{"component": "clause", "props": {"groups": [{"samples": [{"hash": "9J3NViOdBJ9", "uri": "/contracts/9J3NViOdBJ9#buyer-data", "label": "Call Off Contract", "score": 33.820224762, "published": true}, {"hash": "egn4U3aBf5w", "uri": "/contracts/egn4U3aBf5w#buyer-data", "label": "Call Off Contract", "score": 33.5437278748, "published": true}, {"hash": "eOfipBBlnJY", "uri": "/contracts/eOfipBBlnJY#buyer-data", "label": "G Cloud Call Off Contract", "score": 33.0858345032, "published": true}], "size": 32, "snippet_links": [{"key": "the-supplier-must-not", "type": "clause", "offset": [5, 26]}, {"key": "notices-in", "type": "clause", "offset": [50, 60]}, {"key": "the-supplier-will", "type": "clause", "offset": [82, 99]}, {"key": "not-store", "type": "definition", "offset": [100, 109]}, {"key": "the-data", "type": "clause", "offset": [249, 257]}, {"key": "to-the-buyer", "type": "clause", "offset": [258, 270]}, {"key": "as-requested", "type": "clause", "offset": [271, 283]}, {"key": "supplier-system", "type": "definition", "offset": [324, 339]}, {"key": "secure-system", "type": "definition", "offset": [371, 384]}, {"key": "security-policies", "type": "definition", "offset": [431, 448]}, {"key": "buyer-requirements", "type": "clause", "offset": [457, 475]}, {"key": "order-form", "type": "definition", "offset": [483, 493]}, {"key": "of-buyer", "type": "clause", "offset": [541, 549]}, {"key": "protectively-marked", "type": "definition", "offset": [689, 708]}, {"key": "government-data", "type": "definition", "offset": [729, 744]}, {"key": "comply-with", "type": "definition", "offset": [750, 761]}, {"key": "the-principles", "type": "clause", "offset": [770, 784]}, {"key": "security-policy-framework", "type": "definition", "offset": [792, 817]}, {"key": "government-security-classification-policy", "type": "definition", "offset": [896, 937]}], "snippet": "13.1 The Supplier must not remove any proprietary notices in the Buyer Data.\n13.2 The Supplier will not store or use Buyer Data except if necessary to fulfil its obligations.\n13.3 If Buyer Data is processed by the Supplier, the Supplier will supply the data to the Buyer as requested.\n13.4 The Supplier must ensure that any Supplier system that holds any Buyer Data is a secure system that complies with the Supplier\u2019s and Buyer\u2019s security policies and all Buyer requirements in the Order Form.\n13.5 The Supplier will preserve the integrity of Buyer Data processed by the Supplier and prevent its corruption and loss.\n13.6 The Supplier will ensure that any Supplier system which holds any protectively marked Buyer Data or other government data will comply with: 13.6.1 the principles in the Security Policy Framework: \u2587\u2587\u2587\u2587\u2587://\u2587\u2587\u2587.\u2587\u2587\u2587.\u2587\u2587/government/publications/security-policy-framework and the Government Security Classification policy:", "hash": "2156bafe7b8b26239b17c0a1b67c871e", "id": 5}, {"samples": [{"hash": "dB2y4R5uJMt", "uri": "/contracts/dB2y4R5uJMt#buyer-data", "label": "Call Off Contract", "score": 36.5523605347, "published": true}, {"hash": "h1HIvDX8hv3", "uri": "/contracts/h1HIvDX8hv3#buyer-data", "label": "Call Off Contract", "score": 36.550994873, "published": true}, {"hash": "4r4XIt53IWw", "uri": "/contracts/4r4XIt53IWw#buyer-data", "label": "Call Off Contract", "score": 36.5359344482, "published": true}], "size": 381, "snippet_links": [{"key": "the-supplier", "type": "definition", "offset": [20, 32]}, {"key": "direct-loss", "type": "definition", "offset": [46, 57]}, {"key": "order-form", "type": "definition", "offset": [159, 169]}], "snippet": "for all Defaults by the Supplier resulting in direct loss, destruction, corruption, degradation