Formal Security Policy Clause Samples
A Formal Security Policy clause establishes the requirement for an organization to create, maintain, and enforce a documented set of rules and procedures governing information security. This clause typically outlines the scope of the policy, assigns responsibilities for its implementation, and may require regular reviews or updates to address evolving threats. By mandating a structured approach to security, the clause ensures that all personnel understand their obligations and that the organization can systematically manage and mitigate security risks.
POPULAR SAMPLE Copied 1 times
Formal Security Policy. Policy documents that govern the protection of the data are CBP (Customs) CIS HB 1400-05C and Department of Homeland (DHS) –4300A Sensitive Systems Policy.
Formal Security Policy. Consistent with the requirement of this Document, Service Provider will create and provide to City an information security policy that is approved by Service Provider’s management, published and communicated and agreed to be adhered to by all Service Provider’s employees, contractors and affiliates. Security Policy Review. Service Provider will review the information security policy at planned intervals or if significant changes occur to ensure its continuing suitability, adequacy, and effectiveness and may revise such policy, from time to time. Changes resulting in a lower standard of security or service must be agreed to by PCMC prior to adoption.
Formal Security Policy. Policy documents that govern the protection of the data are the Indian Health Manual, Part 8, and the HHS Information Security Program Policy (see Addendum A).
Formal Security Policy. Consistent with the requirement of this Schedule E-1, Supplier will create and provide to Company an information security policy that is approved by Supplier’s management, published and communicated to all Supplier Personnel and relevant Providers.
Formal Security Policy. DPS developed these procedures under this DSA to ensure the protection of DPS data when it is being provided to outside entities. Entity must comply with the procedures of this DSA for all systems used to store, process, or transmit DPS data. DPS may modify these requirements in its discretion, in accordance with its cyber security policies.
Formal Security Policy. Policy documents that govern the protection of the data are covered by HUD OCIO's IT Security Policy Handbook and <Organization B's "YYY Policy>."
Formal Security Policy. Consistent with the requirement of this Attachment, Provider will create and provide to Recipient an information security policy that is approved by Provider’s management, published and communicated to all Provider’s employees and relevant Providers.
Formal Security Policy. TrueCar will have an information security policy that is approved by TrueCar’s management and is published and communicated to all TrueCar Workforce. TrueCar will ensure that its Extended Workforce has a similar policy and process.
Formal Security Policy. Policy documents that govern the protection of the data are Department of Housing and Urban Development's IT Security Policy Handbook and Organization B's TBD Policy.
Formal Security Policy. Policy documents that govern the protection of the data are listed below: ● NIST SP 800-35, Guide to Information Technology Security Services, October 2003. ● NIST SP 800-47, Security Guide for Interconnecting Information Technology Systems, August 2002. ● NIST SP 800-53, Rev. 4, Security and Privacy Controls for Federal Information Systems and Organizations, April 2013 (updated January 22, 2015). ● UCAR Cybersecurity Policies: ○ UCAR Corporate Policy 1-7, Information Security, March 2019. ○ UCAR Corporate Policy 3-6, Access to and Use of Computer and Information Systems, May 2019. ● INPE/INPE-COSMIC-PGD InfoSec Policies: ○ INPE´s RE-DIR-568 - Normative document for the acceptable use of computational resources.