Common use of Physical Security Program Clause in Contracts

Physical Security Program. Provider shall use a number of technological and operational approaches in its physical security program to mitigate security risks to the extent reasonably practicable. Provider’s security team shall work closely with each site to determine appropriate measures are in place to prevent unauthorized persons from gaining access to systems within which Personal Data is Processed and continually monitor any changes to the physical infrastructure, business, and known threats. Provider’s security team shall also monitor best practice measures used by others in the industry and carefully select approaches that meet both uniqueness in business practice and expectations of RSA. Provider shall balance its approach toward security by considering elements of control that include architecture, operations, and systems.

Appears in 4 contracts

Samples: Data Protection Agreement, www.rsa.com, www.rsa.com

AutoNDA by SimpleDocs

Physical Security Program. Provider shall use a number of technological and operational approaches in its physical security program to mitigate security risks to the extent reasonably practicable. Provider’s security team shall work closely with each site to determine appropriate measures are in place to prevent unauthorized persons from gaining access to systems within which Personal Data is Processed and continually monitor any changes to the physical infrastructure, business, and known threats. Provider’s security team shall also monitor best practice measures used by others in the industry and carefully select approaches that meet both uniqueness in business practice and expectations of RSASecurID. Provider shall balance its approach toward security by considering elements of control that include architecture, operations, and systems.

Appears in 1 contract

Samples: Data Processing Addendum

AutoNDA by SimpleDocs

Physical Security Program. Provider shall use a number of technological and operational approaches in its physical security program to mitigate security risks to the extent reasonably practicable. Provider’s security team shall work closely with each site to determine appropriate measures are in place to prevent unauthorized persons from gaining access to systems within which Personal Data is Processed and continually monitor any changes to the physical infrastructure, business, and known threats. Provider’s security team shall also monitor best practice measures used by others in the industry and carefully select approaches that meet both uniqueness in business practice and expectations of RSANetWitness. Provider shall balance its approach toward security by considering elements of control that include architecture, operations, and systems.

Appears in 1 contract

Samples: Data Processing Addendum

Time is Money Join Law Insider Premium to draft better contracts faster.