Information Security Program Requirements Standards Clause Samples

The INFORMATION SECURITY PROGRAM REQUIREMENTS STANDARDS clause establishes the baseline standards and obligations for maintaining information security within an organization or between contracting parties. It typically outlines the necessary policies, procedures, and technical controls that must be implemented to protect sensitive data, such as requiring regular risk assessments, employee training, and incident response plans. This clause ensures that all parties adhere to recognized security practices, thereby reducing the risk of data breaches and ensuring compliance with relevant laws and industry standards.
Information Security Program Requirements Standards. Provider shall implement, and warrants that it will implement throughout the Term of the Agreement, a documented information security program that is based on one or more of the following industry standard information security frameworks (each an "Information Security Industry Standard"): 1. Normy dotyczące wymogów programu bezpieczeństwa informacji Usługodawca wdraża — i gwarantuje, że przez cały Okres obowiązywania Umowy będzie realizował — udokumentowany program bezpieczeństwa informacji oparty na co najmniej jednych z następujących ram norm bezpieczeństwa informacji (każde z nich zwane „Normą branżową w zakresie bezpieczeństwa informacji”): (a) International Organization for Standardization ("ISO") / International Electrotechnical Commission ("IEC") ISO/IEC 27002 - Information technology – Security techniques – Code of practice for information security controls; or (a) Międzynarodowa Organizacja Normalizacyjna (International Organization for Standardization, „ISO”)/Międzynarodowa Komisja Elektrotechniczna (International Electrotechnical Commission, „IEC”), norma ISO/IEC 27002 — Technologia informacyjna — Techniki bezpieczeństwa — Kodeks praktyk w zakresie kontroli bezpieczeństwa informacji; lub (b) American Institute of Certified Public Accountants (“AICPA”) Trust Services Principles, Criteria and Illustrations; or (b) American Institute of Certified Public Accountants („AICPA”), zasady, kryteria i przykłady dotyczące usług zaufania; lub (c) Information Security Forum ("ISF") Standards of Good Practice ("SoGP") for Information Security; or (c) Information Security Forum („ISF”), standardy dobrych praktyk („SDP”) w zakresie bezpieczeństwa informacji; lub (d) National Institute of Standards and Technology ("NIST") Special Publication 800-53 - Security and Privacy Controls for Federal Information Systems and Organizations; or (d) Narodowy Instytut Standaryzacji i Technologii (Institute of Standards and Technology, „NIST”), Specjalna publikacja 800-53 — Mechanizmy kontroli bezpieczeństwa i prywatności dla systemów informatycznych i organizacji federalnych; lub (e) Information Systems Audit and Control Association ("ISACA") Control Objectives for Information and related Technology (COBIT). (e) Information Systems Audit and Control Association („ISACA”), Cele kontroli w zakresie technologii informatycznych i pokrewnych (COBIT).
Information Security Program Requirements Standards. Provider shall implement, and warrants that it will implement throughout the Term of the Agreement, a documented information security program that is based on one or more of the following industry standard information security frameworks (each an "Information Security Industry Standard"): 1.
Information Security Program Requirements Standards. Provider shall implement, and warrants that it will implement throughout the Term of the Agreement, a documented information security program that is based on one or more of the following industry standard information security frameworks (each an "Information Security Industry Standard"): (a) International Organization for Standardization ("ISO") / International Electrotechnical Commission ("IEC") ISO/IEC 27002 - Information technology – Security techniques – (b) American Institute of Certified Public Accountants (“AICPA”) Trust Services Principles, Criteria and Illustrations; or (c) Information Security Forum ("ISF") Standards of Good Practice ("SoGP") for Information Security; or (d) National Institute of Standards and Technology ("NIST") Special Publication 800-53 - (e) Information Systems Audit and Control Association ("ISACA") Control Objectives for Information and related Technology (COBIT).
Information Security Program Requirements Standards. Each Party shall implement, and warrants that it will implement throughout the Term of the Agreement, a documented information security program that is based on one or more of the following industry standard information security frameworks (each an “Information Security Industry Standard”):
