Information Security Reviews definition

Information Security Reviews shall have the meaning set forth in Section 3.19(c).
Information Security Reviews has the meaning set forth in Section 3.13(p).
Information Security Reviews has the meaning set forth in Section 5.19(e).

Examples of Information Security Reviews in a sentence

  • To the fullest extent permitted by law, Vendor hereby waives the benefit of any state or federal law which may provide a cause of action against County and its Affiliates based upon Reviews permitted under this Section 29.5 (Information Security Reviews) and conducted pursuant to the agreed upon scope and methodology.

  • Such Information Security Reviews have shown no material non-conformance with any Applicable Laws or with either Company’s applicable information security controls.

  • The Company has: (i) regularly conducted and regularly conduct vulnerability testing, risk assessments, and external audits of, and tracks security incidents related to the Company’s systems and products (collectively, “Information Security Reviews”); (ii) timely corrected any material exceptions or vulnerabilities identified in such Information Security Reviews; and (iii) timely installed software security patches and other fixes to identified technical information security vulnerabilities.

  • For all three modes, the initialisation procedure consists of the slider moving towards the limit switch and moving back when the initialisation is finished and causes the simulation to stop when this has been achieved, while the second metric reports the minimum position that was reached.

  • This Policy supports the implementation of the sub-control objectivesrelating to Compliance; Compliance with Legal and Contractual Requirements, and Information Security Reviews as part of the Network Information Systems Regulations (2018).

  • Such Information Security Reviews have shown no non-conformance with any applicable Laws or with the Company’s applicable information security controls.

  • Each Company has: (i) conducted commercially reasonable reviews or audits of its IT Infrastructure and information security controls (collectively, “Information Security Reviews”); (ii) corrected any exceptions or vulnerabilities identified in such Information Security Reviews; and (iii) installed software security patches and other fixes to identified technical information security vulnerabilities.

  • The Company has, in all material respects: (i) regularly conducted vulnerability testing, risk assessments, and external audits of, and tracked security incidents related to, the Company’s IT systems (collectively, “Information Security Reviews”); (ii) timely corrected any material exceptions or vulnerabilities identified in such Information Security Reviews; and (iii) timely installed software security patches and other fixes to identified technical information security vulnerabilities.

  • KCS has: (i) conducted commercially reasonable reviews or audits of its IT Infrastructure (collectively, “Information Security Reviews”); (ii) corrected any exceptions or vulnerabilities identified in such Information Security Reviews; and (iii) installed software security patches and other fixes to identified technical information security vulnerabilities.

  • Information Security Reviews AEDA Tools must perform independent reviews of information security and technical security requirements to ensure compliance with security policies and standards.


More Definitions of Information Security Reviews

Information Security Reviews has the meaning set forth in Section 2.12(b).
Information Security Reviews shall have the meaning given to that term in Clause 6.1(p)(xi);
Information Security Reviews is defined in Section 4.12(c). “Initial MAAP Repayment” is defined in Section 6.18.

Related to Information Security Reviews

  • Information Security (GSN GISN 5) is all the means and functions ensuring the accessibility, confidentiality or integrity of information or communications, excluding the means and functions intended to safeguard against malfunctions. This includes "cryptography", "cryptographic activation", 'cryptanalysis', protection against compromising emanations and computer security.

  • Information Security Program means the administrative, technical, and physical safeguards that a licensee uses to access, collect, distribute, process, protect, store, use, transmit, dispose of, or otherwise handle nonpublic information.

  • Information Security Breach means the unauthorized acquisition, access, use, disclosure, transmittal, storage or transportation of Confidential Information which is not permitted by law or by the terms of this Amendment, including, but not limited to, a Security Incident.

  • Information Provider means the person or organisation providing the Information under this licence.

  • Safeguards Monitoring Report means each report prepared and submitted by the Borrower to ADB that describes progress with implementation of and compliance with the EMP and the RP, including any corrective and preventative actions;

  • Investigative information means information, records, and documents received or generated by a physical therapy licensing board pursuant to an investigation.

  • Information Package means the most recent compilation of financial and other data with respect to the Failed Bank, including any amendments or supplements thereto, provided to the Assuming Institution by the Corporation on the web site used by the Corporation to market the Failed Bank to potential acquirers.

  • Statement of Additional Information means, respectively, the form of prospectus and statement of additional information with respect to the Fund filed by the Investment Company as part of the Registration Statement, or as they may be amended or supplemented from time to time.

