Information Security Agreement (ISA)

ISA is used to document the technical security requirements needed to protect the exchange sensitive data between two systems under the administrative control of two separate entities. The ISA documents and formalizes the interconnection arrangements between "Organization A" and "Organization B". The ISA is used to specify any details that may be required to provide overall security safeguards for the systems being interconnected. A system that is approved by an ISA for interconnection with one organization's system should meet the protection requirements equal to, or greater than, those implemented by the other organization's system.

Previous <  |  > Next
H < | > J
Enter your search query for glossary: