Security Organization. Flexera has and will maintain an information security function, which has responsibility for ensuring good practice in relation to information security and in relation to the provision of the SaaS and Services, including the publication of information security policies.
Security Organization a. The Contractor’s security organization is governed and overseen by Contractor’s senior leadership;
Security Organization. Revenera has and will maintain an information security function, which has responsibility for ensuring good practice in relation to information security and in relation to the provision of the SaaS and Services, including the publication of information security policies.
Security Organization. The Contractor’s security organization is governed and overseen by Contractor’s senior leadership; Contractor’s security organization includes representation from across Contractor’s organization with defined roles and responsibilities; Contractor has clearly defined information security responsibilities; Contractor has confidentiality or non-disclosure agreements in place with the appropriate external entities; Contractor’s management and implementation of information security (i.e. control objectives, controls, policies, processes, and procedures for information security) are reviewed independently at planned intervals, or when significant changes to the implementation of information security occur; and Contractor’s agreements with third parties involving accessing, processing, communicating or managing the Contractor’s information or information processing facilities, cover all relevant security requirements. Asset Management: Contractor has identified, inventoried, assigned ownership and established rules for acceptable use for information and associated assets; and Contractor has a process in place to classify information in terms of its value, legal requirements, sensitivity and criticality to Contractor.
Security Organization. Supplier shall designate a responsible information security officer (presently the Director of Information Security and Compliance) responsible for coordinating, managing, and monitoring Supplier’s information security function, policies, and procedures.
Security Organization. Cleafy shall designate a Chief Information Security Officer or an Information Security Manager responsible for coordinating, managing, and monitoring Cleafy’s information security function, policies, and procedures.
Security Organization. ServiceNow shall designate a Chief Information Security Officer responsible for coordinating, managing, and monitoring ServiceNow’s information security function, policies, and procedures.
Security Organization. Wolters Kluwer has implemented a three-tiered information security management structure to facilitate the management, architecture, and operations of security functions. The Security Council oversees the management of this structure. Members of the Security Council include leadership representatives including commercial division CTOs, Legal, Internal Audit, Internal Controls, the Global Information Security team, and Risk Management. Xxxxxxx Xxxxxx has a Chief Information Security Officer who is responsible for oversight, management, and monitoring of Wolters Kluwer’s Security Program.
Security Organization. Xxxx will appoint a Chief Technology Officer, or equivalent executive, to be responsible for coordinating, managing, and monitoring the information security function, policies, and procedures. Xxxx will also appoint a Data Protection Officer, or equivalent executive, to be responsible for coordinating, managing, and monitoring the data privacy function, policies, and procedures.
Security Organization a. The Contractor’s security organization is governed and overseen by Contractor’s senior leadership;
b. Contractor’s security organization includes representation from across Contractor’s organization with defined roles and responsibilities;
c. Contractor has clearly defined information security responsibilities;
d. Contractor has confidentiality or non-disclosure agreements in place with the appropriate external entities;
e. Contractor’s management and implementation of information security (i.e., control objectives, controls, policies, processes, and procedures for information security) are reviewed independently at planned intervals, or when significant changes to the implementation of information security occur; and
f. Contractor’s agreements with third parties involving accessing, processing, communicating, or managing the Contractor’s information or information processing facilities, cover all relevant security requirements.