Buyer Data. 13.1 The Supplier must not remove any proprietary notices in the Buyer Data. 13.2 The Supplier will not store or use Buyer Data except if necessary to fulfil its obligations. 13.3 If Buyer Data is processed by the Supplier, the Supplier will supply the data to the Buyer as requested. 13.4 The Supplier must ensure that any Supplier system that holds any Buyer Data is a secure system that complies with the Supplier’s and Buyer’s security policies and all Buyer requirements in the Order Form. 13.5 The Supplier will preserve the integrity of Buyer Data processed by the Supplier and prevent its corruption and loss. 13.6 The Supplier will ensure that any Supplier system which holds any protectively marked Buyer Data or other government data will comply with: 13.6.1 the principles in the Security Policy Framework: ▇▇▇▇▇://▇▇▇.▇▇▇.▇▇/government/publications/security-policy-framework and the Government Security Classification policy:
Appears in 10 contracts
Sources: Call Off Contract, Call Off Contract, G Cloud Call Off Contract
Buyer Data. 13.1 The Supplier must not remove any proprietary notices in the Buyer Data.
13.2 The Supplier will not store or use Buyer Data except if necessary to fulfil its obligations.
13.3 If Buyer Data is processed by the Supplier, the Supplier will supply the data to the Buyer as requested.
13.4 The Supplier must ensure that any Supplier system that holds any Buyer Data is a secure system that complies with the Supplier’s and Buyer’s security policies and all Buyer requirements in the Order Form.
13.5 The Supplier will preserve the integrity of Buyer Data processed by the Supplier and prevent its corruption and loss.
13.6 The Supplier will ensure that any Supplier system which holds any protectively marked Buyer Data or other government data will comply with: :
13.6.1 the principles in the Security Policy Framework: ▇▇▇▇▇://▇▇▇.▇▇▇.▇▇/government/publications/security-policy-framework and the Government Security - Classification policy: https:/▇▇▇.▇▇▇.▇▇/▇▇▇▇▇▇▇▇▇▇/▇▇▇▇▇▇▇▇▇▇▇▇/▇▇▇▇▇▇▇▇▇▇-▇▇▇▇▇▇▇▇-▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇ 13.6.2 guidance issued by the Centre for Protection of National Infrastructure on Risk Management: ▇▇▇▇▇://▇▇▇.▇▇▇▇.▇▇▇.▇▇/content/adopt-risk-management- approach and Protection of Sensitive Information and Assets: ▇▇▇▇▇://▇▇▇.▇▇▇▇.▇▇▇.▇▇/sensitive-information-assets
Appears in 5 contracts
Sources: Call Off Contract, Call Off Contract, G Cloud 13 Call Off Contract
Buyer Data. 13.1 The Supplier must not remove any proprietary notices in the Buyer Data.
13.2 The Supplier will not store or use Buyer Data except if necessary to fulfil its obligations.
13.3 If Buyer Data is processed by the Supplier, the Supplier will supply the data to the Buyer as requested.
13.4 The Supplier must ensure that any Supplier system that holds any Buyer Data is a secure system that complies with the Supplier’s and Buyer’s security policies and all Buyer requirements in the Order Form.
13.5 The Supplier will preserve the integrity of Buyer Data processed by the Supplier and prevent its corruption and loss.
13.6 The Supplier will ensure that any Supplier system which holds any protectively marked Buyer Data or other government data will comply with: 13.6.1 the principles in the Security Policy Framework: ▇▇▇▇▇://▇▇▇.▇▇▇.▇▇/government/publications/security-policy-framework and the Government Security - Classification policy: https:/▇▇▇.▇▇▇.▇▇/▇▇▇▇▇▇▇▇▇▇/▇▇▇▇▇▇▇▇▇▇▇▇/▇▇▇▇▇▇▇▇▇▇-▇▇▇▇▇▇▇▇-▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇ 13.6.2 guidance issued by the Centre for Protection of National Infrastructure on Risk Management: ▇▇▇▇▇://▇▇▇.▇▇▇▇.▇▇▇.▇▇/content/adopt-riskmanagement- approach and Protection of Sensitive Information and Assets: ▇▇▇▇▇://▇▇▇.▇▇▇▇.▇▇▇.▇▇/sensitive-information-assets
Appears in 4 contracts
Sources: Call Off Contract, G Cloud 14 Call Off Contract, Call Off Contract
Buyer Data. 13.1 The Supplier must not remove any proprietary notices in the Buyer Data.
