Examples of Information Security Schedule in a sentence
In addition to requirements set forth in the Agreement, Supplier shall handle, treat, store, access (or limit access), and otherwise protect Company Confidential Information in accordance with the terms of this Information Security Schedule.
We may amend the Jamf Information Security Schedule with written notice to you, provided that we will not modify it in a way that materially degrades or lessens the security measures we take.
SECURITY 12.1 Supplier must comply with Amgen information security policies, procedures, and standards as well as Amgen’s Information Security Schedule, if applicable.
We will protect Employee Information using security measures that are appropriate having regard to the sensitivity of the information and that are in compliance with requirements of privacy laws or as otherwise agreed to by the parties in an Information Security Schedule agreed to by the Parties.
For purposes of this Information Security Schedule, the term “Security” means Provider’s technological, physical, administrative and procedural safeguards, including but not limited to policies, procedures, standards, controls, hardware, software, firmware and physical security measures, the function or purpose of which is, in whole or part, to protect the confidentiality, integrity or availability of information and data) satisfactory to Company to protect EIS and Company’s Confidential Information.
We will, at a minimum, maintain the security of Customer Content in accordance with the Jamf Information Security Schedule that is available at xxxxx://xxx.xxxx.xxx/trust-center/legal.
As of the Effective Date, the following Schedules apply to this Agreement: • Schedule 1 – Support • Schedule 2 – Service Levels • Schedule 3 – Product Specific Terms • Schedule 4 – Information Security Schedule 1 - Support The following describes each party’s obligations with respect to Flexera’s provision of Support to Customer.
We will, at a minimum, maintain the security of Customer Content in accordance with the Jamf Information Security Schedule that is available at xxxxx://xxx.xxxx.xxx/trust- center/legal.
Attachment C Information Security Schedule This information security schedule (“Information Security Schedule”) is subject to the terms and conditions of the agreement to which it is attached (the “Agreement”).
In addition to requirements set forth in the Agreement, Provider shall handle, treat, store, access (or limit access), and otherwise protect Company’s Confidential Information (or similarly defined term in the Agreement) in accordance with the terms of this Information Security Schedule.