  • Due Diligence Information means any information supplied to the Supplier by or on behalf of the Customer prior to the Call Off Commencement Date;

  • Criminal investigatory record means a record which is not

  • MI Report means a report containing Management Information submitted to the Authority in accordance with Framework Schedule 8 (Management Information);

  • Investigative consumer report means a consumer report or portion thereof in which information about a natural person's character, general reputation, personal characteristics, or mode of living is obtained through personal interviews with the person's neighbors, friends, associates, acquaintances, or others who may have knowledge concerning such items of information.

  • External inspection means an inspection made when a boiler is in operation.

  • Project Management Report means each report prepared in accordance with Section 4.02 of this Agreement;

  • Information Circular means a completed Form 51-102F5 Information Circular; “informed person” means

  • Information has the meaning specified in Section 10.07.

  • Inspection Report means the report delivered by the Master Servicer or the Special Servicer, as the case may be, substantially in the form of Exhibit L hereto.

  • Data Room Information means the information and documents listed in the index of documents contained in the Data Site attached to the Company Disclosure Letter;

  • Phase I Report means, with respect to any Facility, a report that (i) conforms to the ASTM Standard Practice for Environmental Site Assessments: Phase I Environmental Site Assessment Process, E 1527, (ii) was conducted no more than six months prior to the date such report is required to be delivered hereunder, by one or more environmental consulting firms reasonably satisfactory to Administrative Agent, (iii) includes an assessment of asbestos-containing materials at such Facility, (iv) is accompanied by (a) an estimate of the reasonable worst-case cost of investigating and remediating any Hazardous Materials Activity identified in the Phase I Report as giving rise to an actual or potential material violation of any Environmental Law or as presenting a material risk of giving rise to a material Environmental Claim, and (b) a current compliance audit setting forth an assessment of Holdings’, its Subsidiaries’ and such Facility’s current and past compliance with Environmental Laws and an estimate of the cost of rectifying any non-compliance with current Environmental Laws identified therein and the cost of compliance with reasonably anticipated future Environmental Laws identified therein.

  • information folder means the complete folder, including the information document, file, data, drawings, photographs, and so on, supplied by the applicant, it being permissible to supply the information folder in the form of an electronic file;

  • Background investigation means the investigation conducted by a licensee or applicant to support the determination of trustworthiness and reliability.

  • Feasibility Report means a detailed report, in form and substance sufficient for presentation to arm's length institutional lenders considering project financing, showing the feasibility of placing any part of the Property into commercial production as a Mine and shall include a reasonable assessment of the various categories of ore reserves and their amenability to metallurgical treatment, a complete description of the work, equipment and supplies required to bring such part of the Property into commercial production and the estimated cost thereof, a description of the mining methods to be employed and a financial appraisal of the proposed operations and including at least the following: (i) a description of that part of the Property to be covered by the proposed Mine; (ii) the estimated recoverable reserves of Minerals and the estimated composition and content thereof; (iii) the proposed procedure for development, mining and production; (iv) results of ore amenability treatment tests (if any); (v) the nature and extent of the facilities proposed to be acquired, which may include mill facilities if the size, extent and location of the ore body makes such mill facilities feasible, in which event the study shall also include a preliminary design for such mill; (vi) the total costs, including capital budget, which are reasonably required to purchase, construct and install all structures, machinery and equipment required for the proposed Mine, including a schedule of timing of such requirements; (vii) all environmental impact studies and costs of implementation; (viii) the period in which it is proposed the Property shall be brought to commercial production; and (ix) such other data and information as are reasonably necessary to substantiate the existence of an ore deposit of sufficient size and grade to justify development of a mine, taking into account all relevant business, tax and other economic considerations including a cost comparison between purchasing or leasing and renting of facilities and equipment required for the operation of the Property as a Mine.

  • Information Security Incident means (i) any actual or suspected incident involving Seller Information System that may involve Buyer’s Sensitive Information, or (ii) any actual or suspected unauthorized access to, use, or disclosure of Buyer’s Sensitive Information.

  • Data Tape Information The information provided by the Originators as of the Cut-off Date to the Depositor or the Purchaser setting forth the following information with respect to each Mortgage Loan: (1) the Mortgagor's name; (2) as to each Mortgage Loan, the Scheduled Principal Balance as of the Cut-off Date; (3) the Mortgage Rate Cap; (4) the Index; (5) a code indicating whether the Mortgaged Property is owner occupied; (6) the type of Mortgaged Property; (7) the first date on which the Scheduled Payment was due on the Mortgage Loan and, if such date is not consistent with the Due Date currently in effect, such Due Date; (8) the "paid through date" based on payments received from the related Mortgagor;

  • Commercial Information means information regarding the purchase and sale of goods and services, including, but not limited to, information regarding marketing strategy, production data, assessments of goods and services, mineral exploration records, and compilations of data regarding commercial activity.

  • Criminal history record information means records and data collected by criminal justice agencies