13.2 The Supplier will not store or use Buyer Data except if necessary to fulfil its obligations.
13.3 If Buyer Data is processed by the Supplier, the Supplier will supply the data to the Buyer as requested.
13.4 The Supplier must ensure that any Supplier system that holds any Buyer Data is a secure system that complies with the Supplier’s and Buyer’s security policies and all Buyer requirements in the Order Form.
13.5 The Supplier will preserve the integrity of Buyer Data processed by the Supplier and prevent its corruption and loss.
13.6 The Supplier will ensure that any Supplier system which holds any protectively marked Buyer Data or other government data will comply with: :
13.6.1 the principles in the Security Policy Framework: ▇▇▇▇▇://▇▇▇.▇▇▇.▇▇/government/publications/security-policy-framework and the Government Security Classification policy: https:/▇▇▇.▇▇▇.▇▇/▇▇▇▇▇▇▇▇▇▇/▇▇▇▇▇▇▇▇▇▇▇▇/▇▇▇▇▇▇▇▇▇▇-▇▇▇▇▇▇▇▇-▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇ 13.6.2 guidance issued by the Centre for Protection of National Infrastructure on Risk Management: ▇▇▇▇▇://▇▇▇.▇▇▇▇.▇▇▇.▇▇/content/adopt-risk-management- approach and Protection of Sensitive Information and Assets: ▇▇▇▇▇://▇▇▇.▇▇▇▇.▇▇▇.▇▇/protection-sensitive-information-and-assets
Appears in 1 contract
Sources: Call Off Contract
Buyer Data. 13.1 The Supplier must not remove any proprietary notices in the Buyer Data.
13.2 The Supplier will not store or use Buyer Data except if necessary to fulfil its obligations.
13.3 If Buyer Data is processed by the Supplier, the Supplier will supply the data to the Buyer as requested.
13.4 The Supplier must ensure that any Supplier system that holds any Buyer Data is a secure system that complies with the Supplier’s and Buyer’s security policies and all Buyer requirements in the Order Form.
13.5 The Supplier will preserve the integrity of Buyer Data processed by the Supplier and prevent its corruption and loss.
13.6 The Supplier will ensure that any Supplier system which holds any protectively marked Buyer Data or other government data will comply with: 13.6.1 the principles in the Security Policy Framework: ▇▇▇▇▇://▇▇▇.▇▇▇.▇▇/government/publications/security-policy-framework and the Government Security - Classification policy: https:/▇▇▇.▇▇▇.▇▇/▇▇▇▇▇▇▇▇▇▇/▇▇▇▇▇▇▇▇▇▇▇▇/▇▇▇▇▇▇▇▇▇▇- securityclassifications 13.6.2 guidance issued by the Centre for Protection of National Infrastructure on Risk Management: ▇▇▇▇▇://▇▇▇.▇▇▇▇.▇▇▇.▇▇/content/adopt- riskmanagement-approach and Protection of Sensitive Information and Assets: ▇▇▇▇▇://▇▇▇.▇▇▇▇.▇▇▇.▇▇/sensitive-information-assets
Appears in 1 contract
Sources: Call Off Contract
Buyer Data. 13.1 The Supplier must not remove any proprietary notices in the Buyer Data.
13.2 The Supplier will not store or use Buyer Data except if necessary to fulfil its obligations.
13.3 If Buyer Data is processed by the Supplier, the Supplier will supply the data to the Buyer as requested.
13.4 The Supplier must ensure that any Supplier system that holds any Buyer Data is a secure system that complies with the Supplier’s and Buyer’s security policies and all Buyer requirements in the Order Form.
13.5 The Supplier will preserve the integrity of Buyer Data processed by the Supplier and prevent its corruption and loss.
