Basic Information Security Sample Clauses

Basic Information Security. Should your personal information be stolen, disclosed, altered or infringed upon due to the violation of the Personal Data Protection Act by NCKU Library, the occurrence of any natural disasters, incidental changes or other unavoidable circumstances, NCKU Library shall inspect the cause and inform you by phone, mail, email or website notice.
AutoNDA by SimpleDocs
Basic Information Security. If your personal information have be stolen, disclosed, altered or infringed upon due to the violation of the Personal Data Protection Act by NCHU, or the occurrence of any natural disasters, incidental changes or other unavoidable circumstances, NCHU shall inspect the cause and inform you by phone, mail, e-mail or website notice.
Basic Information Security. If your personal information have be stolen, disclosed, altered or infringed upon due to the violation of the Personal Data Protection Act by NCHU, or the occurrence of any natural disasters, incidental changes or other unavoidable circumstances, NCHU shall inspect the cause and inform you by phone, mail, e-mail or website notice. Validity of Agreement Your signature on this agreement indicates that you have read, understood and accepted its contents. NCHU is entitled to amend the contents of this agreement, and any amendments will be publicized on the NCHU website. Should you disagree with any amendments, please exercise your right to request that NCHU discontinue to collect, process or use your personal data according to Item VI of Article I. Otherwise, you are considered to have agreed to the amendment.
Basic Information Security. Should your personal information be stolen, disclosed, altered or infringed upon due to the violation of the Personal Data Protection Act by NCKU Library, the occurrence of any natural disasters, incidental changes or other unavoidable circumstances, NCKU Library shall inspect the cause and inform you by phone, mail, email or website notice. Validity of Agreement Your signature on this agreement indicates that you have read, understood and accepted its contents. NCKU Library is entitled to amend the contents of this agreement, and any amendments will be publicized on the NCKU Library website. Should you disagree with any amendments, please exercise your right to request that NCKU Library discontinue to collect, process or use your personal data according to Item VI of Article I. Otherwise, you are considered to have agreed to the amendment.
Basic Information Security. Should your personal information be stolen, disclosed, altered or infringed upon due to the violation of the Personal Data Protection Act by NCUOIA the occurrence of any natural disasters, incidental changes or other unavoidable circumstances, NCUOIA shall inspect the cause and inform you by phone, mail, email or website notice. 四、 同意書之效力
Basic Information Security. Your personal information will be protected by and under NCHU's Privacy Policy. If NCHU violates the Personal Data Protection Act or your personal data is stolen, divulged, modified, or damaged owing to any natural disasters, extraordinary event or circumstance beyond its control, NCHU shall inspect the cause and inform you by phone, mail, e-mail or website notice.

Related to Basic Information Security

  • Information Security IET information security management practices, policies and regulatory compliance requirements are aimed at assuring the confidentiality, integrity and availability of Customer information. The UC Xxxxx Cyber-safety Policy, UC Xxxxx Security Standards Policy (PPM Section 310-22), is adopted by the campus and IET to define the responsibilities and key practices for assuring the security of UC Xxxxx computing systems and electronic data.

  • Information Security Requirements In cases where the State is not permitted to manage/modify the automation equipment (server/computer/other) that controls testing or monitoring devices, the Contractor agrees to update and provide patches for the automation equipment and any installed operating systems or applications on a quarterly basis (at minimum). The Contractor will submit a report to the State of updates installed within 30 days of the installation as well as a Plan of Actions and Milestones (POA&M) to remediate any vulnerabilities ranging from Critical to Low. The contractor will provide an upgrade path or compensatory security controls for any operating systems and applications listed as beyond “end-of-life” or EOL, within 90 days of the EOL and complete the EOL system’s upgrade within 90 days of the approved plan.

  • - CLEC INFORMATION CLEC agrees to work with Qwest in good faith to promptly complete or update, as applicable, Qwest’s “New Customer Questionnaire” to the extent that CLEC has not already done so, and CLEC shall hold Qwest harmless for any damages to or claims from CLEC caused by CLEC’s failure to promptly complete or update the questionnaire.

  • Personal Information security breach Supplier/Service Provider’s Obligations

  • Public Information The State will comply with Government Code, Chapter 552, the Public Information Act, and 43 Texas Administrative Code §3.10 et seq. in the release of information produced under this contract.

  • Information Security Program (1) DTI shall implement and maintain a comprehensive written information security program applicable to the Personal Information ("Information Security Program") which shall include commercially reasonable measures, including, as appropriate, policies and procedures and technical, physical, and administrative safeguards that are consistent with industry standards, providing for (i) the security and confidentiality of the Personal Information, (ii) protection of the Personal Information against reasonably foreseeable threats or hazards to the security or integrity of the Personal Information, (iii) protection against unauthorized access to or use of or loss or theft of the Personal Information, and (iv) appropriate disposal of the Personal Information. Without limiting the generality of the foregoing, the Information Security Program shall provide for (i) continual assessment and re-assessment of the risks to the security of Personal Information acquired or maintained by DTI and its agents, contractors and subcontractors in connection with the Services, including but not limited to (A) identification of internal and external threats that could result in unauthorized disclosure, alteration or destruction of Personal Information and systems used by DTI and its agents, contractors and subcontractors, (B) assessment of the likelihood and potential damage of such threats, taking into account the sensitivity of such Personal Information, and (C) assessment of the sufficiency of policies, procedures, information systems of DTI and its agents, contractors and subcontractors, and other arrangements in place, to control risks; and (ii) appropriate protection against such risks.

  • Public Information Act Contractor understands that HHS will comply with the Texas Public Information Act (Chapter 552 of the Texas Government Code) as interpreted by judicial rulings and opinions of the Attorney General of the State of Texas. Information, documentation, and other material prepared and submitted in connection with this Contract or any related Solicitation may be subject to public disclosure pursuant to the Texas Public Information Act. In accordance with Section 2252.907 of the Texas Government Code, Contractor is required to make any information created or exchanged with the State pursuant to the Contract, and not otherwise excepted from disclosure under the Texas Public Information Act, available in a format that is accessible by the public at no additional charge to the State.

  • Non-Public Information Except with respect to the material terms and conditions of the transactions contemplated by the Transaction Documents, the Company covenants and agrees that neither it, nor any other Person acting on its behalf, will provide any Purchaser or its agents or counsel with any information that the Company believes constitutes material non-public information, unless prior thereto such Purchaser shall have entered into a written agreement with the Company regarding the confidentiality and use of such information. The Company understands and confirms that each Purchaser shall be relying on the foregoing covenant in effecting transactions in securities of the Company.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!