Infrastructure Security. Processor personnel are required to follow security policies that define access privileges and control for the transmission, processing, and storing of sensitive data. Processor conducts annual risk assessments on system and networking components which include systems, data, computers, personal devices, applications, facilities, connections, individuals, documentation, and electronic media, where confidential, sensitive data is present. Personnel are required to execute an Information Security policy and must acknowledge receipt of, and compliance with, Processor’s security policies.
Appears in 2 contracts
Sources: Data Processing Agreement, Data Processing Agreement
Infrastructure Security. Processor personnel are required to follow security policies that define access privileges and control for the transmission, processing, and storing of sensitive data. Processor conducts annual conductsannual risk assessments on assessmentson system and networking components which componentswhich include systems, data, computers, personal devices, applications, facilities, connections, individuals, documentation, and electronic andelectronic media, where confidential, sensitive data is present. Personnel are required to execute an Information Security policy and must acknowledge receipt of, and compliance withcompliancewith, Processor’s Processorʼs security policies.
Appears in 1 contract
Sources: Data Processing Agreement