IS Requirements definition
Examples of IS Requirements in a sentence
Contractor will provide role-based access, authorization, and accountability controls within their product(s) or systems(s) that process, transit or store Confidential Information and/or Confidential Customer Information (“Product” or “System”) which conform to the guidelines or requirements set forth in the IS Requirements.
Contractor will provide role-based access, authorization, and accountability controls within their product which conform to the guidelines or requirements set forth in the IS Requirements.
Company shall be permitted to amend the IS Requirements upon written notification to Contractor.
Company reserves the right to validate the effectiveness of the IS Requirements or Contractor shall provide evidence of 3rd party independent validation.
Nothing contained in these IS Requirements shall be construed to limit any of Contractor’s other obligations regarding nondisclosure or information protection described in this Agreement.
Notwithstanding anything to the contrary in the Agreement, Company may report, to one or more public vulnerability reporting organizations, any defects or configuration conditions which result in vulnerabilities contemplated in these IS Requirements, if such defects or configuration conditions are not resolved or otherwise fixed within ninety (90) days of discovery, or as agreed upon by both parties.
Contractor shall utilize role-based access, authorization, and accountability controls within any systems containing Company information, all in conformance with these IS Requirements.
Notwithstanding anything to the contrary in the Agreement, Company has the right to report, to one or more public vulnerability reporting organizations, any defects or configuration conditions which result in vulnerabilities contemplated in these IS Requirements that would put Company or Company’s interests at risk, if such defects or configuration conditions are not resolved or otherwise fixed within ninety (90) days of discovery.
Contractor will provide role-based access, authorization, and accountability controls within their product which conform to the guidelines and requirements set forth in the IS Requirements.
If NEODATA fails to meet any of the following three information service requirements (the "IS Requirements"), Phil▇▇ ▇▇▇r▇▇, ▇▇ its sole option, may (*) as provided in this subparagraph (d)(2).