Measures for internal IT and IT security governance and management Sample Clauses

Measures for internal IT and IT security governance and management. Data importer has a dedicated Security Committee responsible for overseeing IT security. This Committee holds weekly meetings. 11. Opatření pro interní a bezpečnostní správu a řízení IT: Dovozce údajů má specializovaný bezpečnostní výbor odpovědný za dohled nad bezpečností IT. Tento výbor pořádá týdenní schůzky.
AutoNDA by SimpleDocs
Measures for internal IT and IT security governance and management. Maintenance of a written, proportionally comprehensive information security program consistent with applicable industry standards that includes: • Information security policies, • Access management, • Change management, • Secure System Development Lifecycle (SSDLC), • Physical and environmental security, • Incident response plans and procedures, • Vulnerability management, • Patch management, • Business continuity/Disaster Recovery plans, • Continuous monitoring, • Asset criticality and data classification, • Data retention and destruction policies, • Third party and software supply chain security, • Hiring policies, • Employment termination policies, • Security awareness, • Privacy policies, and • Data security procedures. • Implementation of a risk management program to help address security vulnerabilities, and deploy security patches within a commercially reasonable timeframe; • Identification and assessment of reasonably foreseeable internal and external risks to the security, confidentiality, and/or integrity of any electronic, paper or other records containing Subscriber Data and evaluation and implementation of improvements, where necessary, of the effectiveness of the current safeguards for limiting such risks; • Annual employee security and privacy awareness training; • Written agreements with Domo sub-processors who have access to Subscriber Data;
Measures for internal IT and IT security governance and management. Octai has internal information security policies and procedures communicated to all employees upon hire and annually thereafter. Information Security training is provided to employees to ensure they are aware of their responsibilities. The Information Security function reports to the Legal department, which is authorized by senior leadership to establish, implement, and manage Octai's Information Security Program.
Measures for internal IT and IT security governance and management. Pleo maintains a risk-based assessment security program. The framework for Pleo’s security program includes administrative, organizational, technical, and physical safeguards reasonably designed to protect the Services and confidentiality, integrity, and availability of Customer Data. Xxxx’s security program is intended to be appropriate to the nature of the Services and the size and complexity of Pleo’s business operations. Security is managed at the highest levels of the company, with the DPO and Information Security Manager meeting with the Chief Technology Officer regularly to discuss issues and coordinate security initiatives. Information security policies and standards are reviewed and approved by management at least annually and are made available to all Pleo employees for their reference.
Measures for internal IT and IT security governance and management a) Anti-virus software and a firewall are installed on servers and clients to help avoid malicious software gaining unauthorised access to systems.
Measures for internal IT and IT security governance and management. ConnectWise maintains a risk-based assessment security program. The framework for ConnectWise’s security program includes administrative, organizational, technical, and physical safeguards reasonably designed to protect the Offerings and confidentiality, integrity, and availability of Customer Data. ConnectWise’s security program is intended to be appropriate to the nature of the Offerings and the size and complexity of ConnectWise’s business operations. ConnectWise has a separate and dedicated Information Security team that manages ConnectWise’s security program. This team facilitates and supports independent audits and assessments performed by third parties. ConnectWise’s security framework is based on the ISO 27001 Information Security Management System and includes programs covering: Policies and Procedures, Asset Management, Access Management, Cryptography, Physical Security, Operations Security, Communications Security, Business Continuity Security, People Security, Product Security, Cloud and Network Infrastructure Security,
Measures for internal IT and IT security governance and management. ○ Lxxxx has outsourced IT security for implementing and monitoring security measures. ○ Lxxxx has developed and enforced IT security policies and procedures including cybersecurity
AutoNDA by SimpleDocs

Related to Measures for internal IT and IT security governance and management

  • Shared Governance The parties shall develop a variety of shared governance models which schools may consider. Schools shall select a model that best suits their needs or the staff may develop an alternative model of governance with direct involvement by teachers, other staff and community representatives. Staff approval and commitment to the model is essential. The selected model of governance will be specifically described in each school's improvement plan.

  • RESPONSIBILITIES OF THE UNIVERSITY 1. The UNIVERSITY shall designate in writing a faculty member to coordinate with a designee of the FIELDWORK SITE.

  • External monitoring The external monitoring and audit referred to in Articles 11.1, 11.2, 11.3 and 11.4 of the Regulation shall not in any way relieve the National Focal Point or the Programme Operator of their obligations under the legal framework regarding monitoring of the Programme and/or its projects, financial control and audit.

  • Network Maintenance and Management 36.1 The Parties will work cooperatively to implement this Agreement. The Parties will exchange appropriate information (for example, maintenance contact numbers, network information, information required to comply with law enforcement and other security agencies of the Government, escalation processes, etc.) to achieve this desired result.

  • Corporate Governance Ultimus shall provide the following services to the Trust and its Funds:

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!