Security Policies and Exception Process. Security policies must be documented, reviewed, and approved, with management oversight, on a periodic basis, following industry best practices. 1. A risk-based exception management process must be in place for prioritization, approval, and remediation or risk acceptance of controls that have not been adopted or implemented.
Appears in 4 contracts
Samples: Wisconsin Student Data Privacy Agreement, Data Processing Addendum, Data Processing Addendum