Security Policies. a. Contractor’s security policy is documented, has obtained management approval, is reviewed no less frequently than annually and is maintained to ensure its continuing suitability, adequacy and effectiveness; and
Appears in 7 contracts
Samples: Information Security Agreement, Information Security Agreement, Information Security Agreement
Security Policies. a. Contractor’s security policy is documented, has obtained management approval, is reviewed no less frequently than annually and is maintained to ensure its continuing suitability, adequacy and effectiveness; andand Contractor’s operational, technical and administrative policies, standards and guidelines are documented, have obtained management approval, are reviewed no less frequently than annually and are maintained to ensure their continuing suitability, adequacy and effectiveness.
Appears in 3 contracts
Samples: Information Security Agreement, Information Security Agreement, Information Security Agreement
Security Policies. a. Contractor’s security policy is documented, has obtained management approval, is reviewed no less frequently than annually and is maintained to ensure its continuing suitability, adequacy adequacy, and effectiveness; and
Appears in 1 contract
Samples: Information Security Agreement
Security Policies. a. Contractor’s security policy is documented, has obtained management approval, is reviewed no less frequently than annually and is maintained to ensure its continuing suitability, adequacy adequacy, and effectiveness; andand Contractor’s operational, technical, and administrative policies, standards and guidelines are documented, have obtained management approval, are reviewed no less frequently than annually and are maintained to ensure their continuing suitability, adequacy, and effectiveness.
Appears in 1 contract
Samples: Information Security Agreement