Security and Audit. 5.1. Sage shall implement and maintain appropriate technical and organisational security measures appropriate to the risks presented by the relevant Processing activity to protect the Personal Data against unauthorised or unlawful Processing and against accidental loss, destruction, damage or disclosure. Such measures include, without limitation, the security measures set out in clause 5.3. 5.2. Subject to any existing obligations of confidentiality owed to other parties, we shall make available to you all information reasonably necessary to demonstrate compliance with the obligations set out in this Exhibit A, which may include a summary of any available third party security audit report, or shall, at your sole cost and expense (including, for the avoidance of doubt any expenses reasonably incurred by us), allow for and contribute to independent audits, including inspections, conducted by a suitably-qualified third party auditor mandated by you and approved by us. 5.3. Sage operates, maintain and enforce an information security management programme (“Security Program”) which is consistent with recognised industry best practice. The Security Program contains appropriate administrative, physical, technical and organisational safeguards, policies and controls in the following areas: • Information security policies • Organization of information security • Human resources security • Asset management • Access control • Cryptography • Physical and environmental security • Operations security • Communications security • System acquisition, development and maintenance • Supplier relationships • Information security incident management • Information security aspects of business continuity management • Legislative, regulatory and contractual compliance
Appears in 5 contracts
Sources: Software License Agreement, Software License Agreement, Software License Agreement
Security and Audit. 5.1. Sage We shall implement and maintain appropriate technical and organisational security measures appropriate to the risks presented by the relevant Processing activity to protect the Personal Data against unauthorised or unlawful Processing and against accidental loss, destruction, damage or disclosure. Such measures include, without limitation, the security measures set out in clause Clause 5.3.
5.2. Subject to any existing obligations of confidentiality owed to other parties, we shall make available to you all information reasonably necessary to demonstrate compliance with the obligations set out in this Exhibit AC, which may include a summary of any available third party security audit report, or shall, at your sole cost and expense (including, for the avoidance of doubt any expenses reasonably incurred by us), allow for and contribute to independent audits, including inspections, conducted by a suitably-qualified third party auditor mandated by you and approved by us.
5.3. Sage operates, maintain and enforce an information security management programme (“Security Program”) which is consistent with recognised industry best practice. The Security Program contains appropriate administrative, physical, technical and organisational safeguards, policies and controls in the following areas: • Information security policies • Organization of information security • Human resources security • Asset management • Access control • Cryptography • Physical and environmental security • Operations security • Communications security • System acquisition, development and maintenance • Supplier relationships • Information security incident management • Information security aspects of business continuity management • Legislative, regulatory and contractual compliance
Appears in 2 contracts
Sources: Service and Subscription Agreement, Service and Subscription Agreement
Security and Audit. 5.1. Sage shall implement and maintain appropriate technical and organisational security measures appropriate to the risks presented by the relevant Processing activity to protect the Personal Data against unauthorised or unlawful Processing and against accidental loss, destruction, damage or disclosure. Such measures include, without limitation, the security measures set out in clause 5.3.
5.2. Subject to any existing obligations of confidentiality owed to other parties, we shall make available to you all information reasonably necessary to demonstrate compliance with the obligations set out in this Exhibit AB, which may include a summary of any available third party security audit report, or shall, at your sole cost and expense (including, for the avoidance of doubt any expenses reasonably incurred by us), allow for and contribute to independent audits, including inspections, conducted by a suitably-qualified third party auditor mandated by you and approved by us.
5.3. Sage operates, maintain and enforce an information security management programme (“Security Program”) which is consistent with recognised industry best practice. The Security Program contains appropriate administrative, physical, technical and organisational safeguards, policies and controls in the following areas: • Information security policies • Organization of information security • Human resources security • Asset management • Access control • Cryptography • Physical and environmental security • Operations security • Communications security • System acquisition, development and maintenance • Supplier relationships • Information security incident management • Information security aspects of business continuity management • Legislative, regulatory and contractual compliance
Appears in 2 contracts
Sources: Software Licence Agreement, Software Licence Agreement
Security and Audit. 5.1. Sage shall implement and maintain appropriate technical and organisational security measures appropriate to the risks presented by the relevant Processing activity to protect the Personal Customer Data against unauthorised or unlawful Processing and against accidental loss, destruction, damage or disclosure. Such measures include, without limitation, the security measures set out in clause 5.3.
5.2. Subject to any existing obligations of confidentiality owed to other parties, we shall make available to you all information reasonably necessary to demonstrate compliance with the obligations set out in this Exhibit AB, which may include a summary of any available third party security audit report, or shall, at your sole cost and expense (including, for the avoidance of doubt any expenses reasonably incurred by us), allow for and contribute to independent audits, including inspections, conducted by a suitably-qualified third party auditor mandated by you and approved by us.
