Examples of Security Policies and Standards in a sentence
The MDOT Mobile Device Management policy follows guidance provided in the State of Maryland Technology Security Policies and Standards and NIST Special Publication800-124 - Guidelines on Managing the Security of Mobile Devices in the Enterprises.
The Contractor shall also ensure that any personal data or information transmitted electronically or through a portable device is properly encrypted using (at a minimum) the Commonwealth’s “Cryptographic Management Standard” set forth in the Enterprise Information Security Policies and Standards published by the Executive Office for Technology, Services and Security (TSS), or a comparable Standard prescribed by the MBTA.
See also the Commonwealth’s Standard Contract Form and the Enterprise Security Policies and Standards: https://www.mass.gov/handbook/enterprise- information-security-policies-and-standards.
The Contractor shall adhere to and ensure compliance with the State of Maryland and the Maryland Transportation Authority’s Information Technology Security Policies and Standards.
The Contractor shall also ensure that any personal data or information transmitted electronically or through a portable device is properly encrypted using (at a minimum) the Commonwealth’s “Cryptographic Management Standard” set forth in the Enterprise Information Security Policies and Standards published by the Executive Office for Technology, Services and Security (TSS), or a comparable Standard prescribed by theMBTA.
For the entire policy, please go to www.bsu.edu/informationtechnology and select Security, Policies, and Standards.
University merchants must abide by the terms included in this policy as well as the Saint Louis University’s Information Security Policies and Standards.
The TO Contractor shall adhere to and ensure compliance with the State of Maryland and the Maryland Transportation Authority’s Information Technology Security Policies and Standards.
A key element to the Company’s implementation of the pilot and maintenance of Information Systems’ (IS) security is the existing IS Security Policies and Standards at National Grid.
This Personal Guaranty shall be construed in accordance with the laws of the Commonwealth of Utah, and shall inure to the benefit of Lender, its successors and assigns.