Organization of Information Security. ● Information Security governance and data protection compliance for the Company are the responsibility of MaxMind’s Vice President of Operations. ● MaxMind has established an Information Security team, with security responsibilities shared across various business units. ● Confidentiality and nondisclosure agreements are required when sharing sensitive, proprietary personal, or otherwise confidential information between MaxMind and a third-party. ● A formal process is in place to manage third parties with access to organizational data, information systems, or data centers. All such third parties commit contractually to maintaining confidentiality of all confidential information.
Organization of Information Security a. Assigning security responsibilities to appropriate Medallia individuals or groups to facilitate protection of the Medallia Products environment and associated assets.
Organization of Information Security. Information Security governance and data protection compliance for the Company are the responsibility of Lative’s Chief Executive Officer. • Confidentiality and non-disclosure agreements are required when sharing sensitive, proprietary personal or otherwise confidential information between Lative and a third-party
Organization of Information Security. Duty of Confidentiality. Provider’s personnel with access to customer data are subject to confidentiality obligations.
Organization of Information Security. ● Processor has appointed a Security Officer responsible for coordinating and monitoring the security rules and procedures. ● The Security Officer is bound by confidentiality obligations.
Organization of Information Security. 3.1. The Manufacturer must initiate and control the implementation of its information security policy and procedures and must require that its policy and procedures be reviewed, tested and updated on a regular basis.
Organization of Information Security. Maintain an information security organization to coordinate the implementation of security for Red Hat.
Organization of Information Security. Establishes a framework for initiating and controlling information security implementation and operations at OneTrust.
Organization of Information Security. The Plesk group employs a group-wide Chief Information Officer, responsible for the entire IT system of all group entities. The CIO has sufficient authority to handle any operational and tactical level security initiatives, issues, as well as a group wide IT security framework. Where required, the CIO appoints additional Security Managers in different departments, responsible for the day-to-day handling of operational security issues, as well as reporting.
Organization of Information Security. 9. You must define and assign information security responsibilities within the organization. You can assign the responsibility for information security to a single role or multiple roles, but you must provide a single contact point for any information security communication between you and the Four Media Network GmbH.