s general or specific authorizations, (ii) transactions are recorded as necessary to permit preparation of financial statements in conformity with generally accepted accounting principles and to maintain asset and liability accountability, (iii) access to assets or incurrence of liabilities is permitted only in accordance with management’s general or specific authorization and (iv) the recorded accountability for assets and liabilities is compared with the existing assets and liabilities at reasonable intervals and appropriate action is taken with respect to any difference. The Company maintains disclosure controls and procedures (as such term is defined in Rule 13a-15(e) under the 0000 Xxx) that are effective in ensuring that information required to be disclosed by the Company in the reports that it files or submits under the 1934 Act is recorded, processed, summarized and reported, within the time periods specified in the rules and forms of the SEC, including, without limitation, controls and procedures designed to ensure that information required to be disclosed by the Company in the reports that it files or submits under the 1934 Act is accumulated and communicated to the Company’s management, including its principal executive officer or officers and its principal financial officer or officers, as appropriate, to allow timely decisions regarding required disclosure. Neither the Company nor any of its Subsidiaries has received any notice or correspondence from any accountant or other Person relating to any potential material weakness or significant deficiency in any part of the internal controls over financial reporting of the Company or any of its Subsidiaries.

  • Corporate Governance (a) Prior to the Effective Time, the Board of Directors of NYCB shall take all actions necessary to adopt the NYCB Bylaws Amendment. Effective as of the Holdco Merger Effective Time, and in accordance with the NYCB Bylaws Amendment, the number of directors that will comprise the full Board of Directors of the Surviving Entity and the full Board of Directors of NYCB Bank shall each be twelve (12), of which (i) eight (8) shall be directors of NYCB immediately prior to the Effective Time, which shall include the Chief Executive Officer of NYCB immediately prior to the Effective Time, Xxxxxx Xxxx, Xxxxx Xxxxx, who shall serve as the Presiding Director, and such other directors as determined by NYCB and (ii) four (4) shall be directors of Flagstar immediately prior to the Effective Time (the “Flagstar Designated Directors”), which shall include the Chief Executive Officer of Flagstar immediately prior to the Effective Time, who shall serve as the non-Executive Chairman of the Board of Directors of each of the Surviving Entity and the Board of Directors of NYCB Bank, Xxxxx Xxxxxxxxx, who shall serve as the Risk Assessment Committee Chairman of the Surviving Entity and such other directors as mutually agreed to by Flagstar and NYCB, who shall be independent of NYCB in accordance with applicable stock exchange standards. (b) At the Effective Time, NYCB shall invite all directors of Flagstar immediately prior to the Effective Time other than the Flagstar Designated Directors to become members of an Advisory Board of NYCB (the “Advisory Board”), and shall cause all such individuals who accept such invitation to be elected or appointed for a two (2)-year term as members of the Advisory Board. Such members of the Advisory Board will serve on the Advisory Board until the second (2nd) anniversary of the Closing Date or until their respective earlier death or resignation, during which period such members will each receive quarterly compensation of $10,000 per quarter served. The Chief Executive Officer of NYCB shall meet with the Advisory Board at least one time per quarter during the two (2) year period beginning on the Closing Date. (c) Effective as of the Effective Time, the Board of Directors of NYCB shall take such actions as are necessary and appropriate to adopt the lending policies and procedures of Flagstar that were in effect immediately prior to the Closing with respect to the acquired Flagstar operations as the lending policies and procedures for such acquired Flagstar operations.

  • MANAGEMENT OF EVALUATION OUTCOMES 12.1 Where the Employer is, any time during the Employee’s employment, not satisfied with the Employee’s performance with respect to any matter dealt with in this Agreement, the Employer will give notice to the Employee to attend a meeting; 12.2 The Employee will have the opportunity at the meeting to satisfy the Employer of the measures being taken to ensure that his performance becomes satisfactory and any programme, including any dates, for implementing these measures; 12.3 Where there is a dispute or difference as to the performance of the Employee under this Agreement, the Parties will confer with a view to resolving the dispute or difference; and 12.4 In the case of unacceptable performance, the Employer shall – 12.4.1 Provide systematic remedial or developmental support to assist the Employee to improve his performance; and 12.4.2 After appropriate performance counselling and having provided the necessary guidance and/or support as well as reasonable time for improvement in performance, the Employer may consider steps to terminate the contract of employment of the Employee on grounds of unfitness or incapacity to carry out his or her duties.

  • Governance and Anticorruption The Borrower, the Project Executing Agency, and the implementing agencies shall (a) comply with ADB’s Anticorruption Policy (1998, as amended to date) and acknowledge that ADB reserves the right to investigate directly, or through its agents, any alleged corrupt, fraudulent, collusive or coercive practice relating to the Project; and

  • Human and Financial Resources to Implement Safeguards Requirements The Borrower shall make available necessary budgetary and human resources to fully implement the EMP and the RP.

  • External Appeals For appeals of a decision that a prescription drug is not covered because it is not on our formulary, please see the Formulary Exception Process in the Prescription Drug and Diabetic Equipment and Supplies section. When filing a reconsideration or an appeal, please provide the same information listed in the Complaints section above.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!