Information Security Policies definition

Information Security Policies any policies which relate to information security, whether provided by the Client or ▇▇▇▇▇▇▇▇▇, including but not limited to policies on access control, information, classification (and handling), physical and environmental security, back-up, information transfer, protection from malware and management of technical vulnerabilities; “Personal data” all personal data (as defined by Data Protection Act or the GDPR, whichever is in force in the United Kingdom at the relevant time) relating to individuals, which is processed by the Data Processor on behalf of the Data Controller in accordance with the Agreement; and
Information Security Policies means the security standards, definitions and policies endorsed by Authorized Purchaser, or if not addressed by Authorized Purchaser, then at least known to be generally accepted practice in the industry, unless otherwise approved in writing by Authorized Purchaser.
Information Security Policies means the security standards, definitions and policies endorsed by the State of Colorado, or if not addressed by the State, then at least known to be generally accepted practice in the industry, unless otherwise approved in writing by the State.

Examples of Information Security Policies in a sentence

  • Archival tapes containing any Confidential Information shall be used by Contractor solely for back-up purposes and shall be maintained and used in accordance with the LAUSD Information Security Policies.

  • The Provider agrees to abide by and maintain adequate data security measures as outlined in IXL Information Security Policies and Procedures, attached in “Exhibit F”to protect Student Data from unauthorized disclosure or acquisition by an unauthorized person.

  • These procedures shall be consistent with the Department of Health Information Security Policies, as amended, which is incorporated herein by reference and the receipt of which is acknowledged by the provider, upon execution of this agreement.

  • Granicus will respond and report to actual incidents in accordance with the Granicus Incident Response Plan and Information Security Policies.

  • The audit shall include the Contractor’s and Subcontractor’s compliance with the State’s Enterprise Information Security Policies and all applicable requirements, laws, regulations or policies.

  • Data in transfer over Granicus internal networks will be protected according to the Granicus Information Security Policies.

  • Information Security Policies, standards, and procedures will be communicated to all Contractor employees in a relevant, accessible, and understandable form and will be regularly reviewed and evaluated to ensure operational effectiveness, compliance with all applicable laws and regulations, and addresses new and emerging Threats and Risks.

  • The State’s Enterprise Information Security Policies document is found at the following URL: ▇▇▇▇▇://▇▇▇.▇▇.▇▇▇/finance/strategic-technology-solutions/strategic-technology- solutions/sts-security-policies.html.

  • The Provider agrees to abide by and maintain adequate data security measures, as outlined in IXL Information Security Policies and Procedures, attached in “Exhibit F” to protect Student Data from unauthorized disclosure or acquisition by an unauthorized person.

  • Contractor’s Information Security Program must include the creation and maintenance of Information Security Policies, standards, and procedures.