Software Security Management Sample Clauses

Software Security Management. Empower’s information systems (including operating systems, infrastructure, business applications, off-the-shelf products, services and user-developed applications) adheres to the information security standards set forth in Empower’s Information Security Policies.
AutoNDA by SimpleDocs
Software Security Management. Iron Mountain’s information systems (including operating systems, infrastructure, business applications, services and user-developed applications) shall be designed to be in compliance with information security standards.
Software Security Management. Data importer shall design its information systems (including operating systems, infrastructure, business applications, services and user- developed applications) to be in compliance with Industry Standard Safeguards.
Software Security Management. Empower’s inf ormation systems (including operating systems, inf rastructure, business applications, off-the-shelf products, services and user-developed applications) adheres to the inf ormation security standards set f xxxx in Empower’s Inf ormation Security Policies.

Related to Software Security Management

  • Software Services If elected by Customer, the following Software Services will be made available for Customer’s use.

  • Future Services The Consultant acknowledges each of the following with regard to performing future services for the City: • The Consultant’s performance of the services required by this Agreement may create an actual or appearance of a conflict of interest with regard to the Consultant performing or participating in the performance of some related future services, particularly if the services required by this Agreement comprise one element or aspect of a multi-phase process or project; • Such an actual or appearance of a conflict of interest would be a ground for the City to disqualify the Consultant from performing or participating in the performance of such future services; and • The Consultant is solely responsible for considering what potential conflicts of interest, if any, performing the services required by this Agreement might have on its ability to obtain contracts to perform future services.

  • Security Management The Contractor shall comply with the requirements of the DOD 5200.1-M and the DD Form 254. Security of the Contractor’s electronic media shall be in accordance with the above documents. Effective Program Security shall require the Contractor to address Information Security and Operations Security enabled by the Security Classification Guides. The Contractor’s facility must be able to handle and store material up to the Classification Level as referenced in Attachment J-01, DD Form 254.

Time is Money Join Law Insider Premium to draft better contracts faster.