Examples of Chief Information Security Officer in a sentence
Oversight Oversight of the MDR Project is administered through the UCC, which is directed by the Utah State Chief Information Security Officer (CISO).
Any unauthorized access or use of confidential information must be reported to the DOH Chief Information Security Officer at xxxxxxxx@xxx.xx.xxx.
Our policies are reviewed and updated annually by our Chief Information Security Officer (CISO) and Chief Privacy Officer (CPO), and submitted for final approval by our Data Privacy and Security Steering Committee.
Annually, upon Client’s reasonable request, State Street shall provide Client’s Chief Information Security Officer or his or her designee with a copy of its corporate information security controls that form the basis for State Street’s Security Policy and an opportunity to discuss State Street’s information security measures with a qualified member of State Street’s information technology management team.
Upon a breach or suspected breach of confidentiality, the Contractor shall immediately notify the DOH Chief Information Security Officer at xxxxxxxx@xxx.xx.xxx.
Service Provider shall ensure that CHOP data and Confidential Information provided to Service Provider hereunder are not stored outside of the United States of America (“U.S.”) or accessed directly or indirectly from outside the U.S. under any circumstances, including but not limited to storage with third party cloud computing service providers, absent the prior written consent of CHOP’s Chief Information Security Officer.
Unless otherwise specifically authorized by the DOH Chief Information Security Officer, Contractor receiving confidential information under this contract assures that: • Encryption is selected and applied using industry standard algorithms validated by the National Institute of Standards and Technology (NIST) Cryptographic Algorithm Validation Program against all information stored locally and off-site.
Information terms of Attachment C shall be provided to the Agency of Digital Services Chief Information Security Officer.
Unless otherwise specifically authorized by the DOH Chief Information Security Officer, Contractor receiving confidential information under this contract assures that: • encryption is selected and applied using industry standard algorithms validated by the National Institute of Standards and Technology (NIST) Cryptographic Algorithm Validation Program against all information stored locally and off-site.
If responding to public record disclosure requests under RCW 42.56, the Contractor agrees to notify and discuss with the DOH Chief Information Security Officer requests for all information that are part of this contract, prior to disclosing the information.