Information Security Controls Sample Clauses

Information Security Controls. Agent has established and during the Term will maintain an Information Security Standard aligned with industry practice (such as the International Organization for Standardization’s standards: ISO/IEC 2700 I: 201 3). Information security responsibilities are defined in the Information Security Standard and the Information Security Policy is reviewed on a periodic basis and approved by senior management.
Information Security Controls. DOCUMENT means the security requirements documents to be prepared by IBM and approved by SCA pursuant to the Transition Plan.
Information Security Controls. Without limiting any other provisions of the Agreement, Supplier must comply with Client's reasonable requirements from time to time in relation to: (a) appropriate Information Security Controls to protect Client Material and New Material; (b) mechanisms for detecting, responding to, remediating, and the notification of Data Security Incidents; and (c) assurance, testing, evaluations, reviews and audits of the Information Security Controls and mechanisms referred to in this clause 7.
Information Security Controls. On any of Company’s systems that interface with Moloco’s infrastructure or systems, Company is solely responsible for maintaining appropriate information security safeguards (including, without limitation, firewalls, anti-virus software, intrusion detection software, etc.) to protect those systems against unauthorized access, use or interference. Moloco shall have no liability for failures of Company’s systems or loss or unauthorized access to or use of data stored on Company’s systems that result from Company’s failure to comply with this section.
Information Security Controls. Each Party shall be responsible for establishing and maintaining the information security program that includes appropriate technical and organizational measures to (i) ensure the security and confidentiality of Partner Data; (ii) protect against unauthorized access, alteration, destruction, disclosure, loss, or use of Partner Data that could result in substantial harm to Partner or any of its customers and/or End-Users; (iii) protect against any anticipated threats or hazards to the security or integrity of Partner Data. Parties acknowledge that Partner remains ultimately responsible for maintaining information security of its systems, equipment (including but not limited to servers, workstations, routers, switches), network, data communication lines, as required to operate the Platform or use the Services.
Information Security Controls 

Related to Information Security Controls

  • Security Controls Annually, upon Fund’s reasonable request, DST shall provide Fund’s Chief Information Security Officer or his or her designee with a summary of its corporate information security policy and an opportunity to discuss DST’s information security measures, and a high level and non-confidential summary of any penetration testing related to the provision of in-scope services . DST shall review its Security Policy annually.

  • Technical Security Controls 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.

  • Information Security IET information security management practices, policies and regulatory compliance requirements are aimed at assuring the confidentiality, integrity and availability of Customer information. The UC ▇▇▇▇▇ Cyber-safety Policy, UC ▇▇▇▇▇ Security Standards Policy (PPM Section 310-22), is adopted by the campus and IET to define the responsibilities and key practices for assuring the security of UC ▇▇▇▇▇ computing systems and electronic data.

  • Information Security Program (1) DTI shall implement and maintain a comprehensive written information security program applicable to the Personal Information ("Information Security Program") which shall include commercially reasonable measures, including, as appropriate, policies and procedures and technical, physical, and administrative safeguards that are consistent with industry standards, providing for (i) the security and confidentiality of the Personal Information, (ii) protection of the Personal Information against reasonably foreseeable threats or hazards to the security or integrity of the Personal Information, (iii) protection against unauthorized access to or use of or loss or theft of the Personal Information, and (iv) appropriate disposal of the Personal Information. Without limiting the generality of the foregoing, the Information Security Program shall provide for (i) continual assessment and re-assessment of the risks to the security of Personal Information acquired or maintained by DTI and its agents, contractors and subcontractors in connection with the Services, including but not limited to (A) identification of internal and external threats that could result in unauthorized disclosure, alteration or destruction of Personal Information and systems used by DTI and its agents, contractors and subcontractors, (B) assessment of the likelihood and potential damage of such threats, taking into account the sensitivity of such Personal Information, and (C) assessment of the sufficiency of policies, procedures, information systems of DTI and its agents, contractors and subcontractors, and other arrangements in place, to control risks; and (ii) appropriate protection against such risks. (2) The Information Security Program shall require encryption of any Personal Information in electronic format while in transit or in storage, and enhanced controls and standards for transport and disposal of physical media containing Personal Information. DTI shall, and shall require its agents, contractors and subcontractors who access or use Personal Information or Confidential Information to, regularly test key controls, systems and procedures relating to the Information Security Program ("ISP Tests"). DTI shall advise the Funds of any material issues identified in the ISP Tests potentially affecting the Information Security Program. (3) DTI shall comply with its Information Security Program.

  • INFORMATION SECURITY SCHEDULE All capitalized terms not defined in this Information Security Schedule (this “Security Schedule”) shall have the meanings ascribed to them in the Transfer Agency and Service Agreement by and between DST and each of the funds listed on Exhibit A thereto (each such fund, or series thereof, severally, and not jointly, the “Fund”) dated March 1, 2022 (the “Agreement”). DST and Fund hereby agree that DST shall maintain and comply with an information security policy (“Security Policy”) that satisfies the requirements set forth below; provided, that, because information security is a highly dynamic space (where laws, regulations and threats are constantly changing), DST reserves the right to make changes to its information security controls at any time and at the sole discretion of DST in a manner that it believes does not materially reduce the protection it applies to Fund Data. From time to time, DST may subcontract services performed under the Agreement (to the extent provided for under the Agreement) or provide access to Fund Data or its network to a subcontractor or other third party; provided, that, such subcontractor or third party implements and maintains security measures DST believes are at least as stringent as those described in this Security Schedule. For the purposes of this Schedule “prevailing industry practices and standards” refers to standards among financial institutions, including mutual funds, and third parties providing financial services to financial institutions.