or damage to any Buyer Data, will not exceed the amount in the Order Form", "hash": "4caf7599aa901dca6a58ca48028256d8", "id": 1}, {"samples": [{"hash": "2kNlGhH0J9a", "uri": "/contracts/2kNlGhH0J9a#buyer-data", "label": "Call Off Contract", "score": 32.9168167114, "published": true}, {"hash": "a2gtW1BP7iC", "uri": "/contracts/a2gtW1BP7iC#buyer-data", "label": "Call Off Contract", "score": 32.7771987915, "published": true}, {"hash": "3i0D2HnOIxt", "uri": "/contracts/3i0D2HnOIxt#buyer-data", "label": "Call Off Contract", "score": 32.3638916016, "published": true}], "size": 103, "snippet_links": [{"key": "the-supplier-will", "type": "clause", "offset": [5, 22]}, {"key": "proprietary-notices", "type": "definition", "offset": [38, 57]}, {"key": "to-the-buyer", "type": "clause", "offset": [67, 79]}, {"key": "not-store", "type": "definition", "offset": [109, 118]}, {"key": "where-necessary", "type": "clause", "offset": [144, 159]}, {"key": "as-requested", "type": "clause", "offset": [283, 295]}, {"key": "by-the-buyer", "type": "clause", "offset": [324, 336]}, {"key": "of-buyer", "type": "clause", "offset": [384, 392]}, {"key": "security-requirements", "type": "clause", "offset": [552, 573]}, {"key": "protectively-marked", "type": "definition", "offset": [677, 696]}, {"key": "comply-with", "type": "definition", "offset": [761, 772]}, {"key": "security-policy-framework", "type": "definition", "offset": [791, 816]}, {"key": "information-assurance", "type": "clause", "offset": [821, 842]}, {"key": "issued-by", "type": "clause", "offset": [862, 871]}, {"key": "the-centre", "type": "clause", "offset": [872, 882]}, {"key": "protection-of", "type": "definition", "offset": [887, 900]}, {"key": "risk-management", "type": "clause", "offset": [928, 943]}, {"key": "information-systems", "type": "clause", "offset": [965, 984]}, {"key": "the-relevant", "type": "clause", "offset": [992, 1004]}, {"key": "government-information", "type": "definition", "offset": [1005, 1027]}, {"key": "duration-of-the", "type": "clause", "offset": [1066, 1081]}, {"key": "one-year", "type": "definition", "offset": [1108, 1116]}, {"key": "accreditation-status", "type": "definition", "offset": [1147, 1167]}, {"key": "a-year", "type": "definition", "offset": [1182, 1188]}, {"key": "material-changes", "type": "definition", "offset": [1207, 1223]}, {"key": "the-original", "type": "definition", "offset": [1256, 1268]}, {"key": "accreditation-decision", "type": "definition", "offset": [1269, 1291]}, {"key": "to-buyer", "type": "definition", "offset": [1304, 1312]}, {"key": "at-any-time", "type": "clause", "offset": [1416, 1427]}, {"key": "for-any-reason", "type": "clause", "offset": [1597, 1611]}, {"key": "notify-the", "type": "clause", "offset": [1636, 1646]}, {"key": "own-cost", "type": "clause", "offset": [1681, 1689]}, {"key": "action-proposed", "type": "clause", "offset": [1715, 1730]}, {"key": "will-provide", "type": "clause", "offset": [1763, 1775]}, {"key": "the-request", "type": "clause", "offset": [1780, 1791]}, {"key": "to-the-supplier", "type": "clause", "offset": [1838, 1853]}, {"key": "compliance-with", "type": "definition", "offset": [1856, 1871]}, {"key": "the-data-protection-legislation", "type": "definition", "offset": [1894, 1925]}, {"key": "breach-of", "type": "definition", "offset": [2052, 2061]}, {"key": "obligations-of-the-data", "type": "clause", "offset": [2066, 2089]}, {"key": "absolute-obligation", "type": "clause", "offset": [2125, 2144]}, {"key": "not-qualified", "type": "definition", "offset": [2152, 2165]}, {"key": "provision-of-the", "type": "clause", "offset": [2179, 2195]}, {"key": "agrees-to", "type": "clause", "offset": [2234, 2243]}, {"key": "processes-and-procedures", "type": "clause", "offset": [2310, 2334]}, {"key": "unauthorised-use", "type": "definition", "offset": [2368, 2384]}], "snippet": "15.1 The Supplier will not remove any proprietary notices relating to the Buyer Data.