Security Profile definition

Security Profile means the profile identified by the Customer’s responses to the Questionnaire.
Security Profile means the Client's cyber security posture / stance at the time of NexGen Cyber’s Assessment.
Security Profile means the Customer's cyber security posture / stance at the time of Conquest’s Assessment.

Examples of Security Profile in a sentence

  • Company acknowledges and agrees that as between the parties and except for the limited rights granted herein Customer owns all Security Profile Data.

  • You are responsible for understanding the Service’s features that are granted or disabled either globally or on a per Security Profile basis.

  • The Confidential Information of Company includes Cyber JumpStart Portal and Confidential Information of Customer includes Security Profile Data.

  • Customer understands and agrees that by inviting Users, Users will be permitted to (i) manage and review of Security Profile Data for which the User is authorized, (ii) collaborate on Cyber JumpStart Portal, or (iii) demonstrate Customer’s information security capabilities.

  • You are responsible for disabling or enabling Service features using the Service’s settings page that grants and/or removes features and functionality either globally, per Salesforce Security Profile or even per User.

  • The MCS should adhere to the Web Services Interoperability Organization Basic Profile version 1.1, and Basic Security Profile version 1.0. The MCS should support multiple languages and multiple currencies.

  • Bank shall be authorized to act on any and all Freeform or Freetype Payment Orders received through ▇▇▇▇▇▇ Cash, within the limits set forth in the Security Profile Form, that are authenticated in accordance with the Authentication Chart and contain the correct Client ID, Operator ID, and Password.

  • Company may remove any of Security Profile Data that Company determines to be in violation of the foregoing warranty.

  • This internal document is not publicly available and is restricted to ensure that the document is consistent with the information contained in the Security Profile, Operations Manual and the Code of Practice for Information Security Management (ISO/IEC 27002:2005) and the Guidelines for Information and Communications Technology Disaster Recovery Services (ISO/IEC 24762:2008).

  • Except as otherwise required by law, Company will remove, delete, or otherwise destroy all copies of Security Profile Data and Point of Contact Information in its possession as follows: (1) for Customers who have purchased IRJS Retainer, thirty (30) days following termination of this Agreement], and (2) for any Customer who has received a Subscription to any Module as a trial or at no cost, the earlier of thirty (30) days following termination or six (6) months of inactivity on Customer’s account.


More Definitions of Security Profile

Security Profile means the set of Security Policies that applies to a group of Users.

Related to Security Profile

  • Security procedure means a procedure employed for the purpose of verifying that an electronic signature, record, or performance is that of a specific person or for detecting changes or errors in the information in an electronic record. The term includes a procedure that requires the use of algorithms or other codes, identifying words or numbers, encryption, or callback or other acknowledgment procedures.

  • Security Provider means a person which, in accordance with the provisions of this Agreement, provides or is to provide any guarantee or other surety or security in respect of that Party’s obligations under this Agreement;

  • Security Procedures means rules and regulations governing access to, and health and safety procedures while on, Government premises; and information technology security protocols;

  • Security Property means all right, title and interest in, to and under any Security Document, including:

  • Information Security Program means the administrative, technical, and physical safeguards that a licensee uses to access, collect, distribute, process, protect, store, use, transmit, dispose of, or otherwise handle nonpublic information.