5.3. Sage operates, maintain and enforce an information security management programme (“Security Program”) which is consistent with recognised industry best practice. The Security Program contains appropriate administrative, physical, technical and organisational safeguards, policies and controls in the following areas: • Information security policies • Organization of information security • Human resources security • Asset management • Access control • Cryptography • Physical and environmental security • Operations security • Communications security • System acquisition, development and maintenance • Supplier relationships • Information security incident management • Information security aspects of business continuity management • Legislative, regulatory and contractual compliance
Appears in 1 contract
Sources: Sage Payments Agreement
Security and Audit. 5.1. Sage We shall implement and maintain appropriate technical and organisational security measures appropriate to the risks presented by the relevant Processing activity to protect the Personal Data against unauthorised or unlawful Processing and against accidental loss, destruction, damage or disclosure. Such measures include, without limitation, the security measures set out in clause Clause 5.3.
5.2. Subject to any existing obligations of confidentiality owed to other parties, we shall make available to you all information reasonably necessary to demonstrate compliance with the obligations set out in this Exhibit A, which may include a summary of any available third party security audit report, or shall, at your sole cost and expense (including, for the avoidance of doubt any expenses reasonably incurred by us), allow for and contribute to independent audits, including inspections, conducted by a suitably-qualified third party auditor mandated by you and approved by us.
5.3. Sage operates, maintain and enforce an information security management programme (“Security Program”) which is consistent with recognised industry best practice. The Security Program contains appropriate administrative, physical, technical and organisational safeguards, policies and controls in the following areas: • Information security policies • Organization of information security • Human resources security • Asset management • Access control • Cryptography • Physical and environmental security • Operations security • Communications security • System acquisition, development and maintenance • Supplier relationships • Information security incident management • Information security aspects of business continuity management • Legislative, regulatory and contractual compliance
Appears in 1 contract
Sources: Software License Agreement
Security and Audit. 5.1. Sage shall implement and maintain appropriate technical and organisational security measures appropriate to the risks presented by the relevant Processing activity to protect the Personal Data against unauthorised or unlawful Processing and against accidental loss, destruction, damage or disclosure. Such measures include, without limitation, the security measures set out in clause 5.35.3 below.
5.2. Subject to any existing obligations of confidentiality owed to other parties, we Sage shall make available to you Customer all information reasonably necessary to demonstrate compliance with the obligations set out in this Exhibit AAddendum, which may include a summary of any available third party security audit report, or shall, at your Customer’s sole cost and expense (including, for the avoidance of doubt any expenses reasonably incurred by us▇▇▇▇), allow for and contribute to independent audits, including inspections, conducted by a suitably-qualified third party auditor mandated by you Customer and approved by usSage.
5.3. Sage operates, maintain and enforce an information security management programme (“Security Program”) which is consistent with recognised industry best practice. The Security Program contains appropriate administrative, physical, technical and organisational safeguards, policies and controls in the following areas: • Information security policies • Organization of information security • Human resources security • Asset management • Access control • Cryptography • Physical and environmental security • Operations security • Communications security • System acquisition, development and maintenance • Supplier relationships • Information security incident management • Information security aspects of business continuity management • Legislative, regulatory and contractual compliance.
Appears in 1 contract
Sources: Data Processing Addendum
Security and Audit. 5.1. Sage shall implement and maintain appropriate technical and organisational security measures appropriate to the risks presented by the relevant Processing activity to protect the Personal Data against unauthorised or unlawful Processing and against accidental loss, destruction, damage or disclosure. Such measures include, without limitation, the security measures set out in clause 5.3.
5.2. Subject to any existing obligations of confidentiality owed to other parties, we shall make available to you all information reasonably necessary to demonstrate compliance with the obligations set out in this Exhibit A, which may include a summary of any available third party security audit report, or shall, at your sole cost and expense (including, for the avoidance of doubt any expenses reasonably incurred by us), allow for and contribute to independent audits, including inspections, conducted by a suitably-qualified third party auditor mandated by you and approved by us.
5.3. Sage operates, maintain and enforce an information security management programme (“Security Program”) which is consistent with recognised industry best practice. The Security Program contains appropriate administrative, physical, technical and organisational safeguards, policies and controls in the following areas: • Information security policies • Organization Organisation of information security • Human resources security • Asset management • Access control • Cryptography • Physical and environmental security • Operations security • Communications security • System acquisition, development and maintenance • Supplier relationships • Information security incident management • Information security aspects of business continuity management • Legislative, regulatory and contractual compliance
Appears in 1 contract
Sources: Subscription Agreement