Information Security Policies definition

Information Security Policies any policies which relate to information security, whether provided by the Client or Xxxxxxxxx, including but not limited to policies on access control, information, classification (and handling), physical and environmental security, back-up, information transfer, protection from malware and management of technical vulnerabilities; “Personal data” all personal data (as defined by Data Protection Act or the GDPR, whichever is in force in the United Kingdom at the relevant time) relating to individuals, which is processed by the Data Processor on behalf of the Data Controller in accordance with the Agreement; and
Information Security Policies means the security standards, definitions and policies endorsed by Authorized Purchaser, or if not addressed by Authorized Purchaser, then at least known to be generally accepted practice in the industry, unless otherwise approved in writing by Authorized Purchaser.
Information Security Policies means the security standards, definitions and policies endorsed by the State of Colorado, or if not addressed by the State, then at least known to be generally accepted practice in the industry, unless otherwise approved in writing by the State.

Examples of Information Security Policies in a sentence

  • These procedures shall be consistent with the Department of Health Information Security Policies, as amended, which is incorporated herein by reference and the receipt of which is acknowledged by the provider, upon execution of this agreement.

  • The audit shall include the Contractor’s and Subcontractor’s compliance with the State’s Enterprise Information Security Policies and all applicable requirements, laws, regulations or policies.

  • All Contractor and subcontractor software, hardware and personnel that interface with House offices (including Leadership, Member, Committee, Officer and subordinate offices, such as House Information Resources (“HIR”)) are subject to and shall comply with the rules, regulations and sanctions outlined in the House Information Security Policies (“HISPOLS”), House Information Security Publications (“HISPUBS”) and HIR Security Standards, which will be provided upon request, as required by the Contract.

  • Archival tapes containing any Confidential Information shall be used by Contractor solely for back-up purposes and shall be maintained and used in accordance with the LAUSD Information Security Policies.

  • All employees are expected to maintain the confidentiality and integrity of the information assets and comply with the Information Security Policies.

  • For offers featuring a solution not hosted on State infrastructure, vendors shall describe how the proposed solution will support the agency’s information system security compliance requirements as described in the Statewide Information Security Policies: http://it.nc.gov/statewide-resources/policies.

  • The Contractor shall maintain a company-wide Information Security Program designed to evaluate Risks to the Confidentiality, Availability, and Integrity of the County Information covered under this Contract.Contractor’s Information Security Program shall include the creation and maintenance of Information Security Policies, standards, and procedures.

  • Information Security Policies, standards, and procedures will be communicated to all Contractor employees in a relevant, accessible, and understandable form and will be regularly reviewed and evaluated to ensure operational effectiveness, compliance with all applicable laws and regulations, and addresses new and emerging Threats and Risks.

  • The Provider agrees to abide by and maintain adequate data security measures as outlined in IXL Information Security Policies and Procedures, attached in “Exhibit F”to protect Student Data from unauthorized disclosure or acquisition by an unauthorized person.

  • When communicating in any form, please observe the expected behaviour as outlined in the Student Charter and note the Information Security Policies and the Computer Suites Acceptable Use policy.

Related to Information Security Policies

  • Security Policy means the Authority’s Security Policy annexed to Schedule (Security Requirements and Plan) as updated from time to time.

  • Information Security (GSN GISN 5) is all the means and functions ensuring the accessibility, confidentiality or integrity of information or communications, excluding the means and functions intended to safeguard against malfunctions. This includes "cryptography", "cryptographic activation", 'cryptanalysis', protection against compromising emanations and computer security.

  • City Policies means any or all (as the context requires) of those procedures, standards and/or standard specifications, requirements, policies and the like listed in Schedule H or notified to the Supplier from time to time, as the same may be updated, modified, expanded, revised, supplemented and/or replaced from time to time by the City (as notified to the Supplier);

  • Information Security Incident means (i) any actual or suspected incident involving Seller Information System that may involve Buyer’s Sensitive Information, or (ii) any actual or suspected unauthorized access to, use, or disclosure of Buyer’s Sensitive Information.

  • Health insurance policy means a policy that provides specified benefits for hospital and/or general treatment and meets all requirements under section 63-10 of the Private Health Insurance Act 2007.