Security Management System Sample Clauses
Security Management System. After Buyer approval the Security Management Plan and Information Security Management System will apply during the Term of this Call-Off Contract. Both plans will comply with the Buyer’s security policy and protect all aspects and processes associated with the delivery of the Services.
Security Management System. ▪ Organization. Maximl Labs Pvt Ltd designates qualified security personnel whose responsibilities include development, implementation, and ongoing maintenance of the Information Security Program. ▪ Policies. Management reviews and supports all security related policies to ensure the security, availability, integrity and confidentiality of Customer Personal Data. These policies are updated at least once annually. ▪ Assessments. Maximl Labs Pvt Ltd engages a reputable independent third-party to perform risk assessments of all systems containing Customer Personal Data at least once annually.
Security Management System. ▪ Organization. Thinkstack Technology Pvt Ltd designates qualified security personnel whose responsibilities include development, implementation, and ongoing maintenance of the Information Security Program. ▪ Policies. Management reviews and supports all security related policies to ensure the security, availability, integrity and confidentiality of Customer Personal Data. These policies are updated at least once annually. ▪ Assessments. Thinkstack Technology Pvt Ltd engages a reputable independent third-party to perform risk assessments of all systems containing Customer Personal Data at least once annually. ▪ Risk Treatment. Thinkstack Technology Pvt Ltd maintains a formal and effective risk treatment program that includes penetration testing, vulnerability management and patch management to identify and protect against potential threats to the security, integrity or confidentiality of Customer Personal Data.
Security Management System. M.S. collapsible gate for all entrance gates of individual buildings in the said Project. 24 hours security with C.C.T.V. surveillance and intra- communication facility between every apartment and security room.
Security Management System. ▪ Organization. Voyzant Inc designates qualified security personnel whose responsibilities include development, implementation, and ongoing maintenance of the Information Security Program. ▪ Policies. Management reviews and supports all security related policies to ensure the security, availability, integrity and confidentiality of Customer Personal Data. These policies are updated at least once annually. ▪ Assessments. Voyzant Inc engages a reputable independent third-party to perform risk assessments of all systems containing Customer Personal Data at least once annually. ▪ Risk Treatment. Voyzant Inc maintains a formal and effective risk treatment program that includes penetration testing, vulnerability management and patch management to identify and protect against potential threats to the security, integrity or confidentiality of Customer Personal Data. ▪ Vendor Management. Voyzant Inc maintains an effective vendor management program ▪ Incident Management. Voyzant Inc reviews security incidents regularly, including effective determination of root cause and corrective action. ▪ Standards. Voyzant Inc operates an information security management system that complies with the requirements of ISO/IEC 27001:2022 standard.
Security Management System. ■ Organization. Generative Cloud, Inc. designates qualified security personnel whose responsibilities include development, implementation, and ongoing maintenance of the Information Security Program.
Security Management System. (a) Organization. TeleSign designates qualified security personnel whose responsibilities include development, implementation, and ongoing maintenance of the Information Security Program.
Security Management System
