Information Systems Security. In the event this Agreement or an Order provides for remote access to Company’s electronic information systems (“CIS”) by Provider, Provider shall at all times protect CIS through procedures and tools deemed satisfactory to Company. Such procedures and tools shall include without limitation: (i) A mechanism to determine and immediately report to Company possible security breaches; (ii) Controls to ensure the return or destruction, at Company’s direction, of information transmitted through CIS; (iii) A process for maintaining the confidentiality, integrity and availability of information transmitted through CIS; and (iv) Methods for controlling access to CIS, which shall include without limitation (i) permitted access methods; (ii) an authorization process for users’ access and privileges; and (iii) maintenance of a list of authorized users.
Appears in 3 contracts
Sources: Integrated Facilities Management Services Agreement, Integrated Facilities Management Services Agreement (Amgen Inc), Integrated Facilities Management Services Agreement (Amgen Inc)