Common use of Information Security and Data Protection Clause in Contracts

Information Security and Data Protection. The following rules for information security and data protection apply:  Assertion of absolute security in IT systems is impossible. The RC is making every effort to maximize security level of users’ data and minimalize possible harm in the event of an incident.  The RC must define and abide by an information security and data protection policy related to the service being provided.  This must meet all requirements of any relevant EGI policies or procedures13 and also must be compliant with the relevant national legislation.

Appears in 1 contract

Sources: Operational Level Agreement

Information Security and Data Protection. The following rules for information security and data protection apply: Assertion of absolute security in IT systems is impossible. The RC is making every effort to maximize security level of users’ data and minimalize possible harm in the event of an incident. The RC must define and abide by an information security and data protection policy related to the service being provided. This must meet all requirements of any relevant EGI policies or procedures13 and also must be compliant with the relevant national legislation.

Appears in 1 contract

Sources: Operational Level Agreement