Security Assessments and Audits. Company audits its compliance with data protection and information security standards on a regular basis. Such audits are conducted by Company’s internal audit team or by third party auditors engaged by Company. Company shall, upon reasonable and written notice and subject to obligations of confidentiality, allow its data processing procedures and documentation to be inspected, no more than once a year, by Customer (or its designee), at Customer's expense, in order to ascertain compliance with this Addendum. Company shall cooperate in good faith with audit requests by providing access to relevant knowledgeable personnel and documentation.
Security Assessments and Audits a. Ironscales shall, no more than once a year and upon written notice and subject to obligations of confidentiality, allow its data processing procedures and documentation to be inspected by Customer (or its designee) during regular business hours in order to ascertain compliance with this Addendum. Ironscales shall cooperate in good faith with audit requests by providing access to relevant knowledgeable personnel and documentation.
b. At Customer’s written request, and subject to obligations of confidentiality, Ironscales may satisfy the requirements set out in this section by providing Customer with a copy of a written report so that Customer can reasonably verify Ironscales’ compliance with its obligations under this Addendum.
Security Assessments and Audits. 8.1 Company audits its compliance with data protection and information security standards on a regular basis. Such audits are conducted by Company’s internal audit team or by third party auditors engaged by Company, and will result in the generation of an audit report (“Report”), which will be Company’s confidential information.
8.2 Company shall, upon reasonable and written notice and subject to obligations of confidentiality, allow its data processing procedures and documentation to be inspected, no more than once a year and in normal business hours, by Customer (or its designee), at Customer's expense, in order to ascertain compliance with this DPA and Data Protection Law. Company shall cooperate in good faith with audit requests by providing access to relevant knowledgeable personnel and documentation.
8.3 At Customer’s written request, and subject to obligations of confidentiality, Company may satisfy the requirements set out in this section by providing Customer with a copy of the Report so that Customer can reasonably verify Company’s compliance with its obligations under this DPA and Data Protection Law. If Customer wishes to change this instruction regarding the audit, then Customer has the right to request a change to this instruction by sending Company written notice. If Company declines to follow any instruction requested by Customer regarding audits or inspections, Customer is entitled to terminate this DPA and the Agreement.
Security Assessments and Audits. If requested by Customer, AgileAssets will cooperate with Customer in an initial security assessment, including the completion of a risk assessment questionnaire. In addition, AgileAssets will provide Customer with SSAE16 Reviews from the third party data center providers utilized in the provision of the Services as well as with the results of the penetration testing which AgileAssets has periodically performed by qualified third party security consultants.
Security Assessments and Audits. If requested by Customer, Kronologic will cooperate with Customer in an initial security assessment, including the completion of an information security assessment questionnaire. In addition, Kronologic will provide Customer with Kronologic’s SOC 2 audit report upon request.
Security Assessments and Audits. 8.1 Company audits its compliance with data protection and information security standards on a regular basis. Such audits are conducted by Company’s internal audit team or by third party auditors engaged by Company.
8.2 At Customer’s written request, and subject to obligations of confidentiality, Company may satisfy the requirements set out in this section by providing Customer with Company's SOC 2 Type II report, so that Customer can reasonably verify Company’s compliance with its obligations under this DPA. Customer shall rely on the SOC 2 Type II report for validation of proper information security practices and shall not have an additional right to audit Company's compliance unless such right is specifically granted to Customer under applicable law. The foregoing shall not apply solely in the case of a Security Breach resulting in a material business impact to Customer or in connection to a Supervisory Authority specific request. In such event, Customer shall provide Company with 30 days prior written notice (insofar as possible) and the details of any 3rd party auditor on its behalf, for approval.
Security Assessments and Audits. 8.1 Company audits its compliance with data protection and information security standards on a regular basis. Such audits are conducted by Company’s internal audit team or by third party auditors engaged by Company, and will result in the generation of an audit report (“Report”), which will be Company’s confidential information.
8.2 Company shall, upon reasonable and written notice and subject to obligations of confidentiality, allow its data processing procedures and documentation to be inspected, no more than once a year, by Customer (or its designee), at Customer's expense, in order to ascertain compliance with this DPA. Company shall cooperate in good faith with audit requests by providing access to relevant knowledgeable personnel and documentation.
8.3 At Customer’s written request, and subject to obligations of confidentiality, Company may satisfy the requirements set out in this section by providing Customer with a copy of the Report so that Customer can reasonably verify Company’s compliance with its obligations under this DPA. If Customer wishes to change this instruction regarding the audit, then Customer has the right to request a change to this instruction by sending Company written notice. If Company declines to follow any instruction requested by Customer regarding audits or inspections, Customer is entitled to terminate this DPA and the Agreement.
Security Assessments and Audits. (a) Maximity shall conduct regular security assessments of its systems, processes, and infrastructure.
(b) The Client shall have the right to perform security audits to verify compliance with security standards at their own expense and in consultation with Maximity.
Security Assessments and Audits. Company audits its compliance with data protection and information security standards on a regular basis. Such audits are conducted by Company’s internal audit team or by third party auditors engaged by Company, and will result in the generation of an audit report (“Report”), which will be Company’s confidential information. At Customer’s written request, and subject to obligations of confidentiality, Company may satisfy the requirements set out in this section by providing Customer with a copy of the Report and/or with Company's SOC 2 Type II report, so that Customer can reasonably verify Company’s compliance with its obligations under this DPA. Customer shall rely on the Report and/or the SOC 2 Type II report for validation of proper information security practices and shall not have an additional right to audit Company's compliance unless such right is specifically granted to Customer under applicable law. The foregoing shall not apply solely in the case of a Security Breach resulting in a material business impact to Customer or in connection to a Supervisory Authority specific request. In such event, Customer shall provide Company with 30 days prior written notice (insofar as possible) and the details of any 3rd party auditor on its behalf, for approval.
Security Assessments and Audits. Subcontractor agrees to promptly complete, upon written request by Company or an Company customer or data partner, a security assessment or other security review. Additionally, no more than twice annually and during normal business hours, upon five (5) business days written notice Company shall have the right to perform a security audit (or have its third party vendor perform the security audit).