13.6 The Supplier will ensure that any Supplier system which holds any protectively marked Buyer Data or other government data will comply with: 13.6.1 the principles in the Security Policy Framework: ▇▇▇▇▇://▇▇▇.▇▇▇.▇▇/government/publications/security-policy-framework and the Government Security - Classification policy: https:/▇▇▇.▇▇▇.▇▇/▇▇▇▇▇▇▇▇▇▇/▇▇▇▇▇▇▇▇▇▇▇▇/▇▇▇▇▇▇▇▇▇▇-▇▇▇▇▇▇▇▇-▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇ 13.6.2 guidance issued by the Centre for Protection of National Infrastructure on Risk Management: ▇▇▇▇▇://▇▇▇.▇▇▇▇.▇▇▇.▇▇/content/adopt- riskmanagementapproach and Protection of Sensitive Information and Assets: ▇▇▇▇▇://▇▇▇.▇▇▇▇.▇▇▇.▇▇/sensitive-information-assets
Appears in 1 contract
Sources: Call Off Contract
Buyer Data. 13.1 The Supplier must not remove any proprietary notices in the Buyer Data.
13.2 The Supplier will not store or use Buyer Data except if necessary to fulfil its obligations.
13.3 If Buyer Data is processed by the Supplier, the Supplier will supply the data to the Buyer as requested.
13.4 The Supplier must ensure that any Supplier system that holds any Buyer Data is a secure system that complies with the Supplier’s and Buyer’s security policies and all Buyer requirements in the Order Form.
13.5 The Supplier will preserve the integrity of Buyer Data processed by the Supplier and prevent its corruption and loss.
13.6 The Supplier will ensure that any Supplier system which holds any protectively marked Buyer Data or other government data will comply with: 13.6.1 the principles in the Security Policy Framework: ▇▇▇▇▇://▇▇▇.▇▇▇.▇▇/government/publications/security-policy-framework and the Government Security - Classification policy: https:/▇▇▇.▇▇▇.▇▇/▇▇▇▇▇▇▇▇▇▇/▇▇▇▇▇▇▇▇▇▇▇▇/▇▇▇▇▇▇▇▇▇▇-▇▇▇▇▇▇▇▇-▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇ 13.6.2 guidance issued by the Centre for Protection of National Infrastructure on Risk Management: ▇▇▇▇▇://▇▇▇.▇▇▇▇.▇▇▇.▇▇/content/adopt-risk-management-approach and Protection of Sensitive Information and Assets: ▇▇▇▇▇://▇▇▇.▇▇▇▇.▇▇▇.▇▇/sensitiveinformation- assets
Appears in 1 contract
Sources: G Cloud 14 Call Off Contract
Buyer Data. 13.1 The Supplier must not remove any proprietary notices in the Buyer Data.
13.2 The Supplier will not store or use Buyer Data except if necessary to fulfil its obligations.
13.3 If Buyer Data is processed by the Supplier, the Supplier will supply the data to the Buyer as requested.
13.4 The Supplier must ensure that any Supplier system that holds any Buyer Data is a secure system that complies with the Supplier’s and Buyer’s security policies and all Buyer requirements in the Order Form.
13.5 The Supplier will preserve the integrity of Buyer Data processed by the Supplier and prevent its corruption and loss.
13.6 The Supplier will ensure that any Supplier system which holds any protectively marked Buyer Data or other government data will comply with: :
13.6.1 the principles in the Security Policy Framework: ▇▇▇▇▇://▇▇▇.▇▇▇.▇▇/government/publications/security-policy-framework and the Government Security Classification policy: https:/▇▇▇.▇▇▇.▇▇/▇▇▇▇▇▇▇▇▇▇/▇▇▇▇▇▇▇▇▇▇▇▇/▇▇▇▇▇▇▇▇▇▇-▇▇▇▇▇▇▇▇-▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇ 13.6.2 guidance issued by the Centre for Protection of National Infrastructure on Risk Management: ▇▇▇▇▇://▇▇▇.▇▇▇▇.▇▇▇.▇▇/content/adopt-risk-management-approach and Protection of Sensitive Information and Assets: ▇▇▇▇▇://▇▇▇.▇▇▇▇.▇▇▇.▇▇/protection-sensitive-information-and-assets .
