Buyer Data for all Defaults by the Supplier resulting in direct loss, destruction, corruption, degradation or damage to any Buyer Data, will not exceed the amount in the Order Form
Buyer Data. 15.1 The Supplier will not remove any proprietary notices relating to the Buyer Data.
15.2 The Supplier will not store or use Buyer Data except where necessary to fulfill its obligations.
15.3 If Buyer Data is processed by the Supplier, the Supplier will supply the data to the Buyer as requested and in the format specified by the Buyer.
15.4 The Supplier will preserve the integrity of Buyer Data processed by the Supplier and prevent its corruption and loss.
15.5 The Supplier will ensure that any system which holds any Buyer Data complies with the security requirements prescribed by the Buyer.
15.6 The Supplier will ensure that any system on which the Supplier holds any protectively marked Buyer Data will be accredited as specific to the Buyer and will comply with: the government security policy framework and information assurance policy; guidance issued by the Centre for Protection of National Infrastructure on Risk Management and Accreditation of Information Systems; and the relevant government information assurance standard(s).
15.7 Where the duration of this Call-Off Contract exceeds one year, the Supplier will review the accreditation status at least once a year to assess whether material changes have occurred which could alter the original accreditation decision in relation to Buyer Data. If any changes have occurred then the Supplier will re-submit such system for accreditation.
15.8 If at any time the Supplier suspects that the Buyer Data has or may become corrupted, lost, breached or significantly degraded in any way for any reason, then the Supplier will notify the Buyer immediately and will (at its own cost where such corruption, loss, breach or degradation of the Buyer Data was caused by the action or omission of the Supplier or its representatives) comply with any remedial action proposed by the Buyer.
15.9 The Supplier will provide at the request of CCS or the Buyer, any information relating to the Supplier’s compliance with its obligations under the Data Protection Act (to the extent arising under and/or in connection with the Framework Agreement and this Call-Off Contract). The Supplier will also ensure that it does not knowingly or negligently fail to do something that places CCS or any Buyer in breach of its obligations of the Data Protection Act. This is an absolute obligation and is not qualified by any other provision of this Call-Off Contract.
15.10 The Supplier agrees to use the appropriate organisational, operational and technologica...
Buyer Data. The Supplier must not remove any proprietary notices in the Buyer Data. The Supplier will not store or use Buyer Data except if necessary to fulfil its obligations. If Buyer Data is processed by the Supplier, the Supplier will supply the data to the Buyer as requested. The Supplier must ensure that any Supplier system that holds any Buyer Data is a secure system that complies with the Supplier’s and Buyer’s security policy and all Buyer requirements in the Order Form. The Supplier will preserve the integrity of Buyer Data processed by the Supplier and prevent its corruption and loss. The Supplier will ensure that any Supplier system which holds any protectively marked Buyer Data or other government data will comply with: the principles in the Security Policy Framework at xxxxx://xxx.xxx.xx/government/publications/security-policy-framework and the Government Security Classification policy at xxxxx://xxx.xxx.xx/government/publications/government-security-classifications guidance issued by the Centre for Protection of National Infrastructure on Risk Management at xxxxx://xxx.xxxx.xxx.xx/content/adopt-risk-management-approach and Accreditation of Information Systems at xxxxx://xxx.xxxx.xxx.xx/protection-sensitive-information-and-assets the National Cyber Security Centre’s (NCSC) information risk management guidance, available at xxxxx://xxx.xxxx.xxx.xx/guidance/risk-management-collection government best practice in the design and implementation of system components, including network principles, security design principles for digital services and the secure email blueprint, available at xxxxx://xxx.xxx.xx/government/publications/technology-code-of-practice/technology-code-of-practice the security requirements of cloud services using the NCSC Cloud Security Principles and accompanying guidance at xxxxx://xxx.xxxx.xxx.xx/guidance/implementing-cloud-security-principles The Buyer will specify any security requirements for this project in the Order Form. If the Supplier suspects that the Buyer Data has or may become corrupted, lost, breached or significantly degraded in any way for any reason, then the Supplier will notify the Buyer immediately and will (at its own cost if corruption, loss, breach or degradation of the Buyer Data was caused by the action or omission of the Supplier) comply with any remedial action reasonably proposed by the Buyer. The Supplier agrees to use the appropriate organisational, operational and technological processes to keep the Buyer Da...
