Common use of Buyer Data Clause in Contracts

Buyer Data. 13.1 The Supplier must not remove any proprietary notices in the Buyer Data. 13.2 The Supplier will not store or use Buyer Data except if necessary to fulfil its obligations. 13.3 If Buyer Data is processed by the Supplier, the Supplier will supply the data to the Buyer as requested. 13.4 The Supplier must ensure that any Supplier system that holds any Buyer Data is a secure system that complies with the Supplier’s and Buyer’s security policies and all Buyer requirements in the Order Form. 13.5 The Supplier will preserve the integrity of Buyer Data processed by the Supplier and prevent its corruption and loss. 13.6 The Supplier will ensure that any Supplier system which holds any protectively marked Buyer Data or other government data will comply with: 13.6.1 the principles in the Security Policy Framework: ▇▇▇▇▇://▇▇▇.▇▇▇.▇▇/government/publications/security-policy-framework and the Government Security Classification policy:

Appears in 10 contracts

Sources: Call Off Contract, Call Off Contract, G Cloud Call Off Contract

Buyer Data. 13.1 The Supplier must not remove any proprietary notices in the Buyer Data. 13.2 The Supplier will not store or use Buyer Data except if necessary to fulfil its obligations. 13.3 If Buyer Data is processed by the Supplier, the Supplier will supply the data to the Buyer as requested. 13.4 The Supplier must ensure that any Supplier system that holds any Buyer Data is a secure system that complies with the Supplier’s and Buyer’s security policies and all Buyer requirements in the Order Form. 13.5 The Supplier will preserve the integrity of Buyer Data processed by the Supplier and prevent its corruption and loss. 13.6 The Supplier will ensure that any Supplier system which holds any protectively marked Buyer Data or other government data will comply with: : 13.6.1 the principles in the Security Policy Framework: ▇▇▇▇▇://▇▇▇.▇▇▇.▇▇/government/publications/security-policy-framework and the Government Security - Classification policy: https:/▇▇▇.▇▇▇.▇▇/▇▇▇▇▇▇▇▇▇▇/▇▇▇▇▇▇▇▇▇▇▇▇/▇▇▇▇▇▇▇▇▇▇-▇▇▇▇▇▇▇▇-▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇ 13.6.2 guidance issued by the Centre for Protection of National Infrastructure on Risk Management: ▇▇▇▇▇://▇▇▇.▇▇▇▇.▇▇▇.▇▇/content/adopt-risk-management- approach and Protection of Sensitive Information and Assets: ▇▇▇▇▇://▇▇▇.▇▇▇▇.▇▇▇.▇▇/sensitive-information-assets

Appears in 5 contracts

Sources: Call Off Contract, Call Off Contract, G Cloud 13 Call Off Contract

Buyer Data. 13.1 The Supplier must not remove any proprietary notices in the Buyer Data. 13.2 The Supplier will not store or use Buyer Data except if necessary to fulfil its obligations. 13.3 If Buyer Data is processed by the Supplier, the Supplier will supply the data to the Buyer as requested. 13.4 The Supplier must ensure that any Supplier system that holds any Buyer Data is a secure system that complies with the Supplier’s and Buyer’s security policies and all Buyer requirements in the Order Form. 13.5 The Supplier will preserve the integrity of Buyer Data processed by the Supplier and prevent its corruption and loss. 13.6 The Supplier will ensure that any Supplier system which holds any protectively marked Buyer Data or other government data will comply with: 13.6.1 the principles in the Security Policy Framework: ▇▇▇▇▇://▇▇▇.▇▇▇.▇▇/government/publications/security-policy-framework and the Government Security - Classification policy: https:/▇▇▇.▇▇▇.▇▇/▇▇▇▇▇▇▇▇▇▇/▇▇▇▇▇▇▇▇▇▇▇▇/▇▇▇▇▇▇▇▇▇▇-▇▇▇▇▇▇▇▇-▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇ 13.6.2 guidance issued by the Centre for Protection of National Infrastructure on Risk Management: ▇▇▇▇▇://▇▇▇.▇▇▇▇.▇▇▇.▇▇/content/adopt-riskmanagement- approach and Protection of Sensitive Information and Assets: ▇▇▇▇▇://▇▇▇.▇▇▇▇.▇▇▇.▇▇/sensitive-information-assets

Appears in 4 contracts

Sources: Call Off Contract, G Cloud 14 Call Off Contract, Call Off Contract

Buyer Data. 13.1 The Supplier must not remove any proprietary notices in the Buyer Data. 13.2 The Supplier will not store or use Buyer Data except if necessary to fulfil its obligations. 13.3 If Buyer Data is processed by the Supplier, the Supplier will supply the data to the Buyer as requested. 13.4 The Supplier must ensure that any Supplier system that holds any Buyer Data is a secure system that complies with the Supplier’s and Buyer’s security policies and all Buyer requirements in the Order Form. 13.5 The Supplier will preserve the integrity of Buyer Data processed by the Supplier and prevent its corruption and loss. 13.6 The Supplier will ensure that any Supplier system which holds any protectively marked Buyer Data or other government data will comply with: : 13.6.1 the principles in the Security Policy Framework: ▇▇▇▇▇://▇▇▇.▇▇▇.▇▇/government/publications/security-policy-framework and the Government Security Classification policy: https:/▇▇▇.▇▇▇.▇▇/▇▇▇▇▇▇▇▇▇▇/▇▇▇▇▇▇▇▇▇▇▇▇/▇▇▇▇▇▇▇▇▇▇-▇▇▇▇▇▇▇▇-▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇ 13.6.2 guidance issued by the Centre for Protection of National Infrastructure on Risk Management: ▇▇▇▇▇://▇▇▇.▇▇▇▇.▇▇▇.▇▇/content/adopt-risk-management- approach and Protection of Sensitive Information and Assets: ▇▇▇▇▇://▇▇▇.▇▇▇▇.▇▇▇.▇▇/protection-sensitive-information-and-assets

Appears in 1 contract

Sources: Call Off Contract

Buyer Data. 13.1 The Supplier must not remove any proprietary notices in the Buyer Data. 13.2 The Supplier will not store or use Buyer Data except if necessary to fulfil its obligations. 13.3 If Buyer Data is processed by the Supplier, the Supplier will supply the data to the Buyer as requested. 13.4 The Supplier must ensure that any Supplier system that holds any Buyer Data is a secure system that complies with the Supplier’s and Buyer’s security policies and all Buyer requirements in the Order Form. 13.5 The Supplier will preserve the integrity of Buyer Data processed by the Supplier and prevent its corruption and loss. 13.6 The Supplier will ensure that any Supplier system which holds any protectively marked Buyer Data or other government data will comply with: 13.6.1 the principles in the Security Policy Framework: ▇▇▇▇▇://▇▇▇.▇▇▇.▇▇/government/publications/security-policy-framework and the Government Security - Classification policy: https:/▇▇▇.▇▇▇.▇▇/▇▇▇▇▇▇▇▇▇▇/▇▇▇▇▇▇▇▇▇▇▇▇/▇▇▇▇▇▇▇▇▇▇- securityclassifications 13.6.2 guidance issued by the Centre for Protection of National Infrastructure on Risk Management: ▇▇▇▇▇://▇▇▇.▇▇▇▇.▇▇▇.▇▇/content/adopt- riskmanagement-approach and Protection of Sensitive Information and Assets: ▇▇▇▇▇://▇▇▇.▇▇▇▇.▇▇▇.▇▇/sensitive-information-assets

