Oversight of Security Compliance. GRANTEE may require Certified Vendor to comply with its own internal security standards, in addition to any security standards included in the exemplar Participating Entity Service Agreement, and incorporate such standards into the Participating Entity Service Agreement by reference;
Oversight of Security Compliance. Upon Named Entity’s written request, to confirm compliance with this Contact, the RFO, the OAG Information Security Standards (Attachment 4 to the RFO) as well as any applicable laws and industry standards, Vendor shall promptly and accurately complete a written information security questionnaire provided by Named Entity or a third party on the Named Entity’s behalf regarding Vendor’s business practices and information technology environment in relation to all Named Entity Protected Data being handled and/or services being provided by Vendor to Named Entity or any of the Participating Entities pursuant to this Contract or the Incorporated Documents. Vendor shall fully cooperate with such inquiries. Named Entity shall treat the information provided by Vendor in the security questionnaire as Vendor’s confidential, proprietary information under Section 10.1 below.
Oversight of Security Compliance. (A) The Consultant shall have and maintain a written information security policy that specifies Security Safeguards appropriate to the size and complexity of the Consultant’s operations and the nature and scope of its activities.
(B) Upon the SJVIA’s written request, to confirm the Consultant’s compliance with this Article 10, as well as any applicable laws, regulations and industry standards, the Consultant grants the SJVIA or, upon the SJVIA’s election, a third party on the SJVIA’s behalf, permission to perform an assessment, audit, examination or review of all controls in the Consultant’s physical and technical environment in relation to all Personal Information that is Used by the Consultant pursuant to this agreement. The Consultant shall fully cooperate with such assessment, audit or examination, as applicable, by providing the SJVIA or the third party on the SJVIA’s behalf, access to all Authorized Employees and other knowledgeable personnel, physical premises, documentation, infrastructure and application software that is Used by the Consultant for Personal Information pursuant to this agreement. In addition, the Consultant shall provide the SJVIA with the results of any audit by or on behalf of the Consultant that assesses the effectiveness of the Consultant’s information security program as relevant to the security and confidentiality of Personal Information Used by the Consultant or Authorized Persons during the course of this agreement under this Article 10.
(C) The Consultant shall ensure that all Authorized Persons who Use Personal Information agree to the same restrictions and conditions in this Article 10 that apply to the Consultant with respect to such Personal Information by incorporating the relevant provisions of these provisions into a valid and binding written agreement between the Consultant and such Authorized Persons, or amending any written agreements to provide same.
Oversight of Security Compliance. Upon request, Agency shall grant PLK and the Company, or a third party acting on PLK’s or the Company’s behalf, permission to perform an assessment, audit, examination, or review of controls in Agency’s environment in relation to the Personal Information being handled and/or services being provided to confirm compliance with the Agreement, as well as any applicable laws, regulations, and industry standards. Agency shall fully cooperate with such assessment by providing access to knowledgeable personnel, physical premises, documentation, infrastructure, and application software that processes, stores, or transports Personal Information pursuant to the Agreement. In addition, upon request, Agency shall provide PLK with the results of any audit performed at Agency’s sole cost and expense that assesses the effectiveness of Agency’s information security program as relevant to the security and confidentiality of Personal Information shared during the course of this Agreement.
Oversight of Security Compliance. At least once per year, Backup Servicer shall conduct site audits of the information technology and information security controls for all facilities used in complying with its obligations under this Agreement. Upon Client’s request, to confirm Backup Servicer’s compliance with this Agreement, as well as any applicable laws, regulations and industry standards, Backup Servicer grants Client or, upon Client’s election, a third party on Client’s behalf, permission to perform an assessment, audit, examination or review of all controls in Backup Servicer’s physical and/or technical environment in relation to all Highly Confidential Information being handled and/or services being provided to Client pursuant to this Agreement. Backup Servicer shall fully cooperate with such assessment by providing access to knowledgeable personnel, physical premises, documentation, infrastructure and application software that processes, stores or transports Highly Confidential Information for Client pursuant to this Agreement. Upon Client’s written request, Backup Servicer shall make available to Client for review all of the following, as applicable: Backup Servicer’s latest Payment Card Industry (PCI) Certification Report; SOC2 Report on Controls at a Service Organization Relevant to Security, Availability, Processing Integrity, Confidentiality or Privacy; and any reports relating to its ISO/ICE 27001 certification. Client shall treat such audit reports as Backup Servicer’s Confidential Information under this Agreement. Any exceptions noted on the SSAE report or other audit reports relating to Highly Confidential Information will be promptly addressed with the development and implementation of a corrective action plan by Backup Servicer’s management. 6.
