Common use of Security Policies and Safeguards Clause in Contracts

Security Policies and Safeguards. Infor shall establish and maintain administrative, technical, and physical safeguards designed to protect against the destruction, loss, unauthorized access or alteration of Licensee Data and Personal Information in the possession or under the control of Infor or to which Infor has access, which are: (i) no less rigorous than those maintained by Infor for its own information of a similar nature; (ii) no less rigorous than generally accepted industry standards; and (iii) required by applicable laws. The security procedures and safeguards implemented and maintained by Infor pursuant to this Section 6(b) shall include, without limitation: (i) User identification and access controls designed to limit access to Licensee’s Data to authorized users; (ii) the use of appropriate procedures and technical controls regulating data entering Infor’s network from any external source; (iii) the use of encryption techniques when Licensee’s Data is transmitted or transferred into or out of the hosted environment; (iv) physical security measures, including without limitation securing Licensee’s Data within a secure facility where only authorized personnel and agents will have physical access to Licensee Data; (v) operational measures, including without limitation IT Service Management (ITSM) processes designed to ensure the correct and secure operations of information processing activities;

Appears in 2 contracts

Sources: Subscription License and Services Agreement, Subscription License and Services Agreement

Security Policies and Safeguards. Infor shall establish and maintain administrative, technical, and physical safeguards designed to protect against the destruction, loss, unauthorized access or alteration of Licensee Data and Personal Information in the possession or under the control of Infor or to which Infor has access, which are: (i) no less rigorous than those maintained by Infor for its own information of a similar nature; (ii) no less rigorous than generally accepted industry standards; and (iii) required by applicable laws. The security procedures and safeguards implemented and maintained by Infor pursuant to this Section 6(b) shall include, without limitation: (i) User identification and access controls designed to limit access to Licensee’s Data to authorized users; (ii) the use of appropriate procedures and technical controls regulating data entering Infor’s network from any external source; (iii) the use of encryption techniques when Licensee’s Data is transmitted or transferred into or out of the hosted environment; (iv) physical security measures, including without limitation securing Licensee’s Data within a secure facility within the United States where only authorized personnel and agents will have physical access to Licensee Data; (v) operational measures, including without limitation IT Service Management (ITSM) processes designed to ensure the correct and secure operations of information processing activities;

Appears in 1 contract

Sources: Professional Services