Buyer Data. All Intellectual Property Rights vesting in either Party prior to the date of this Agreement shall remain vested in such Party notwithstanding any other provision of this Agreement.
Buyer Data. 9.1 Supplier shall, and shall procure that Supplier’s sub-contractors shall, comply with the European Union Data Protection Directive, the Telecoms Data Protection Directive 1997 and the Data Protection Act 1998 (the "Legislation") in relation to any personal data (as defined in the Legislation) relating to or originating from the Buyer or its employees to which Supplier and its sub-contractors gain access for the purposes of or pursuant to the arrangements contemplated by this Agreement.
9.2 Supplier undertakes that except where otherwise agreed by the Parties in writing:
9.2.1 neither Supplier nor any of its sub-contractors shall process, or direct the processing of any personal data relating to or originating from Buyer or its employees other than in the UK;
9.2.2 Supplier and its sub-contractors each have in place now and shall on a continuing basis take all reasonable technical and organisational measures to keep all personal data relating to or originating from Buyer or its employees secure and to protect the personal data against accidental loss or unlawful destruction, alteration, disclosure or access; and
9.2.3 except to the extent otherwise required by law, Supplier and its sub-contractors shall each act in relation to personal data relating to or originating from the Buyer or its employees only in accordance with Buyer's instructions except to the extent that Supplier can show that the instructions are not in accordance with the Legislation.
9.3 Supplier acknowledges and agrees that Buyer Data is the exclusive property of the Buyer and that:
9.3.1 all Intellectual Property Rights in Buyer Data is and shall remain owned by the Buyer notwithstanding any Modifications created or developed to or in respect of Buyer Data by or on behalf of Supplier or its sub-contractors; and
9.3.2 neither Supplier nor any of its sub-contractors shall delete or remove any copyright notices contained within or relating to any Buyer Data.
9.4 Supplier shall not have any right to nor shall it permit the:
9.4.1 use of Buyer Data by Supplier or any sub-contractor otherwise than for the benefit of the Buyer and in accordance with this Agreement; or
9.4.2 disclosure of any Buyer Data except to Supplier’s employees or permitted sub-contractors of Supplier on a need to know basis directly concerned with the performance of its obligations and Supplier shall maintain and make available to Buyer on reasonable notice a log identifying such Supplier’s employees and the extent of t...
Buyer Data. 13.1 The Supplier must not remove any proprietary notices in the Buyer Data.
13.2 The Supplier will not store or use Buyer Data except if necessary to fulfil its obligations.
13.3 If Buyer Data is processed by the Supplier, the Supplier will supply the data to the Buyer as requested.
13.4 The Supplier must ensure that any Supplier system that holds any Buyer Data is a secure system that complies with the Supplier’s and Buyer’s security policies and all Buyer requirements in the Order Form.
13.5 The Supplier will preserve the integrity of Buyer Data processed by the Supplier and prevent its corruption and loss.
13.6 The Supplier will ensure that any Supplier system which holds any protectively marked Buyer Data or other government data will comply with: 13.6.1 the principles in the Security Policy Framework: xxxxx://xxx.xxx.xx/government/publications/security-policy-framework and the Government Security Classification policy:
Buyer Data. Any software, database, data file, record or other information owned, licensed, leased or provided by Buyer or any of its Affiliates that is provided to, or stored or accessed by, Seller or any of its Affiliates in connection with any Service, each as modified, maintained or enhanced from time to time by Buyer, any of its Affiliates or any relevant third party (collectively, the “Buyer Data”) shall remain the sole and exclusive property of Buyer or its Affiliates, as the case may be. In furtherance of the foregoing, under no circumstances will Seller or any of its Affiliates obtain, pursuant to this Agreement, any ownership right or license in or to (a) any Intellectual Property of Buyer or its Affiliates or (b) any of the Buyer Data
Buyer Data. 13.1 The Supplier must not remove any proprietary notices in the Buyer Data.