\n15.2 The Supplier will not store or use Buyer Data except where necessary to fulfil its obligations.\n15.3 If Buyer Data is processed by the Supplier, the Supplier will supply the data to the Buyer as requested and in the format specified by the Buyer.\n15.4 The Supplier will preserve the integrity of Buyer Data processed by the Supplier and prevent its corruption and loss.\n15.5 The Supplier will ensure that any system which holds any Buyer Data complies with the security requirements prescribed by the Buyer.\n15.6 The Supplier will ensure that any system on which the Supplier holds any protectively marked Buyer Data will be accredited as specific to the Buyer and will comply with: \u25cf the government security policy framework and information assurance policy; \u25cf guidance issued by the Centre for Protection of National Infrastructure on Risk Management and Accreditation of Information Systems; and \u25cf the relevant government information assurance standard(s).\n15.7 Where the duration of the Call-Off Contract exceeds one year, the Supplier will review the accreditation status at least once a year to assess whether material changes have occurred which could alter the original accreditation decision in relation to Buyer Data. If any changes have occurred, the Supplier will re-submit such system for accreditation.\n15.8 If at any time the Supplier suspects that the Buyer Data that the Supplier has held, used, or accessed has or may become corrupted, lost, breached or significantly degraded in any way for any reason, then the Supplier will notify the Buyer immediately and will at its own cost comply with any remedial action proposed by the Buyer.\n15.9 The Supplier will provide, at the request of CCS or the Buyer, any information relating to the Supplier\u2019s compliance with its obligations under the Data Protection Legislation. The Supplier will also ensure that it does not knowingly or negligently fail to do something that places CCS or any Buyer in breach of its obligations of the Data Protection Legislation. This is an absolute obligation and is not qualified by any other provision of the Call-Off Contract.\n15.10 The Supplier agrees to use the appropriate organisational, operational and technological processes and procedures to keep the Buyer Data safe from unauthorised use or access, loss, destruction, theft or disclosure.", "hash": "d5ba09094cc38d4e8b6f1fe3ca278ddb", "id": 2}, {"samples": [{"hash": "afrIkCwhGlx", "uri": "/contracts/afrIkCwhGlx#buyer-data", "label": "Call Off Contract", "score": 30.4392776489, "published": true}, {"hash": "iWEfwI2ouXy", "uri": "/contracts/iWEfwI2ouXy#buyer-data", "label": "G Cloud 10 Call Off Contract", "score": 30.3790493011, "published": true}, {"hash": "kfhoTs3RnHu", "uri": "/contracts/kfhoTs3RnHu#buyer-data", "label": "Call Off Contract", "score": 30.2589149475, "published": true}], "size": 70, "snippet_links": [{"key": "the-supplier-must-not", "type": "clause", "offset": [0, 21]}, {"key": "notices-in", "type": "clause", "offset": [45, 55]}, {"key": "the-supplier-will", "type": "clause", "offset": [72, 89]}, {"key": "not-store", "type": "definition", "offset": [90, 99]}, {"key": "the-data", "type": "clause", "offset": [234, 242]}, {"key": "to-the-buyer", "type": "clause", "offset": [243, 255]}, {"key": "as-requested", "type": "clause", "offset": [256, 268]}, {"key": "supplier-system", "type": "definition", "offset": [304, 319]}, {"key": "secure-system", "type": "definition", "offset": [351, 