Appears in 1 contract
Sources: Call Off Contract
Buyer Data. 13.1 The Supplier must not remove any proprietary notices in the Buyer Data.
13.2 The Supplier will not store or use Buyer Data except if necessary to fulfil its obligations.
13.3 If Buyer Data is processed by the Supplier, the Supplier will supply the data to the Buyer as requested.
13.4 The Supplier must ensure that any Supplier system that holds any Buyer Data is a secure system that complies with the Supplier’s and Buyer’s security policies and all Buyer requirements in the Order Form.
13.5 The Supplier will preserve the integrity of Buyer Data processed by the Supplier and prevent its corruption and loss.
13.6 The Supplier will ensure that any Supplier system which holds any protectively marked Buyer Data or other government data will comply with: :
13.6.1 the principles in the Security Policy Framework: ▇▇▇▇▇://▇▇▇.▇▇▇.▇▇/government/publications/security-policy-framework and the Government Security - Classification policy: https:/▇▇▇.▇▇▇.▇▇/▇▇▇▇▇▇▇▇▇▇/▇▇▇▇▇▇▇▇▇▇▇▇/▇▇▇▇▇▇▇▇▇▇-▇▇▇▇▇▇▇▇- classifications 13.6.2 guidance issued by the Centre for Protection of National Infrastructure on Risk Management: ▇▇▇▇▇://▇▇▇.▇▇▇▇.▇▇▇.▇▇/content/adopt-risk- management-approach and Protection of Sensitive Information and Assets: ▇▇▇▇▇://▇▇▇.▇▇▇▇.▇▇▇.▇▇/sensitive-information-assets
Appears in 1 contract
Sources: Call Off Contract
Buyer Data. 13.1 The Supplier must not remove any proprietary notices in the Buyer Data.
13.2 The Supplier will not store or use Buyer Data except if necessary to fulfil its obligations.
13.3 If Buyer Data is processed by the Supplier, the Supplier will supply the data to the Buyer as requested.
13.4 The Supplier must ensure that any Supplier system that holds any Buyer Data is a secure system that complies with the Supplier’s and Buyer’s security policies and all Buyer requirements in the Order Form.
13.5 The Supplier will preserve the integrity of Buyer Data processed by the Supplier and prevent its corruption and loss.
13.6 The Supplier will ensure that any Supplier system which holds any protectively marked Buyer Data or other government data will comply with: :
13.6.1 the principles in the Security Policy Framework: ▇▇▇▇▇://▇▇▇.▇▇▇.▇▇/government/publications/security-policy-framework and the Government Security - Classification policy: https:/▇▇▇.▇▇▇.▇▇/▇▇▇▇▇▇▇▇▇▇/▇▇▇▇▇▇▇▇▇▇▇▇/▇▇▇▇▇▇▇▇▇▇-▇▇▇▇▇▇▇▇-▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇ 13.6.2 guidance issued by the Centre for Protection of National Infrastructure on Risk Management: ▇▇▇▇▇://▇▇▇.▇▇▇▇.▇▇▇.▇▇/content/adopt-riskmanagement- approach and Protection of Sensitive Information and Assets: ▇▇▇▇▇://▇▇▇.▇▇▇▇.▇▇▇.▇▇/sensitive-information-assets
Appears in 1 contract
Sources: G Cloud 14 Call Off Contract
Buyer Data. 13.1 The Supplier must not remove any proprietary notices in the Buyer Data.
13.2 The Supplier will not store or use Buyer Data except if necessary to fulfil its obligations.
13.3 If Buyer Data is processed by the Supplier, the Supplier will supply the data to the Buyer as requested.
13.4 The Supplier must ensure that any Supplier system that holds any Buyer Data is a secure system that complies with the Supplier’s and Buyer’s security policies and all Buyer requirements in the Order Form.
13.5 The Supplier will preserve the integrity of Buyer Data processed by the Supplier and prevent its corruption and loss.
