Appropriate Security Safeguards Sample Clauses

Appropriate Security Safeguards. Provider shall process the Dell Data in a manner that ensures appropriate security of the Dell Data (including protection against unauthorized or unlawful processing and against accidental loss, destruction or damage) using appropriate technical and/or organisational measures which ensure a level of security commensurate to the risk, including as appropriate: (a) the encryption of the Dell Data, (b) the ability to ensure the ongoing confidentiality, integrity, availability and resilience of processing systems and services, (c) the ability to restore the availability and access to the Dell Data in a timely manner in the event of a physical or technical incident, and (d) a process for regularly testing, assessing and evaluating the effectiveness of technical and organisational measures for ensuring the security of the processing of Dell Data. In assessing the appropriate level of security, Provider shall take account in particular of the risks that may be presented by the processing of the Dell Data, in particular from a Data Breach. Provider agrees to have in place and maintain as a minimum those information security measures set out in this DPA. As part of its compliance with this clause, Provider shall have and maintain appropriate and industry-standard physical, organizational and technical processes, security standards, guidelines, controls and procedures (“Policies”) to protect against any Data Breach (“Appropriate Safeguards”). Provider shall regularly, but in no event less than annually, evaluate, test and monitor the effectiveness of its Appropriate Safeguards and shall promptly adjust and update Appropriate Safeguards as reasonably warranted by such results. Provider shall, upon request, provide Dell with a written description of the Appropriate Safeguards. Provider shall provide Dell with access to relevant documentation and reporting on the implementation, certification, effectiveness and remediation of the Appropriate Safeguards. Provider represents, warrants and covenants that Provider and its Subcontractors do and shall implement and maintain Policies which:
AutoNDA by SimpleDocs
Appropriate Security Safeguards. Xxxxxxxxx xxxx implement and maintain appropriate technical, administrative, physical and organizational measures (in accordance with Appendix 1) to adequately safeguard and protect the security and confidentiality of Personal Information against accidental, unauthorized or unlawful destruction, alteration, modification, processing, disclosure, loss, or access. Whimsical may update such measures during the term of the Agreement but will not materially decrease the overall security of the Services (or any part thereof) during the term.

Related to Appropriate Security Safeguards

  • Appropriate Safeguards BA shall implement appropriate safeguards to prevent the use or disclosure of Protected Information other than as permitted by the Contract or Addendum, including, but not limited to, administrative, physical and technical safeguards in accordance with the Security Rule, including, but not limited to, 45 C.F.R. Sections 164.308, 164.310, and 164.312. [45 C.F.R. Section 164.504(e)(2)(ii)(B); 45 C.F.R. Section 164.308(b)]. BA shall comply with the policies and procedures and documentation requirements of the Security rule, including, but not limited to, 45 C.F.R. Section 164.316 [42 U.S.C. Section 17931].

  • Security Safeguards (1) Each party acknowledges that it is solely responsible for determining and communicating to the other the appropriate technological, physical, and organizational security measures required to protect Personal Data.

  • Physical Safeguards USAC and the Department agree to maintain all automated matching records in a secured computer environment that includes the use of authorized access codes to restrict access. Those records will be maintained under conditions that restrict access to persons who need them for official duties related to the matching process. The user’s supervisor will ensure that USAC or the Department are notified when a user has departed or duties have changed so the user no longer needs access to the system, to ensure timely deletion of the user’s account and password.

  • System Security and Data Safeguards When SAP is given access to Licensee’s systems and data, SAP shall comply with Licensee’s reasonable administrative, technical, and physical safeguards to protect such data and guard against unauthorized access. In connection with such access, Licensee shall be responsible for providing Consultants with user authorizations and passwords to access its systems and revoking such authorizations and terminating such access, as Licensee deems appropriate from time to time. Licensee shall not grant SAP access to Licensee systems or personal information (of Licensee or any third party) unless such access is essential for the performance of Services under the Agreement. The parties agree that no breach of this provision shall be deemed to have occurred in the event of SAP non-conformance with the aforementioned safeguard but where no personal information has been compromised.

  • Information Safeguards Business Associate will develop, document, implement, maintain and use appropriate administrative, technical and physical safeguards to preserve the integrity and confidentiality of and to prevent non-permitted use or disclosure of PHI created for or received from Recipient or its Subsidiaries. These safeguards must be appropriate to the size and complexity of Business Associate’s operations and the nature and scope of its activities. Business Associate agrees that these safeguards will meet any applicable requirements set forth by the U.S. Department of Health and Human Services, including (as of the effective date or as of the compliance date, whichever is applicable) any requirements set forth in the final HIPAA security regulations. Business Associate agrees to mitigate, to the extent practicable, any harmful effect that is known to Business Associate resulting from a use or disclosure of PHI by Business Associate in violation of the requirements of this Addendum.

  • Safeguards Business Associate, its Agent(s) and Subcontractor(s) shall implement and use appropriate safeguards to prevent the use or disclosure of PHI other than as provided for by this Agreement. With respect to any PHI that is maintained in or transmitted by electronic media, Business Associate or its Subcontractor(s) shall comply with 45 CFR sections 164.308 (administrative safeguards), 164.310 (physical safeguards), 164.312 (technical safeguards) and 164.316 (policies and procedures and documentation requirements). Business Associate or its Agent(s) and Subcontractor(s) shall identify in writing upon request from Covered Entity all of the safeguards that it uses to prevent impermissible uses or disclosures of PHI.

  • Technical Safeguards 1. USAC and the Department will process the data matched and any data created by the match under the immediate supervision and control of authorized personnel to protect the confidentiality of the data, so unauthorized persons cannot retrieve any data by computer, remote terminal, or other means.

  • Appropriate Use It will use its Project property for appropriate purposes (including joint development purposes as well as uses that provide program income to support public transportation) for the duration of the useful life of its Project property, which may extend beyond the duration of the Award, and consistent with other requirements FTA may impose.

  • Contractor and Employee Security Precautions A. The security aspects of working at the Correctional Facility are critical. The following security precautions are part of the site conditions and are a part of this Contract. All persons coming on the site in any way connected with this Work shall be made aware of them, and it is the (General) Contractor’s responsibility to check and enforce them.

  • Data Security Requirements A. Data Transport. When transporting Confidential Information electronically, including via email, the data will be protected by:

Time is Money Join Law Insider Premium to draft better contracts faster.