SECURITY PROCESSES Sample Clauses

SECURITY PROCESSES. If requested by an Authorized User as part the Request for Quote process, Contractor shall complete a Consensus Assessment Initiative Questionnaire (CAIQ) including on an annual basis thereafter, if requested by the Authorized User. The CAIQ is available at Cloud Security Alliance (xxxxx://xxxxxxxxxxxxxxxxxxxxx.xxx/). The CAIQ may be used to assist the Authorized User in building the necessary assessment processes when engaging with Contractors. In addition to a request for a CAIQ, Contractor shall cooperate with all reasonable Authorized User requests for a Written description of Contractor’s physical/virtual security and/or internal control processes. The Authorized User shall have the right to reject any Contractor’s RFQ response or terminate an Authorized User Agreement when such a request has been denied. For example, Federal, State and local regulations and/or laws may require that Contractors operate within the Authorized User’s regulatory environment. In order to ensure that security is adequate and free of gaps in control coverage, the Authorized User may require information from the Contractor’s Service Organization Controls (SOC) audit report.
AutoNDA by SimpleDocs
SECURITY PROCESSES. If requested by an Authorized User as part the Request for Quote process, Contractor shall complete a Consensus Assessment Initiative Questionnaire (CAIQ) including on an annual basis thereafter. The form is available at Cloud Security Alliance (xxxxx://xxxxxxxxxxxxxxxxxxxxx.xxx/). The CAIQ may be used to assist the Authorized User in building the necessary assessment processes when engaging with Cloud providers. In addition to a request for a CAIQ, Contractor shall cooperate with all reasonable Authorized User requests for a Written description of Contractor’s physical/virtual security and/or internal control processes. The Authorized User shall have the right to reject any Contractor’s RFQ response or terminate an Authorized User Agreement when such a request has been denied. The Contractor shall give a minimum of five (5) business days advance Written notice to the designated Authorized User(s) contact of any upgrades or system changes that will impact services as provided in the Authorized User Agreement. The Contractor shall return Data in a format agreed upon within the Authorized User Agreement or as agreed to with the Authorized User. The Contractor must certify all Data has been removed from its system and removed from backups within timeframes established in the Authorized User Agreement or as agreed to with the Authorized User.
SECURITY PROCESSES. The Contractor shall disclose its non-proprietary security processes and technical limitations to the County such that adequate protection and flexibility can be attained between the County and the Contractor. The County and the Contractor shall share responsibilities, as set forth in Attachment A, Scope of Work.
SECURITY PROCESSES. 9.1 Consultant shall cooperate with all reasonable NYSDOT requests for a written description of Consultant's physical/virtual security and/or internal control processes. NYSDOT shall have the right to terminate this Agreement when such a request has been denied.
SECURITY PROCESSES. The Service Provider shall disclose its non-proprietary security processes to the State such that adequate protection and flexibility can be attained between the State and the Service Provider. The State and the Service Provider shall understand each other’s roles and responsibilities, which shall be set forth in the SOW and/or SLA.
SECURITY PROCESSES. The Vendor will disclose its non-proprietary security processes and technical limitations to the State such that adequate protection and flexibility can be attained between the State and the Vendor. For example: virus checking and port sniffing.
SECURITY PROCESSES. If requested by an Authorized User, Contractor shall complete a Consensus Assessment Initiative Questionnaire (CAIQ). The CAIQ is available at Cloud Security Alliance (xxxxx://xxxxxxxxxxxxxxxxxxxxx.xxx/). The CAIQ may be used to assist the Authorized User in building the necessary assessment processes when engaging with Contractors. In addition to a request for a CAIQ, Contractor shall cooperate with all reasonable Authorized User requests for a Written description of Contractor’s physical/virtual security and/or internal control processes. The Authorized User shall have the right to terminate an Authorized User Agreement when such a request has been denied. For example, Federal, State and local regulations and/or laws may require that Contractors operate within the Authorized User’s regulatory environment. In order to ensure that security is adequate and free of gaps in control coverage, the Authorized User may require information from the Contractor’s Service Organization Controls (SOC) audit report.
AutoNDA by SimpleDocs
SECURITY PROCESSES. The Contracto1· shall disclose its non�proprietary security processes and technical limitations to the County such that adequate protection and flexibility can be attained between the County and the Contractor.
SECURITY PROCESSES. We make commercially reasonable efforts to safeguard your Personal Information from loss or theft, unauthorized access, disclosure, duplication, use or modification through security measures appropriate to the sensitivity of the information. These measures include internal reviews of our data collection, storage and processing practices and security measures which include appropriate encryption and physical security measures to guard against unauthorized access to systems where we store Personal Information.
SECURITY PROCESSES. In general, Xxxxx.xxx will implement and maintain information security processes designed to protect access and maintenance of information related to the Xxxxx.xxx Services and ADT Data that are (a) at least equal to applicable industry standards for such types of locations, (b) in accordance with ADT security requirements specified in Exhibit B, and (c) which provide appropriate technical and organizational safeguards against accidental or unlawful destruction, loss, alteration or unauthorized disclosure or access of ADT Data.
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!