Information Security Program Requirements Standards. Provider shall implement, and warrants that it will implement throughout the Term of the Agreement, a documented information security program that is based on one or more of the following industry standard information security frameworks (each an "Information Security Industry Standard"): 1. Informācijas drošības programmas prasības, standarti. Piegādātājs īsteno un garantē, ka visu Līguma darbības laiku īstenos dokumentētu informācijas drošības programmu, ▇▇▇▇▇ ▇▇▇▇▇▇ ir ▇▇▇▇▇ vai vairāki no šādiem nozares standartu informācijas drošības ietvariem (katrs – „Informācijas drošības nozares standarts“): (a) International Organization for Standardization ("ISO") / International Electrotechnical Commission ("IEC") ISO/IEC 27002 - Information technology – Security techniques – Code of practice for information security controls; or (a) Starptautiskās Standartizācijas organizācijas („ISO“) / Starptautiskās Elektrotehnikas komisijas („IEC“) ISO/IEC 27002 – Informācijas tehnoloģija – Drošības paņēmieni – Informācijas drošības kontroles prakses kodekss; vai
Information Security Program Requirements Standards. Provider shall implement, and warrants that it will implement throughout the Term of the Agreement, a documented information security program that is based on one or more of the following industry standard information security frameworks (each an "Information Security Industry Standard"): (a) International Organization for Standardization ("ISO") / International Electrotechnical Commission ("IEC") ISO/IEC 27002 - Information technology – Security techniques – Code of practice for information security controls; or (b) American Institute of Certified Public Accountants (“AICPA”) Trust Services Principles, Criteria and Illustrations; or (c) Information Security Forum ("ISF") Standards of Good Practice ("SoGP") for Information Security; or (d) National Institute of Standards and Technology ("NIST") Special Publication 800-53 - Security and Privacy Controls for Federal Information Systems and Organizations; or (e) Information Systems Audit and Control Association ("ISACA") Control Objectives for Information and related Technology (COBIT).
Information Security Program Requirements Standards. Provider shall implement, and warrants that it will implement throughout the Term of the Agreement, a documented information security program that is based on one or more of the following industry standard information security frameworks (each an "Information Security Industry Standard"): 1. Normy požadavků na programy bezpečnosti informací. Poskytovatel je povinen implementovat a zaručuje, že bude implementovat po celou Dobu platnosti Smlouvy, zdokumentovaný program bezpečnosti informací založený na jednom nebo více z následujících rámců průmyslových norem bezpečnosti informací (každý jednotlivě dále jen „Průmyslová norma bezpečnosti informací“): (a) International Organization for Standardization ("ISO") / International Electrotechnical Commission ("IEC") ISO/IEC 27002 - Information technology – Security techniques – Code of practice for information security controls; or (a) Mezinárodní organizace pro normalizaci („ISO“) / Mezinárodní elektrotechnická komise („IEC“), ISO/IEC 27002 – Informační technologie – Bezpečnostní techniky – Soubor postupů pro opatření bezpečnosti informací; nebo (b) American Institute of Certified Public Accountants (“AICPA”) Trust Services Principles, Criteria and Illustrations; or (b) Americký institut certifikovaných veřejných účetních (“AICPA”), Zásady důvěryhodných služeb, kritéria a ilustrace; nebo (c) Information Security Forum ("ISF") Standards of Good Practice ("SoGP") for Information Security; or (c) Information Security Forum ("ISF"), Normy správné praxe ("SoGP") pro bezpečnost informací; nebo (d) National Institute of Standards and Technology ("NIST") Special Publication 800-53 -
Information Security Program Requirements Standards. Each Party shall implement, and warrants that it will implement throughout the Term of the Agreement, a documented information security program that is based on one or more of the following industry standard information security frameworks (each an “Information Security Industry Standard”):

Related to Information Security Program Requirements Standards

  • Federal Medicaid System Security Requirements Compliance Party shall provide a security plan, risk assessment, and security controls review document within three months of the start date of this Agreement (and update it annually thereafter) in order to support audit compliance with 45 CFR 95.621 subpart F, ADP System Security Requirements and Review Process.

  • REGULATORY REQUIREMENTS/SAFETY Goods/Services supplied by Contractor shall meet all OSHA and other safety-related federal, state, local, and/or tribal regulatory requirements applicable to the Goods/Services.

  • Child Abuse Reporting Requirements A. Grantees shall comply with child abuse and neglect reporting requirements in Texas Family Code Chapter 261. This section is in addition to and does not supersede any other legal obligation of the Grantee to report child abuse. B. Grantee shall use the Texas Abuse Hotline Website located at ▇▇▇▇▇://▇▇▇.▇▇▇▇▇▇▇▇▇▇▇▇▇▇.▇▇▇/Login/Default.aspx as required by the System Agency. Grantee shall retain reporting documentation on site and make it available for inspection by the System Agency.

  • Program Requirements The parties shall comply with the Disadvantaged Business Enterprise Program requirements established in 49 CFR Part 26.