Appears in 1 contract

Sources: Call Off Contract

Buyer Data. 13.1 The Supplier must not remove any proprietary notices in the Buyer Data. 13.2 The Supplier will not store or use Buyer Data except if necessary to fulfil its obligations. 13.3 If Buyer Data is processed by the Supplier, the Supplier will supply the data to the Buyer as requested. 13.4 The Supplier must ensure that any Supplier system that holds any Buyer Data is a secure system that complies with the Supplier’s and Buyer’s security policies and all Buyer requirements in the Order Form. 13.5 The Supplier will preserve the integrity of Buyer Data processed by the Supplier and prevent its corruption and loss. 13.6 The Supplier will ensure that any Supplier system which holds any protectively marked Buyer Data or other government data will comply with: 13.6.1 the principles in the Security Policy Framework: ▇▇▇▇▇://▇▇▇.▇▇▇.▇▇/government/publications/security-policy-framework and the Government Security - Classification policy: https:/▇▇▇.▇▇▇.▇▇/▇▇▇▇▇▇▇▇▇▇/▇▇▇▇▇▇▇▇▇▇▇▇/▇▇▇▇▇▇▇▇▇▇-▇▇▇▇▇▇▇▇-▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇ 13.6.2 guidance issued by the Centre for Protection of National Infrastructure on Risk Management: ▇▇▇▇▇://▇▇▇.▇▇▇▇.▇▇▇.▇▇/content/adopt- riskmanagementapproach and Protection of Sensitive Information and Assets: ▇▇▇▇▇://▇▇▇.▇▇▇▇.▇▇▇.▇▇/sensitive-information-assets

Appears in 1 contract

Sources: Call Off Contract

Buyer Data. 13.1 The Supplier must not remove any proprietary notices in the Buyer Data. 13.2 The Supplier will not store or use Buyer Data except if necessary to fulfil its obligations. 13.3 If Buyer Data is processed by the Supplier, the Supplier will supply the data to the Buyer as requested. 13.4 The Supplier must ensure that any Supplier system that holds any Buyer Data is a secure system that complies with the Supplier’s and Buyer’s security policies and all Buyer requirements in the Order Form. 13.5 The Supplier will preserve the integrity of Buyer Data processed by the Supplier and prevent its corruption and loss. 13.6 The Supplier will ensure that any Supplier system which holds any protectively marked Buyer Data or other government data will comply with: 13.6.1 the principles in the Security Policy Framework: ▇▇▇▇▇://▇▇▇.▇▇▇.▇▇/government/publications/security-policy-framework and the Government Security - Classification policy: https:/▇▇▇.▇▇▇.▇▇/▇▇▇▇▇▇▇▇▇▇/▇▇▇▇▇▇▇▇▇▇▇▇/▇▇▇▇▇▇▇▇▇▇-▇▇▇▇▇▇▇▇-▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇ 13.6.2 guidance issued by the Centre for Protection of National Infrastructure on Risk Management: ▇▇▇▇▇://▇▇▇.▇▇▇▇.▇▇▇.▇▇/content/adopt-risk-management-approach and Protection of Sensitive Information and Assets: ▇▇▇▇▇://▇▇▇.▇▇▇▇.▇▇▇.▇▇/sensitiveinformation- assets

Appears in 1 contract

Sources: G Cloud 14 Call Off Contract

Buyer Data. 13.1 The Supplier must not remove any proprietary notices in the Buyer Data. 13.2 The Supplier will not store or use Buyer Data except if necessary to fulfil its obligations. 13.3 If Buyer Data is processed by the Supplier, the Supplier will supply the data to the Buyer as requested. 13.4 The Supplier must ensure that any Supplier system that holds any Buyer Data is a secure system that complies with the Supplier’s and Buyer’s security policies and all Buyer requirements in the Order Form. 13.5 The Supplier will preserve the integrity of Buyer Data processed by the Supplier and prevent its corruption and loss. 13.6 The Supplier will ensure that any Supplier system which holds any protectively marked Buyer Data or other government data will comply with: : 13.6.1 the principles in the Security Policy Framework: ▇▇▇▇▇://▇▇▇.▇▇▇.▇▇/government/publications/security-policy-framework and the Government Security Classification policy: https:/▇▇▇.▇▇▇.▇▇/▇▇▇▇▇▇▇▇▇▇/▇▇▇▇▇▇▇▇▇▇▇▇/▇▇▇▇▇▇▇▇▇▇-▇▇▇▇▇▇▇▇-▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇ 13.6.2 guidance issued by the Centre for Protection of National Infrastructure on Risk Management: ▇▇▇▇▇://▇▇▇.▇▇▇▇.▇▇▇.▇▇/content/adopt-risk-management-approach and Protection of Sensitive Information and Assets: ▇▇▇▇▇://▇▇▇.▇▇▇▇.▇▇▇.▇▇/protection-sensitive-information-and-assets .

Appears in 1 contract

Sources: Call Off Contract

Buyer Data. 13.1 The Supplier must not remove any proprietary notices in the Buyer Data. 13.2 The Supplier will not store or use Buyer Data except if necessary to fulfil its obligations. 13.3 If Buyer Data is processed by the Supplier, the Supplier will supply the data to the Buyer as requested. 13.4 The Supplier must ensure that any Supplier system that holds any Buyer Data is a secure system that complies with the Supplier’s and Buyer’s security policies and all Buyer requirements in the Order Form. 13.5 The Supplier will preserve the integrity of Buyer Data processed by the Supplier and prevent its corruption and loss. 13.6 The Supplier will ensure that any Supplier system which holds any protectively marked Buyer Data or other government data will comply with: : 13.6.1 the principles in the Security Policy Framework: ▇▇▇▇▇://▇▇▇.▇▇▇.▇▇/government/publications/security-policy-framework and the Government Security - Classification policy: https:/▇▇▇.▇▇▇.▇▇/▇▇▇▇▇▇▇▇▇▇/▇▇▇▇▇▇▇▇▇▇▇▇/▇▇▇▇▇▇▇▇▇▇-▇▇▇▇▇▇▇▇- classifications 13.6.2 guidance issued by the Centre for Protection of National Infrastructure on Risk Management: ▇▇▇▇▇://▇▇▇.▇▇▇▇.▇▇▇.▇▇/content/adopt-risk- management-approach and Protection of Sensitive Information and Assets: ▇▇▇▇▇://▇▇▇.▇▇▇▇.▇▇▇.▇▇/sensitive-information-assets

Appears in 1 contract

Sources: Call Off Contract

Buyer Data. 13.1 The Supplier must not remove any proprietary notices in the Buyer Data. 13.2 The Supplier will not store or use Buyer Data except if necessary to fulfil its obligations. 13.3 If Buyer Data is processed by the Supplier, the Supplier will supply the data to the Buyer as requested. 13.4 The Supplier must ensure that any Supplier system that holds any Buyer Data is a secure system that complies with the Supplier’s and Buyer’s security policies and all Buyer requirements in the Order Form. 13.5 The Supplier will preserve the integrity of Buyer Data processed by the Supplier and prevent its corruption and loss. 13.6 The Supplier will ensure that any Supplier system which holds any protectively marked Buyer Data or other government data will comply with: : 13.6.1 the principles in the Security Policy Framework: ▇▇▇▇▇://▇▇▇.▇▇▇.▇▇/government/publications/security-policy-framework and the Government Security - Classification policy: https:/▇▇▇.▇▇▇.▇▇/▇▇▇▇▇▇▇▇▇▇/▇▇▇▇▇▇▇▇▇▇▇▇/▇▇▇▇▇▇▇▇▇▇-▇▇▇▇▇▇▇▇-▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇ 13.6.2 guidance issued by the Centre for Protection of National Infrastructure on Risk Management: ▇▇▇▇▇://▇▇▇.▇▇▇▇.▇▇▇.▇▇/content/adopt-riskmanagement- approach and Protection of Sensitive Information and Assets: ▇▇▇▇▇://▇▇▇.▇▇▇▇.▇▇▇.▇▇/sensitive-information-assets

