Formal Definition of an Information Security Policy Clause Samples

Formal Definition of an Information Security Policy. Cengage has developed and documented a formal information security policy that sets out Cengage's approach to managing information security. Specific areas covered by this policy include, but are not limited to the following: • Information security responsibilitiesElectronic communications systems - E-mail security - Instant messaging - Voicemail security • Disposing of confidential information - Secure on-site shredding - Disposal and reuse of electronic mediaData classification • Employee monitoring and access to employeeselectronic filesSecuring confidential information ("clean desk") • Data loss prevention tools • Client requests for information security statements and policies • Responding to information requests / media response guidelines • Third-party access to Cengage or client confidential informationMobile device management - Laptop security guidelines - Smart device guidelines - Employee personal device guidelines • Virus and malware protectionRemote accessWireless networking access • Electronic incident management and handling • Internet use and “acceptable use policy” requirements • Internet applications and services security assessment • Identification and authorization - Password standards for employees - Password standards for system / LAN administrators and application developers of intranet systems - Access control standards - User id standards for system / LAN administrators and intranet application developers • Computer hardware & software management • Encryption • IT physical securityIncident response, reporting and tracking policy • Facility security - Emergency evacuation and assembly locations - Handling biochemical incidents, suspicious mail and explosives - Physical security - Security guidelines for visitors - Visitor security information • HR security requirements - Background checks - Cell phones, cameras and recording devices - Workplace safety and weapons - Termination of systems access for departing employees The Cengage Code of Ethics and Security policy document is approved by management, Cengage employees are required to acknowledge receipt and acceptance of the Cengage Code of Ethics and Security policy upon commencing work with Cengage. Policies are communicated to all employees and contractors through onboarding/new hire orientation, training classes, and distribution of policies on-line.
Formal Definition of an Information Security Policy. Cengage has developed and documented a formal information security policy that sets out Cengage's approach to managing information security. Specific areas covered by this policy include, but are not limited to the following: - Password standards for system / LAN administrators and application developers of intranet systems - User id standards for system / LAN administrators and intranet application developers The Cengage Code of Ethics and Security policy document is approved by management, Cengage employees are required to acknowledge receipt and acceptance of the Cengage Code of Ethics and Security policy upon commencing work with Cengage. Policies are communicated to all employees and contractors through onboarding/new hire orientation, training classes, and distribution of policies on-line.

Related to Formal Definition of an Information Security Policy

  • Definition of Customer Information Any Customer Information will remain the sole and exclusive property of the Trust. “Customer Information” shall mean all non-public, personally identifiable information as defined by ▇▇▇▇▇-▇▇▇▇▇-▇▇▇▇▇▇ Act of 1999, as amended, and its implementing regulations (e.g., SEC Regulation S-P and Federal Reserve Board Regulation P) (collectively, the “GLB Act”).

  • Definition of Proprietary Information The Executive acknowledges that he may be furnished or may otherwise receive or have access to confidential information which relates to the Company’s past, present or future business activities, strategies, services or products, research and development; financial analysis and data; improvements, inventions, processes, techniques, designs or other technical data; profit margins and other financial information; fee arrangements; compilations for marketing or development; confidential personnel and payroll information; or other information regarding administrative, management, or financial activities of the Company, or of a third party which provided proprietary information to the Company on a confidential basis. All such information, including in any electronic form, and including any materials or documents containing such information, shall be considered by the Company and the Executive as proprietary and confidential (the “Proprietary Information”).

  • Confidential Information Definition Grantee acknowledges it and its employees or agents may, in the course of performing its responsibilities, be exposed to or acquire information that is: (i) confidential to Agency or Project participants or (ii) the disclosure of which is restricted under federal or state law, including without limitation: (a) personal information, as that term is used in ORS 646A.602(12), (b) social security numbers, and (c) information protected by the federal Family Educational Rights and Privacy Act under 20 USC § 1232g (items (i) and (ii) separately and collectively “Confidential Information”).

  • Additional Definitions The following terms have the meanings given below:

  • Vendor Logo (Supplemental Vendor Information Only) No response Optional. If Vendor desires that their logo be displayed on their public TIPS profile for TIPS and TIPS Member viewing, Vendor may upload that logo at this location. These supplemental documents shall not be considered part of the TIPS Contract. Rather, they are Vendor Supplemental Information for marketing and informational purposes only. Some participating public entities are required to seek Disadvantaged/Minority/Women Business & Federal HUBZone ("D/M/WBE/Federal HUBZone") vendors. Does Vendor certify that their entity is a D/M/WBE/Federal HUBZone vendor? If you respond "Yes," you must upload current certification proof in the appropriate "Response Attachments" location. NO Some participating public entities are required to seek Historically Underutilized Business (HUB) vendors as defined by the Texas Comptroller of Public Accounts Statewide HUB Program. Does Vendor certify that their entity is a HUB vendor? If you respond "Yes," you must upload current certification proof in the appropriate "Response Attachments" location. No Can the Vendor provide its proposed goods and services to all 50 US States? Yes