13.6 The Supplier will ensure that any Supplier system which holds any protectively marked Buyer Data or other government data will comply with: :
13.6.1 the principles in the Security Policy Framework: ▇▇▇▇▇://▇▇▇.▇▇▇.▇▇/government/publications/security-policy-framework and the Government Security Classification policy: https:/▇▇▇.▇▇▇.▇▇/▇▇▇▇▇▇▇▇▇▇/▇▇▇▇▇▇▇▇▇▇▇▇/▇▇▇▇▇▇▇▇▇▇-▇▇▇▇▇▇▇▇- classifications 13.6.2 guidance issued by the Centre for Protection of National Infrastructure on Risk Management: ▇▇▇▇▇://▇▇▇.▇▇▇▇.▇▇▇.▇▇/content/adopt-risk-management- approach and Protection of Sensitive Information and Assets:
Appears in 1 contract
Sources: Call Off Contract
Buyer Data. 13.1 The Supplier must not remove any proprietary notices in the Buyer Data.
13.2 The Supplier will not store or use Buyer Data except if necessary to fulfil its obligations.
13.3 If Buyer Data is processed by the Supplier, the Supplier will supply the data to the Buyer as requested.
13.4 The Supplier must ensure that any Supplier system that holds any Buyer Data is a secure system that complies with the Supplier’s and Buyer’s security policies and all Buyer requirements in the Order Form.
13.5 The Supplier will preserve the integrity of Buyer Data processed by the Supplier and prevent its corruption and loss.
13.6 The Supplier will ensure that any Supplier system which holds any protectively marked Buyer Data or other government data will comply with: :
13.6.1 the principles in the Security Policy Framework: ▇▇▇▇▇://▇▇▇.▇▇▇.▇▇/government/publications/security-policy-framework and the Government Security - Classification policy: https:/▇▇▇.▇▇▇.▇▇/▇▇▇▇▇▇▇▇▇▇/▇▇▇▇▇▇▇▇▇▇▇▇/▇▇▇▇▇▇▇▇▇▇-▇▇▇▇▇▇▇▇-▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇ 13.6.2 guidance issued by the Centre for Protection of National Infrastructure on Risk Management: ▇▇▇▇▇://▇▇▇.▇▇▇▇.▇▇▇.▇▇/content/adopt-risk-management-approach and Protection of Sensitive Information and Assets:
Appears in 1 contract
Sources: Call Off Contract
Buyer Data. 13.1 The Supplier must not remove any proprietary notices in the Buyer Data.
13.2 The Supplier will not store or use Buyer Data except if necessary to fulfil its obligations.
13.3 If Buyer Data is processed by the Supplier, the Supplier will supply the data to the Buyer as requested.
13.4 The Supplier must ensure that any Supplier system that holds any Buyer Data is a secure system that complies with the Supplier’s and Buyer’s security policies and all Buyer requirements in the Order Form.
13.5 The Supplier will preserve the integrity of Buyer Data processed by the Supplier and prevent its corruption and loss.
13.6 The Supplier will ensure that any Supplier system which holds any protectively marked Buyer Data or other government data will comply with: 13.6.1 the principles in the Security Policy Framework: ▇▇▇▇▇://▇▇▇.▇▇▇.▇▇/government/publications/security-policy-framework and the Government Security Classification policy:: https:/▇▇▇.▇▇▇.▇▇/▇▇▇▇▇▇▇▇▇▇/▇▇▇▇▇▇▇▇▇▇▇▇/▇▇▇▇▇▇▇▇▇▇-▇▇▇▇▇▇▇▇-▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇
Appears in 1 contract
Sources: Call Off Contract
Buyer Data. 13.1 The Supplier must not remove any proprietary notices in the Buyer Data.
13.2 The Supplier will not store or use Buyer Data except if necessary to fulfil its obligations.
13.3 If Buyer Data is processed by the Supplier, the Supplier will supply the data to the Buyer as requested.
13.4 The Supplier must ensure that any Supplier system that holds any Buyer Data is a secure system that complies with the Supplier’s and Buyer’s security policies and all Buyer requirements in the Order Form.
