Security Risk Assessments Clause Samples

The Security Risk Assessments clause requires parties to evaluate and address potential security threats related to their operations or the handling of sensitive information. Typically, this involves conducting regular reviews of systems, processes, and physical or digital assets to identify vulnerabilities and implement appropriate safeguards. By mandating these assessments, the clause helps ensure that risks are proactively managed, reducing the likelihood of security breaches and protecting both parties from potential harm or liability.
Security Risk Assessments. Vendor agrees to provide reports from third party security assessments, or to allow OSUWMC to conduct random security assessments to certify the Vendor has adequate security controls and practices that meet the above standards. Vendor agrees to meet with OSUWMC to discuss any noted deficiencies from such an assessment and reasonably treat them in a mutually agreed time frame based upon risk severity. Vendor agrees to annual security assessments of its security practices to ensure any deficiencies have been fully addressed and that such security practices continue to meet the terms and requirements herein. The security assessments will occur during normal business hours and at a mutually agreed-upon time. Each party will be responsible for its own costs related to the security assessments.
Security Risk Assessments. Vendor agrees to provide reports from regular 3rd party security assessments or to allow OSUWMC to conduct random security assessments to certify the Vendor has adequate security controls and practices to that meet the above standards. Vendor agrees to meet with OSUWMC to discuss any noted deficiencies from such an assessment and reasonably treat them in a mutually agreed time frame based upon risk severity.
Security Risk Assessments. 27.1 The Reseller will perform periodic risk assessments and operational reviews of their physical security environment and controls. The results of these risk assessments and reviews shall be made available to TransUnion, on request.
Security Risk Assessments. “Security Risk Assessments” is defined in Section 3.12(q) of the Agreement.

Related to Security Risk Assessments

  • Risk Assessments a. Risk Assessment - DST shall, at least annually, perform risk assessments that are designed to identify material threats (both internal and external) against Fund Data, the likelihood of those threats Schedule 10.2 p.2 occurring and the impact of those threats upon DST organization to evaluate and analyze the appropriate level of information security safeguards (“Risk Assessments”). b. Risk Mitigation - DST shall use commercially reasonable efforts to manage, control and remediate threats identified in the Risk Assessments that it believes are likely to result in material unauthorized access, copying, use, processing, disclosure, alteration, transfer, loss or destruction of Fund Data, consistent with the Objective, and commensurate with the sensitivity of the Fund Data and the complexity and scope of the activities of DST pursuant to the Agreement. c. Security Controls Testing - DST shall, on approximately an annual basis, engage an independent external party to conduct a review (including information security) of DST’s systems that are related to the provision of services. DST shall have a process to review and evaluate high risk findings resulting from this testing.

  • Periodic Risk Assessment Provider further acknowledges and agrees to conduct periodic risk assessments and remediate any identified security and privacy vulnerabilities in a timely manner.

  • Risk Assessment An assessment of any risks inherent in the work requirements and actions to mitigate these risks.

  • Security Assessments Upon advance written notice by the JBE, Contractor agrees that the JBE shall have reasonable access to Contractor’s operational documentation, records, logs, and databases that relate to data security and the Contractor’s Information Security Program. Upon the JBE’s request, Contractor shall, at its expense, perform, or cause to have performed an assessment of Contractor’s compliance with its privacy and data security obligations. Contractor shall provide to the JBE the results, including any findings and recommendations made by Contractor’s assessors, of such assessment, and, at its expense, take any corrective actions.

  • Builder’s Risk Insurance Contractor shall provide a Builder’s Risk Policy to be made payable to the Owner and Contractor, as their interests may appear. The policy amount should be equal to 100% of the Contract Sum, written on a Builder’s Risk “All Risk”, or its equivalent. The policy shall be endorsed as follows: The following may occur without diminishing, changing, altering or otherwise affecting the coverage and protection afforded the insured under this policy: (i) Furniture and equipment may be delivered to the insured premises and installed in place ready for use; and (ii) Partial or complete occupancy by Owner; and (iii) Performance of work in connection with construction operations insured by the Owner, by agents or lessees or other Contractors of the Owner or Using Agency In the event that the Contract is for renovation, addition or modification of an existing structure and Builders Risk Insurance is not available, the Owner will accept an Installation Floater Insurance Policy with the above endorsements in lieu of the Builders' Risk Insurance Policy. Such floater must insure loss to materials and equipment prior to acceptance by Owner and must be on an ALL RISK BASIS with the policy written on a specific job site.