Appears in 1 contract

Sources: G Cloud 14 Call Off Contract

Buyer Data. 13.1 The Supplier must not remove any proprietary notices in the Buyer Data. 13.2 The Supplier will not store or use Buyer Data except if necessary to fulfil its obligations. 13.3 If Buyer Data is processed by the Supplier, the Supplier will supply the data to the Buyer as requested. 13.4 The Supplier must ensure that any Supplier system that holds any Buyer Data is a secure system that complies with the Supplier’s and Buyer’s security policies and all Buyer requirements in the Order Form. 13.5 The Supplier will preserve the integrity of Buyer Data processed by the Supplier and prevent its corruption and loss. 13.6 The Supplier will ensure that any Supplier system which holds any protectively marked Buyer Data or other government data will comply with: : 13.6.1 the principles in the Security Policy Framework: ▇▇▇▇▇://▇▇▇.▇▇▇.▇▇/government/publications/security-policy-framework and the Government Security Classification policy: https:/▇▇▇.▇▇▇.▇▇/▇▇▇▇▇▇▇▇▇▇/▇▇▇▇▇▇▇▇▇▇▇▇/▇▇▇▇▇▇▇▇▇▇-▇▇▇▇▇▇▇▇- classifications 13.6.2 guidance issued by the Centre for Protection of National Infrastructure on Risk Management: ▇▇▇▇▇://▇▇▇.▇▇▇▇.▇▇▇.▇▇/content/adopt-risk-management- approach and Protection of Sensitive Information and Assets:

Appears in 1 contract

Sources: Call Off Contract

Buyer Data. 13.1 The Supplier must not remove any proprietary notices in the Buyer Data. 13.2 The Supplier will not store or use Buyer Data except if necessary to fulfil its obligations. 13.3 If Buyer Data is processed by the Supplier, the Supplier will supply the data to the Buyer as requested. 13.4 The Supplier must ensure that any Supplier system that holds any Buyer Data is a secure system that complies with the Supplier’s and Buyer’s security policies and all Buyer requirements in the Order Form. 13.5 The Supplier will preserve the integrity of Buyer Data processed by the Supplier and prevent its corruption and loss. 13.6 The Supplier will ensure that any Supplier system which holds any protectively marked Buyer Data or other government data will comply with: : 13.6.1 the principles in the Security Policy Framework: ▇▇▇▇▇://▇▇▇.▇▇▇.▇▇/government/publications/security-policy-framework and the Government Security - Classification policy: https:/▇▇▇.▇▇▇.▇▇/▇▇▇▇▇▇▇▇▇▇/▇▇▇▇▇▇▇▇▇▇▇▇/▇▇▇▇▇▇▇▇▇▇-▇▇▇▇▇▇▇▇-▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇ 13.6.2 guidance issued by the Centre for Protection of National Infrastructure on Risk Management: ▇▇▇▇▇://▇▇▇.▇▇▇▇.▇▇▇.▇▇/content/adopt-risk-management-approach and Protection of Sensitive Information and Assets:

Appears in 1 contract

Sources: Call Off Contract

Buyer Data. 13.1 The Supplier must not remove any proprietary notices in the Buyer Data. 13.2 The Supplier will not store or use Buyer Data except if necessary to fulfil its obligations. 13.3 If Buyer Data is processed by the Supplier, the Supplier will supply the data to the Buyer as requested. 13.4 The Supplier must ensure that any Supplier system that holds any Buyer Data is a secure system that complies with the Supplier’s and Buyer’s security policies and all Buyer requirements in the Order Form. 13.5 The Supplier will preserve the integrity of Buyer Data processed by the Supplier and prevent its corruption and loss. 13.6 The Supplier will ensure that any Supplier system which holds any protectively marked Buyer Data or other government data will comply with: 13.6.1 the principles in the Security Policy Framework: ▇▇▇▇▇://▇▇▇.▇▇▇.▇▇/government/publications/security-policy-framework and the Government Security Classification policy:: https:/▇▇▇.▇▇▇.▇▇/▇▇▇▇▇▇▇▇▇▇/▇▇▇▇▇▇▇▇▇▇▇▇/▇▇▇▇▇▇▇▇▇▇-▇▇▇▇▇▇▇▇-▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇

