Information Security Program Requirements definition
Examples of Information Security Program Requirements in a sentence
Agent agrees that it will implement all appropriate safeguards, including at least the minimum provisions set forth in Company’s Vendor Information Security Program Requirements Document, the terms of which are incorporated into this Business Associate Agreement by reference to prevent the access, use or disclosure of PHI other than pursuant to the terms and conditions of this Addendum.
During the Term and thereafter for as long as RN retains Upromise Customer Information, Upromise, its representatives and agents will be entitled to conduct audits of RN’s relevant operations, facilities, systems, to confirm that RN has complied with the Upromise Security Requirements and the Information Security Program Requirements (the “Security Audits”).
During the Term and thereafter for as long as Receiving Party retains Disclosing Party Confidential Information, Disclosing Party, its representatives and agents will be entitled to conduct audits of Receiving Party’s relevant operations, facilities, and systems to confirm that Receiving Party has complied with the Disclosing Party Security Requirements and the Information Security Program Requirements (each, a “Security Audit”).
During the Term and thereafter for as long as Feinberg Rozen retains Claimant information or other personal information, BP and its representatives and agents shall be entitled to conduct audits of ▇▇▇▇▇▇▇▇ Rozen’s and its Subcontractors’ relevant operations, facilities, and systems to confirm that ▇▇▇▇▇▇▇▇ Rozen and its Subcontractors have complied with the Security Requirements and the Information Security Program Requirements (the “Security Audits”).