Examples of Information Security Terms in a sentence
Italicized terms not defined in this policy shall have the meanings contained in City Information Security Policy No. 13.00: Glossary of Information Security Terms.
Key TerminologyFor PCI DSS-specific terminology, the PCI Security Standards Council’s Glossary is the authoritative source for terminology definitions.1 For other cybersecurity terminology, the National Institute of Standards and Technology (NIST) IR 7298, Glossary of Key Information Security Terms, is the alternative reference document that ACME uses to define common cybersecurity terms.
As these key words have become more generally understood and guidance has become available through the NIST regarding specific key terms, suchas intranet, extranet, and internet, (see, for example, NIST IR 7298 Revision 1, Glossary of Key Information Security Terms, February 2011, available at http://csrc.nist.gov/publications/nistir/ir7298-rev1/nistir-7298-revision1.pdf), we believe the parenthetical language is no longer helpful.
If Supplier processes, stores or hosts Confidential Information during the performance of the Contract, Supplier must comply with CAE’s Information Security Terms for Suppliers available on CAE’s webpage for suppliers: https://www.cae.com/suppliers/.
This is notable as the May 2013 NIST Glossary of Key Information Security Terms cites the Committee on National Security Systems Instruction 4009, titled National Information Assurance (IA) Glossary, when defining cyber-attack, which includes “… stealing controlled information” (Glossary of Key Information Security Terms, 2013, p.
These IHS Markit Information Security Terms (“Information Security Terms”) constitute the information security terms with which IHS Markit shall use its reasonable efforts to comply in the course of providing the Services to Customer under the Agreement.
HortonWorks will log all attempted accesses to its servers (including time and date thereof) involved in performing obligations to or for Yahoo or otherwise conducted pursuant to these Information Security Terms and/or the Agreement, and the result of such attempts, successful or unsuccessful.
Yahoo may request suspension of any Personnel or Subcontractor (or Subcontractor personnel) if Yahoo reasonably believes (and reasonably demonstrates to HortonWorks) that such Personnel or Subcontractor (or Subcontractor personnel) has violated or risks violating any confidentiality obligations (as set forth in Section 10 (Confidentiality)) or Site access and data security obligations (as set forth in Section 11 (Site Access and Data Security) and Exhibit E (Information Security Terms)).
Innovative will make commercially reasonable efforts to provide Client notice of scheduled system maintenance 48 hours in advance.Exhibit DInnovative Interfaces Incorporated Information Security Terms and ConditionsUnless otherwise specified, capitalized terms in these Information Security Terms and Conditions have the same meaning as those in the GTCs. The terms set forth herein supplement, but do not replace or modify, the GTCs.
Yahoo will provide access to the Development Servers in accordance with this Agreement (including Section 11 (Site Access and Data Security) and Exhibit E (Information Security Terms)) to qualified HortonWorks Personnel with a valid business need to access the Development Servers.