Oversight of Security Compliance. Upon WWP’s request, CONTRACTOR will allow WWP or, upon WWP’s election, a third party on WWP’s behalf, to perform an assessment of all controls in CONTRACTOR’s environment in relation to all Personal Information being handled pursuant to this Agreement. CONTRACTOR will fully cooperate with such assessment. In addition, upon WWP’s request, CONTRACTOR will provide WWP with the results of any audit by or on behalf of CONTRACTOR performed that assesses the effectiveness of CONTRACTOR's information security program as relevant to the security and confidentiality of Personal Information shared during the course of this Agreement.
Oversight of Security Compliance. PayTomorrow shall provide Merchant with the results of any audit by or on behalf of PayTomorrow performed that assesses the effectiveness of PayTomorrow’s information security program as relevant to the security and confidentiality of Personal Information shared during the course of this Agreement.
Oversight of Security Compliance. Upon the Client’s written request, to confirm compliance with this Agreement, as well as any applicable laws and industry standards, Xxxxx shall promptly and accurately complete a written information security questionnaire provided by Client or a third party on the Client’s behalf regarding Xxxxx’x business practices and information technology environment in relation to all Personal Information being handled and/or services being provided by Xxxxx to Client pursuant to this Agreement. Xxxxx shall fully cooperate with such inquiries. Client shall treat the information provided by Xxxxx in the security questionnaire as Xxxxx’x Confidential Information.
Oversight of Security Compliance. Upon the District’s written request, to confirm Contractor’s compliance with this Agreement, as well as any applicable laws, regulations, and industry standards, Contractor grants the District or a third party working on behalf of the District permission to perform an assessment, audit, examination, or review of all controls in Contractor’s physical and/or technical environment in relation to all Protected Information being handled by Contractor pursuant to this Agreement. Contractor shall fully cooperate with such assessment by providing access to knowledgeable personnel, physical premises, documentation, infrastructure, and application software that processes, stores, or transports Protected Information for the District pursuant to this Agreement. In addition, upon the District’s written request, Contractor shall provide the District with the results of any audit by or on behalf of Contractor performed that assesses the effectiveness of Contractor’s information security program as relevant to the security and confidentiality of Protected Information shared under this Agreement.
Oversight of Security Compliance a. Upon Smart Start’s request, to confirm Provider’s compliance with this Master Services Agreement, as well as any applicable laws, regulations, and industry standards, Provider grants Smart Start or, upon Smart Start’s election, a third party on Smart Start’s behalf, permission to perform an assessment, audit, examination, or review of all controls in Provider’s physical and/or technical environment in relation to all Confidential Information being Processed and/or Services being provided to Smart Start pursuant to this Master Services Agreement. Provider shall fully cooperate with such assessment by providing access to knowledgeable personnel, physical premises, documentation, infrastructure, and application software that processes, stores, or transports Confidential Information for Smart Start pursuant to this Master Services Agreement. In addition, upon Smart Start’s request, Provider shall provide Smart Start with the results of any audit by or on behalf of Provider performed that assesses the effectiveness of Provider’s information security program as relevant to the security and confidentiality of Confidential Information shared during the course of this Master Services Agreement.
b. Upon Smart Start’s request, to confirm Provider’s compliance with this Master Services Agreement, as well as any applicable laws and industry standards, Provider shall promptly and accurately complete a written information security questionnaire provided by Smart Start, or a third party on Smart Start’s behalf, regarding Provider’s business practices and information technology environment in relation to all Confidential Information being Processed and/or Services being provided by Provider to Smart Start pursuant to this Master Services Agreement. Provider shall fully cooperate with such inquiries.