Oversight of Security Compliance. GRANTEE may require Certified Vendor to comply with its own internal security standards, in addition to any security standards included in the exemplar Participating Entity Service Agreement, and incorporate such standards into the Participating Entity Service Agreement by reference;
Oversight of Security Compliance. Upon Named Entity’s written request, to confirm compliance with this Contact, the RFO, the OAG Information Security Standards (Attachment 4 to the RFO) as well as any applicable laws and industry standards, Vendor shall promptly and accurately complete a written information security questionnaire provided by Named Entity or a third party on the Named Entity’s behalf regarding Vendor’s business practices and information technology environment in relation to all Named Entity Protected Data being handled and/or services being provided by Vendor to Named Entity or any of the Participating Entities pursuant to this Contract or the Incorporated Documents. Vendor shall fully cooperate with such inquiries. Named Entity shall treat the information provided by Vendor in the security questionnaire as Vendor’s confidential, proprietary information under Section 10.1 below.
Oversight of Security Compliance. (A) The Consultant shall have and maintain a written information security policy that specifies Security Safeguards appropriate to the size and complexity of the Consultant’s operations and the nature and scope of its activities.
Oversight of Security Compliance. Upon request, Agency shall grant PLK and the Company, or a third party acting on PLK’s or the Company’s behalf, permission to perform an assessment, audit, examination, or review of controls in Agency’s environment in relation to the Personal Information being handled and/or services being provided to confirm compliance with the Agreement, as well as any applicable laws, regulations, and industry standards. Agency shall fully cooperate with such assessment by providing access to knowledgeable personnel, physical premises, documentation, infrastructure, and application software that processes, stores, or transports Personal Information pursuant to the Agreement. In addition, upon request, Agency shall provide PLK with the results of any audit performed at Agency’s sole cost and expense that assesses the effectiveness of Agency’s information security program as relevant to the security and confidentiality of Personal Information shared during the course of this Agreement.
Oversight of Security Compliance. At least once per year, Backup Servicer shall conduct site audits of the information technology and information security controls for all facilities used in complying with its obligations under this Agreement. Upon Client’s request, to confirm Backup Servicer’s compliance with this Agreement, as well as any applicable laws, regulations and industry standards, Backup Servicer grants Client or, upon Client’s election, a third party on Client’s behalf, permission to perform an assessment, audit, examination or review of all controls in Backup Servicer’s physical and/or technical environment in relation to all Highly Confidential Information being handled and/or services being provided to Client pursuant to this Agreement. Backup Servicer shall fully cooperate with such assessment by providing access to knowledgeable personnel, physical premises, documentation, infrastructure and application software that processes, stores or transports Highly Confidential Information for Client pursuant to this Agreement. Upon Client’s written request, Backup Servicer shall make available to Client for review all of the following, as applicable: Backup Servicer’s latest Payment Card Industry (PCI) Certification Report; SOC2 Report on Controls at a Service Organization Relevant to Security, Availability, Processing Integrity, Confidentiality or Privacy; and any reports relating to its ISO/ICE 27001 certification. Client shall treat such audit reports as Backup Servicer’s Confidential Information under this Agreement. Any exceptions noted on the SSAE report or other audit reports relating to Highly Confidential Information will be promptly addressed with the development and implementation of a corrective action plan by Backup Servicer’s management. 6.
Oversight of Security Compliance. Upon WWP’s request, CONTRACTOR will allow WWP or, upon WWP’s election, a third party on WWP’s behalf, to perform an assessment of all controls in CONTRACTOR’s environment in relation to all Personal Information being handled pursuant to this Agreement. CONTRACTOR will fully cooperate with such assessment. In addition, upon WWP’s request, CONTRACTOR will provide WWP with the results of any audit by or on behalf of CONTRACTOR performed that assesses the effectiveness of CONTRACTOR's information security program as relevant to the security and confidentiality of Personal Information shared during the course of this Agreement.
Oversight of Security Compliance. (a) At least once per year, Vendor shall conduct audits of the information technology and information security controls for all facilities used in complying with its obligations under this Agreement, including, but not limited to, obtaining a network-level vulnerability assessment performed by a recognized third-party audit firm based on recognized industry best practices.
Oversight of Security Compliance. At least once per year, RideCo shall conduct audits of the information technology and information security controls for all facilities used in complying with its obligations under this Schedule, including, but not limited to, obtaining a network-level vulnerability assessment performed by a recognized third-party audit firm based on recognized industry best practices.
Oversight of Security Compliance. PayTomorrow shall provide Merchant with the results of any audit by or on behalf of PayTomorrow performed that assesses the effectiveness of PayTomorrow’s information security program as relevant to the security and confidentiality of Personal Information shared during the course of this Agreement.
Oversight of Security Compliance. Upon Worksystems' request, CONTRACTOR will allow Worksystems or, upon Worksystems’ election, a third party on Worksystems' behalf, to perform an assessment of all controls in CONTRACTOR’s environment in relation to all Personal Information being handled pursuant to this Agreement. CONTRACTOR will fully cooperate with such assessment. In addition, upon Worksystems' request, CONTRACTOR will provide Worksystems with the results of any audit by or on behalf of CONTRACTOR performed that assesses the effectiveness of CONTRACTOR's information security program as relevant to the security and confidentiality of Personal Information shared during the course of this Agreement.