13.5 The Supplier will preserve the integrity of Buyer Data processed by the Supplier and prevent its corruption and loss.
13.6 The Supplier will ensure that any Supplier system which holds any protectively marked Buyer Data or other government data will comply with: :
13.6.1 the principles in the Security Policy Framework: ▇▇▇▇▇://▇▇▇.▇▇▇.▇▇/government/publications/security-policy-framework and the Government Security Classification policy: https:/▇▇▇.▇▇▇.▇▇/▇▇▇▇▇▇▇▇▇▇/▇▇▇▇▇▇▇▇▇▇▇▇/▇▇▇▇▇▇▇▇▇▇-▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇ 13.6.2 guidance issued by the Centre for Protection of National Infrastructure on Risk Management: ▇▇▇▇▇://▇▇▇.▇▇▇▇.▇▇▇.▇▇/content/adopt-risk-managementapproach and Protection of Sensitive Information and Assets: ▇▇▇▇▇://▇▇▇.▇▇▇▇.▇▇▇.▇▇/protection- sensitive-information-and-assets
Appears in 1 contract
Sources: G Cloud 13 Call Off Contract
Buyer Data. 13.1 The Supplier must not remove any proprietary notices in the Buyer Data.
13.2 The Supplier will not store or use Buyer Data except if necessary to fulfil its obligations.
13.3 If Buyer Data is processed by the Supplier, the Supplier will supply the data to the Buyer as requested.
13.4 The Supplier must ensure that any Supplier system that holds any Buyer Data is a secure system that complies with the Supplier’s and Buyer’s security policies and all Buyer requirements in the Order Form.
13.5 The Supplier will preserve the integrity of Buyer Data processed by the Supplier and prevent its corruption and loss.
13.6 The Supplier will ensure that any Supplier system which holds any protectively marked Buyer Data or other government data will comply with: :
13.6.1 the principles in the Security Policy Framework: ▇▇▇▇▇://▇▇▇.▇▇▇.▇▇/government/publications/security-policy-framework and the Government Security Classification policy: https:/▇▇▇.▇▇▇.▇▇/▇▇▇▇▇▇▇▇▇▇/▇▇▇▇▇▇▇▇▇▇▇▇/▇▇▇▇▇▇▇▇▇▇-▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇ 13.6.2 guidance issued by the Centre for Protection of National Infrastructure on Risk Management: ▇▇▇▇▇://▇▇▇.▇▇▇▇.▇▇▇.▇▇/content/adopt-risk- managementapproach and Protection of Sensitive Information and Assets: ▇▇▇▇▇://▇▇▇.▇▇▇▇.▇▇▇.▇▇/protection-sensitive-information-and-assets
Appears in 1 contract
Sources: Call Off Contract
Buyer Data. 13.1 The Supplier must not remove any proprietary notices in the Buyer Data.
13.2 The Supplier will not store or use Buyer Data except if necessary to fulfil its obligations.
13.3 If Buyer Data is processed by the Supplier, the Supplier will supply the data to the Buyer as requested.
13.4 The Supplier must ensure that any Supplier system that holds any Buyer Data is a secure system that complies with the Supplier’s and Buyer’s security policies and all Buyer requirements in the Order Form.
13.5 The Supplier will preserve the integrity of Buyer Data processed by the Supplier and prevent its corruption and loss.
13.6 The Supplier will ensure that any Supplier system which holds any protectively marked Buyer Data or other government data will comply with: 13.6.1 the principles in the Security Policy Framework: ▇▇▇▇▇://▇▇▇.▇▇▇.▇▇/government/publications/security-policy-framework and the Government Security - Classification policy: 13.6.2 guidance issued by the Centre for Protection of National Infrastructure on Risk Management: ▇▇▇▇▇://▇▇▇.▇▇▇▇.▇▇▇.▇▇/content/adopt-risk-managementapproach and Protection of Sensitive Information and Assets: ▇▇▇▇▇://▇▇▇.▇▇▇▇.▇▇▇.▇▇/sensitive-information-assets
Appears in 1 contract
Sources: Call Off Contract