13.2 The Supplier will not store or use Buyer Data except if necessary to fulfil its obligations.
13.3 If Buyer Data is processed by the Supplier, the Supplier will supply the data to the Buyer as requested.
13.4 The Supplier must ensure that any Supplier system that holds any Buyer Data is a secure system that complies with the Supplier’s and Buyer’s security policies and all Buyer requirements in the Order Form.
13.5 The Supplier will preserve the integrity of Buyer Data processed by the Supplier and prevent its corruption and loss.
13.6 The Supplier will ensure that any Supplier system which holds any protectively marked Buyer Data or other government data will comply with:
13.6.1 the principles in the Security Policy Framework: xxxxx://xxx.xxx.xx/government/publications/security-policy-framework and the Government Security - Classification policy: https:/xxx.xxx.xx/xxxxxxxxxx/xxxxxxxxxxxx/xxxxxxxxxx-xxxxxxxx-xxxxxxxxxxxxxxx 13.6.2 guidance issued by the Centre for Protection of National Infrastructure on Risk Management: xxxxx://xxx.xxxx.xxx.xx/content/adopt-risk-management- approach and Protection of Sensitive Information and Assets: xxxxx://xxx.xxxx.xxx.xx/sensitive-information-assets
Buyer Data. 16.1 Subject to sub-Clause 16.2, all Intellectual Property Rights subsisting in Buyer Data are and shall remain the property of the Buyer.
16.2 Certain Buyer Data may belong to third parties. In such cases, the Buyer warrants that all such Buyer Data is used with the consent of relevant third parties.
16.3 The Buyer grants the Supplier a non-exclusive, royalty-free licence to use the Buyer Data during the term for the purpose of performing the Service. The Buyer warrants and represents that the Supplier’s use of the Buyer Data for the purpose of performing the Service will not infringe the rights of any third party.
16.4 Unless expressly agreed otherwise by the parties in writing, the Buyer warrants that no Personal Data exists within the Buyer Data.
16.5 The Supplier shall follow its standard archiving procedures for Buyer Data. In the event of any loss or damage to Buyer Data, the Buyer’s sole and exclusive remedy against the Supplier shall be for the Supplier to use reasonable commercial endeavours to restore the lost or damaged Buyer Data from the latest back-up of such Buyer Data maintained by the Supplier. The Supplier shall not be responsible for any loss, destruction, alteration or disclosure of Buyer Data caused by any third party (except those third parties sub-contracted by the Supplier to perform services related to Buyer Data maintenance and back-up for which it shall remain fully liable subject to these terms).
16.6 The Buyer shall indemnify the Supplier for any claims, costs, damages and expenses (including reasonable legal expenses) incurred by the Supplier as a result of the Buyer’s breach of this clause 16.
Buyer Data. 5.1 The Buyer shall own all right, title and interest in and to all of the Buyer Data and shall have sole responsibility for the legality, reliability, integrity, accuracy and quality of the Buyer Data.
5.2 In the event of any loss or damage to Buyer Data, the Buyer's sole and exclusive remedy shall be for the Supplier to use reasonable endeavours to restore the lost or damaged Buyer Data from the latest back-up of such Buyer Data maintained by the Supplier. The Supplier shall not be responsible for any loss, destruction, alteration or disclosure of Buyer Data caused by any third party (except those third parties sub- contracted by the Supplier to perform services related to Buyer Data maintenance and back-up).