Security Control Requirements definition

Security Control Requirements has the meaning set out in para 3.1.1 of Schedule 7.

Examples of Security Control Requirements in a sentence

  • Third Party desires to retain access to certain Confidential Utility Information (as defined previously in this Data Security Agreement), Third Party must THEREFORE self-attest to Third Party’s compliance with the Information Security Control Requirements (“Requirements”) as listed herein.

  • Third Party desires to retain access to certain Confidential Utility Information1 (as defined in this Data Security Agreement), Third Party must THEREFORE self- attest to Third Party’s compliance with the Information Security Control Requirements (“Requirements”) as listed herein.

  • Third Party desires to retain access to certain Confidential Utility Information2 (as defined in this Data Security Agreement), Third Party must THEREFORE self- attest to Third Party’s compliance with the Information Security Control Requirements (“Requirements”) as listed herein.

  • Subscribing LEA: BY: Date: Printed Name: Title/Position: TO ACCEPT THE GENERAL OFFER, THE SUBSCRIBING LEA MUST DELIVER THIS SIGNED EXHIBIT TO THE PERSON AND EMAIL ADDRESS LISTED ABOVE These Zoom Minimum Security Control Requirements (“Minimum Control Requirements”) are stated at a relatively high level.

  • We will also provide you with a Business Online Banking Customer Security Control Requirements and Best Practices Checklist, which we recommend you carefully read and consider prior to executing.

  • ESE desires to retain access to certain Confidential Company Information1 (as defined in this Data Security Agreement), ESE must THEREFORE self- attest to ESE’s compliance with the Information Security Control Requirements (“Requirements”) as listed herein.

  • Third Party desires to retain access to certain Confidential Customer Utility Information1 (as defined in this Data Security Agreement), Third Party must THEREFORE self-attest to Third Party’s compliance with the Information Security Control Requirements (“Requirements”) as listed herein.