We use cookies on our site to analyze traffic, enhance your experience, and provide you with tailored content.

For more information visit our privacy policy.

Common use of Testing Clause in Contracts

Testing. Regularly testing the key controls, systems and procedures of its information security program to validate that they are properly implemented and effective in addressing the threats and risks identified.

Appears in 37 contracts

Samples: Data Processing Agreement, Data Processing Agreement, Data Processing Agreement

Testing. Regularly testing regularly test the key controls, systems and procedures of its information security program Information Security Program to validate ensure that they are properly implemented and effective in addressing the threats and risks identified.

Appears in 3 contracts

Samples: Data Processing Addendum, Data Processing Addendum, Data Processing Agreement

Testing. Regularly testing the key controls, systems and procedures of its information security program to validate that they are properly implemented and effective in addressing the threats and risks identified. Where applicable, such testing includes: ● Internal risk assessments; ● Service Organization Control 2 (SOC2) audit reports (or industry-standard successor reports).

Appears in 1 contract

Samples: Services Agreement

Testing. Regularly testing the key controls, systems and procedures of its information security program to validate that they are properly implemented and effective in addressing the threats and risks identified.. 00168520.0 - Confidential

Appears in 1 contract

Samples: Professional Services Agreement

Testing. Regularly testing of the key controls, systems and procedures of its information security program to validate that they are properly implemented and effective in addressing the threats and risks identified.. Such testing includes: (a) Internal risk assessments;

Appears in 1 contract

Samples: Master Subscription Agreement

Testing. Regularly testing the key controls, systems and procedures of its information security program to validate that they are properly implemented and effective in addressing the threats and risks identified.. Where applicable, such testing includes: a) Internal risk assessments; b) ISO 27001 and ISO 27018 certifications; and c) Service Organization Control 1 (SOC1) and Service Organization Control 2 (SOC2) audit reports (or industry- standard successor reports)

Appears in 1 contract

Samples: Professional Services Agreement