Appears in 1 contract

Sources: Call Off Contract

Buyer Data. 13.1 The Supplier must not remove any proprietary notices in the Buyer Data. 13.2 The Supplier will not store or use Buyer Data except if necessary to fulfil its obligations. 13.3 If Buyer Data is processed by the Supplier, the Supplier will supply the data to the Buyer as requested. 13.4 The Supplier must ensure that any Supplier system that holds any Buyer Data is a secure system that complies with the Supplier’s and Buyer’s security policies and all Buyer requirements in the Order Form. 13.5 The Supplier will preserve the integrity of Buyer Data processed by the Supplier and prevent its corruption and loss. 13.6 The Supplier will ensure that any Supplier system which holds any protectively marked Buyer Data or other government data will comply with: : 13.6.1 the principles in the Security Policy Framework: ▇▇▇▇▇://▇▇▇.▇▇▇.▇▇/government/publications/security-policy-framework and the Government Security Classification policy: https:/▇▇▇.▇▇▇.▇▇/▇▇▇▇▇▇▇▇▇▇/▇▇▇▇▇▇▇▇▇▇▇▇/▇▇▇▇▇▇▇▇▇▇-▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇ 13.6.2 guidance issued by the Centre for Protection of National Infrastructure on Risk Management: ▇▇▇▇▇://▇▇▇.▇▇▇▇.▇▇▇.▇▇/content/adopt-risk-managementapproach and Protection of Sensitive Information and Assets: ▇▇▇▇▇://▇▇▇.▇▇▇▇.▇▇▇.▇▇/protection- sensitive-information-and-assets

Appears in 1 contract

Sources: G Cloud 13 Call Off Contract

Buyer Data. 13.1 The Supplier must not remove any proprietary notices in the Buyer Data. 13.2 The Supplier will not store or use Buyer Data except if necessary to fulfil its obligations. 13.3 If Buyer Data is processed by the Supplier, the Supplier will supply the data to the Buyer as requested. 13.4 The Supplier must ensure that any Supplier system that holds any Buyer Data is a secure system that complies with the Supplier’s and Buyer’s security policies and all Buyer requirements in the Order Form. 13.5 The Supplier will preserve the integrity of Buyer Data processed by the Supplier and prevent its corruption and loss. 13.6 The Supplier will ensure that any Supplier system which holds any protectively marked Buyer Data or other government data will comply with: : 13.6.1 the principles in the Security Policy Framework: ▇▇▇▇▇://▇▇▇.▇▇▇.▇▇/government/publications/security-policy-framework and the Government Security Classification policy: https:/▇▇▇.▇▇▇.▇▇/▇▇▇▇▇▇▇▇▇▇/▇▇▇▇▇▇▇▇▇▇▇▇/▇▇▇▇▇▇▇▇▇▇-▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇ 13.6.2 guidance issued by the Centre for Protection of National Infrastructure on Risk Management: ▇▇▇▇▇://▇▇▇.▇▇▇▇.▇▇▇.▇▇/content/adopt-risk- managementapproach and Protection of Sensitive Information and Assets: ▇▇▇▇▇://▇▇▇.▇▇▇▇.▇▇▇.▇▇/protection-sensitive-information-and-assets

Appears in 1 contract

Sources: Call Off Contract

Buyer Data. 13.1 The Supplier must not remove any proprietary notices in the Buyer Data. 13.2 The Supplier will not store or use Buyer Data except if necessary to fulfil its obligations. 13.3 If Buyer Data is processed by the Supplier, the Supplier will supply the data to the Buyer as requested. 13.4 The Supplier must ensure that any Supplier system that holds any Buyer Data is a secure system that complies with the Supplier’s and Buyer’s security policies and all Buyer requirements in the Order Form. 13.5 The Supplier will preserve the integrity of Buyer Data processed by the Supplier and prevent its corruption and loss. 13.6 The Supplier will ensure that any Supplier system which holds any protectively marked Buyer Data or other government data will comply with: 13.6.1 the principles in the Security Policy Framework: ▇▇▇▇▇://▇▇▇.▇▇▇.▇▇/government/publications/security-policy-framework and the Government Security - Classification policy: 13.6.2 guidance issued by the Centre for Protection of National Infrastructure on Risk Management: ▇▇▇▇▇://▇▇▇.▇▇▇▇.▇▇▇.▇▇/content/adopt-risk-managementapproach and Protection of Sensitive Information and Assets: ▇▇▇▇▇://▇▇▇.▇▇▇▇.▇▇▇.▇▇/sensitive-information-assets

Appears in 1 contract

Sources: Call Off Contract