Ability to restore the provision and access of personal data in a timely manner in the event Sample Clauses

Ability to restore the provision and access of personal data in a timely manner in the event. The following measures should be implemented to enable timely recovery of the provision and access of personal data in the event of physical or technical events: Multi-group RAID group mode, which has spare disks in the group Backup of RAID group. Other.
AutoNDA by SimpleDocs

Related to Ability to restore the provision and access of personal data in a timely manner in the event

  • Notification of personal data breach 1. In case of any personal data breach, the data processor shall, without undue delay after having become aware of it, notify the data controller of the personal data breach.

  • Obligation after the termination of personal data processing services

  • Certification of Funds; Budget and Fiscal Provisions; Termination in the Event of Non-Appropriation This Agreement is subject to the budget and fiscal provisions of the City’s Charter. Charges will accrue only after prior written authorization certified by the Controller, and the amount of City’s obligation hereunder shall not at any time exceed the amount certified for the purpose and period stated in such advance authorization. This Agreement will terminate without penalty, liability or expense of any kind to City at the end of any fiscal year if funds are not appropriated for the next succeeding fiscal year. If funds are appropriated for a portion of the fiscal year, this Agreement will terminate, without penalty, liability or expense of any kind at the end of the term for which funds are appropriated. City has no obligation to make appropriations for this Agreement in lieu of appropriations for new or other agreements. City budget decisions are subject to the discretion of the Mayor and the Board of Supervisors. Contractor’s assumption of risk of possible non-appropriation is part of the consideration for this Agreement. THIS SECTION CONTROLS AGAINST ANY AND ALL OTHER PROVISIONS OF THIS AGREEMENT.

  • Personal Data Breach Notification SAP will notify Customer without undue delay after becoming aware of any Personal Data Breach and provide reasonable information in its possession to assist Customer to meet Customer’s obligations to report a Personal Data Breach as required under Data Protection Law. SAP may provide such information in phases as it becomes available. Such notification shall not be interpreted or construed as an admission of fault or liability by SAP.

  • Handling Sensitive Personal Information and Breach Notification A. As part of its contract with HHSC Contractor may receive or create sensitive personal information, as section 521.002 of the Business and Commerce Code defines that phrase. Contractor must use appropriate safeguards to protect this sensitive personal information. These safeguards must include maintaining the sensitive personal information in a form that is unusable, unreadable, or indecipherable to unauthorized persons. Contractor may consult the “Guidance to Render Unsecured Protected Health Information Unusable, Unreadable, or Indecipherable to Unauthorized Individuals” issued by the U.S. Department of Health and Human Services to determine ways to meet this standard.

  • Early Termination in the Public Interest The State is entering into this Contract to serve the public interest of the State of Colorado as determined by its Governor, General Assembly, or Courts. If this Contract ceases to further the public interest of the State, the State, in its discretion, may terminate this Contract in whole or in part. This subsection shall not apply to a termination of this Contract by the State for breach by Contractor, which shall be governed by §15.A.i.

  • Collection of Personal Information 10.1 The Subscriber acknowledges and consents to the fact that the Company is collecting the Subscriber's personal information for the purpose of fulfilling this Subscription Agreement and completing the Offering. The Subscriber's personal information (and, if applicable, the personal information of those on whose behalf the Subscriber is contracting hereunder) may be disclosed by the Company to (a) stock exchanges or securities regulatory authorities, (b) the Company's registrar and transfer agent, (c) Canadian tax authorities, (d) authorities pursuant to the Proceeds of Crime (Money Laundering) and Terrorist Financing Act (Canada) and (e) any of the other parties involved in the Offering, including legal counsel, and may be included in record books in connection with the Offering. By executing this Subscription Agreement, the Subscriber is deemed to be consenting to the foregoing collection, use and disclosure of the Subscriber's personal information (and, if applicable, the personal information of those on whose behalf the Subscriber is contracting hereunder) and to the retention of such personal information for as long as permitted or required by law or business practice. Notwithstanding that the Subscriber may be purchasing Shares as agent on behalf of an undisclosed principal, the Subscriber agrees to provide, on request, particulars as to the identity of such undisclosed principal as may be required by the Company in order to comply with the foregoing.

  • Termination of Use These terms and Your access to Our Website may be terminated by Us (at Our sole discretion) at any time without notice or any requirement to give You a reason why. In the event of termination under this clause We shall have no liability to You whatsoever (including for any consequential or direct loss You may suffer).

  • Customer’s Processing of Personal Data Customer shall, in its use of the Services, Process Personal Data in accordance with the requirements of Data Protection Laws and Regulations. For the avoidance of doubt, Customer’s instructions for the Processing of Personal Data shall comply with Data Protection Laws and Regulations. Customer shall have sole responsibility for the means by which Customer acquired Personal Data.

  • Termination and Data Destruction Upon Project Close-out, the Requester and Approved Users agree to destroy all copies, versions, and Data Derivatives of the dataset(s) retrieved from NIH-designated controlled-access databases, on both local servers and hardware, and if cloud computing was used, delete the data and cloud images from cloud computing provider storage, virtual and physical machines, databases, and random access archives, in accord with the NIH Security Best Practices for Controlled-Access Data Subject to the NIH Genomic Data Sharing (GDS) Policy. However, the Requester may retain these data as necessary to comply with any institutional policies (e.g., scientific data retention policy), law, and scientific transparency expectations for disseminated research results, and/or journal policies. A Requester who retains data for any of these purposes continues to be a xxxxxxx of the data and is responsible for the management of the retained data in accordance with the NIH Security Best Practices for ControlledAccess Data Subject to the NIH Genomic Data Sharing (GDS) Policy, and any institutional policies. Any retained data may only be used by the PI and Requester to support the findings (e.g., validation) resulting from the research described in the DAR that was submitted by the Requester and approved by NIH. The data may not be used to answer any additional research questions, even if they are within the scope of the approved Data Access Request, unless the Requester submits a new DAR and is approved by NIH to conduct the additional research. If a Requester retains data for any of these purposes, the relevant portions of Terms 4, 5, 6, 7, 8, and 12 remain in effect after termination of this Data Use Certification Agreement. These terms remain in effect until the data is destroyed.

Time is Money Join Law Insider Premium to draft better contracts faster.