Information Security Measures Sample Clauses
The Information Security Measures clause establishes the requirements and standards for protecting sensitive data and information handled under the agreement. It typically outlines the technical and organizational safeguards that must be implemented, such as encryption, access controls, and regular security assessments, and may specify compliance with recognized security frameworks or laws. By setting clear expectations for data protection, this clause helps prevent unauthorized access, data breaches, and ensures both parties understand their responsibilities in maintaining information security.
POPULAR SAMPLE Copied 1 times
Information Security Measures. ▇▇▇▇ takes information security seriously. This information security overview applies to Dell’s corporate controls for safeguarding personal data which is processed and transferred amongst Dell group companies. Dell’s information security program enables the workforce to understand their responsibilities. Some customer solutions may have alternate safeguards outlined in the statement of work as agreed with each customer.
Information Security Measures. LIT takes information security seriously. This information security overview applies to LIT’s corporate controls for safeguarding personal information which is processed and transferred amongst LIT group companies. LIT’s information security program enables the workforce to understand their responsibilities. Some customer solutions may have alternate safeguards outlined in the statement of work as agreed with each customer.
Information Security Measures. Vendor is committed to ensuring that information security control is implemented and properly managed to protect the confidentiality, integrity and availability of Personal Data processed on behalf of and under the instruction of NTT.
Information Security Measures. This information security overview applies to Provider’s corporate controls for safeguarding Personal Data. Provider’s information security program enables the workforce to understand their responsibilities.
Information Security Measures. 7.1 The Processor shall take appropriate technical and organisational precautions to ensure the secure Processing of the Controller’s Personal Data, especially to prevent and protect the Personal Data from accidental loss, modification, destruction or damage. When assessing the appropriate level of such information security measures, the Processor must take into account the risks related to Processing the Personal Data, the level of technology, the implementation costs, the nature, scope, context, and purposes of the Processing, and the risks affecting the rights and freedoms of natural persons, which vary in likelihood and severity. At a minimum, the Processor undertakes to:
7.1.1 pseudonymise and encrypt the Personal Data to uphold their confidentiality, if necessary;
7.1.2 guarantee the continuous confidentiality, integrity, availability and fault-tolerance of the processing systems and services;
7.1.3 ensure the capability to restore availability and access to the Personal Data within a reasonable time in the event of a physical or technical failure;
7.1.4 create an operating model for testing, investigating and regularly assessing the effectiveness of the technical and organisational measures to ensure secure data processing; and
7.1.5 conduct information security audits on the Personal Data processing functions.
7.2 The Processor understands that the Personal Data is confidential and should be treated accordingly. The Processor shall ensure that the Personal Data is only processed by persons who are entitled to process them to provide the Service agreed upon in the Service Agreement. The Processor shall ensure that the persons entitled to process the Personal Data have undertaken to comply with a confidentiality obligation or are covered by an appropriate statutory confidentiality obligation.
Information Security Measures. In addition to, and not in lieu of, any information security requirements set forth in the Agreements, Supplier shall implement appropriate technical, administrative and organizational measures to ensure that Personal Data is protected against accidental or unlawful Processing, destruction, loss, alteration, unauthorized disclosure of, or access to such Personal Data, and such measures to the extent appropriate under the circumstances and taking into account the state of the art, the costs of implementation and the nature, scope, context and purposes of the Processing shall include but not limited to the requirements of the Information Security and Privacy Requirements found here: ▇▇▇▇▇://▇▇▇.▇▇▇▇▇▇▇▇▇▇▇.▇▇▇/en-us/about/doing-business-with-CenturyLink.html, as well as:
a. Pseudonymizing and/or encrypting Personal Data;
b. Reasonable steps to ensure reliability and integrity of any Supplier personnel or permitted Sub- Processor who have access to Personal Data and appropriate measures to ensure that such parties are informed of the confidential nature of Personal Data and comply with the obligations set forth in this Addendum;
c. Testing, assessing and evaluating the effectiveness of information systems for ensuring the security of Processing;
d. Reasonable steps to ensure the ability to restore the availability and access to Personal Data in a timely manner in the event of a physical or technical incident; and
e. Reasonable steps to ensure the ongoing confidentiality, integrity, availability and resilience of systems and services utilized to Process Personal Data.
Information Security Measures. NTT is committed to ensuring that information security controls are implemented and properly managed in order to protect the confidentiality, integrity and availability of Personal Data processed on behalf of and under the instruction of the Client. NTT has established a group wide Information Security Management System (‘ ISMS’) which is aligned to leading information security practices and standards from around the world including the ISO27000 series and NIST Cyber Security Framework (‘ CSF’).
Information Security Measures. Provider shall implement and maintain at all times appropriate measures (“Information Security Measures”) designed, whether specific to T-Mobile Confidential Information or confidential information generally, to: (i) ensure the security and confidentiality of T-Mobile Confidential Information; (ii) identify potential threats or hazards to the security or integrity of T-Mobile Confidential Information and protect against any anticipated threats or hazards; and (iii) protect against unauthorized access to or use of T-Mobile Confidential Information. The Parties will mutually update Master Services Agreement 31 [* * *] The confidential content of this Exhibit 10.1 has been omitted and filed separately with the Securities and Exchange Commission. Confidential treatment has been requested with respect to the omitted portions.
Information Security Measures. The Association will use reasonable efforts to ensure the security of the Personal Information provided to it through the use of the security and contractual measures.
Information Security Measures. Vendor shall maintain adequate technical and organizational measures, consistent with or exceeding industry standards, to protect against the loss of any Altruist Proprietary Information or Client Data and any unauthorized, negligent or inadvertent use, transmission or disclosure of or access to any Altruist Proprietary Information or Client Data including those outlined in Exhibit 1 Security Requirements Schedule to this Agreement. Vendor shall, upon request by ▇▇▇▇▇▇▇▇ and at mutually agreeable times and locations, meet with Altruist to discuss Vendor’s security policies, controls and measures applicable to the Data Transmission Services and/or the protection of Altruist Proprietary Information and Client Data in the possession or under the control of Vendor (including its Representatives).