364]}, {"key": "buyer-requirements", "type": "clause", "offset": [435, 453]}, {"key": "order-form", "type": "definition", "offset": [461, 471]}, {"key": "of-buyer", "type": "clause", "offset": [514, 522]}, {"key": "protectively-marked", "type": "definition", "offset": [657, 676]}, {"key": "government-data", "type": "definition", "offset": [697, 712]}, {"key": "comply-with", "type": "definition", "offset": [718, 729]}, {"key": "the-principles", "type": "clause", "offset": [731, 745]}, {"key": "security-policy-framework", "type": "definition", "offset": [753, 778]}, {"key": "government-security-classification-policy", "type": "definition", "offset": [859, 900]}, {"key": "issued-by", "type": "clause", "offset": [992, 1001]}, {"key": "the-centre", "type": "clause", "offset": [1002, 1012]}, {"key": "protection-of", "type": "definition", "offset": [1017, 1030]}, {"key": "risk-management", "type": "clause", "offset": [1058, 1073]}, {"key": "information-systems", "type": "clause", "offset": [1161, 1180]}, {"key": "national-cyber-security-centre", "type": "definition", "offset": [1256, 1286]}, {"key": "available-at", "type": "definition", "offset": [1334, 1346]}, {"key": "best-practice", "type": "clause", "offset": [1418, 1431]}, {"key": "design-and-implementation", "type": "clause", "offset": [1439, 1464]}, {"key": "system-components", "type": "clause", "offset": [1468, 1485]}, {"key": "design-principles", "type": "clause", "offset": [1526, 1543]}, {"key": "services-and", "type": "clause", "offset": [1556, 1568]}, {"key": "secure-email", "type": "clause", "offset": [1573, 1585]}, {"key": "security-requirements", "type": "clause", "offset": [1713, 1734]}, {"key": "cloud-services", "type": "definition", "offset": [1738, 1752]}, {"key": "ncsc-cloud-security-principles", "type": "definition", "offset": [1763, 1793]}, {"key": "the-buyer-will", "type": "clause", "offset": [1895, 1909]}, {"key": "requirements-for", "type": "clause", "offset": [1931, 1947]}, {"key": "if-the-supplier", "type": "clause", "offset": [1980, 1995]}, {"key": "for-any-reason", "type": "clause", "offset": [2106, 2120]}, {"key": "notify-the", "type": "clause", "offset": [2145, 2155]}, {"key": "own-cost", "type": "clause", "offset": [2191, 2199]}, {"key": "of-the-buyer", "type": "clause", "offset": [2243, 2255]}, {"key": "caused-by", "type": "clause", "offset": [2265, 2274]}, {"key": "the-action", "type": "definition", "offset": [2275, 2285]}, {"key": "remedial-action", "type": "definition", "offset": [2331, 2346]}, {"key": "by-the-buyer", "type": "clause", "offset": [2367, 2379]}, {"key": "agrees-to", "type": "clause", "offset": [2394, 2403]}, {"key": "unauthorised-use", "type": "definition", "offset": [2513, 2529]}, {"key": "clause-13", "type": "clause", "offset": [2604, 2613]}, {"key": "term-of-this", "type": "clause", "offset": [2636, 2648]}], "snippet": "The Supplier must not remove any proprietary notices in the Buyer Data. The Supplier will not store or use Buyer Data except if necessary to fulfil its obligations. If Buyer Data is processed by the Supplier, the Supplier will supply the data to the Buyer as requested. The Supplier must ensure that any Supplier system that holds any Buyer Data is a secure system that complies with the Supplier\u2019s and Buyer\u2019s security policy and all Buyer requirements in the Order Form. The Supplier will preserve the integrity of Buyer Data processed by the Supplier and prevent its corruption and loss. The Supplier will ensure that any Supplier system which holds any protectively marked Buyer Data or other government data will comply with: the principles in the Security Policy Framework at \u2587\u2587\u2587\u2587\u2587://\u2587\u2587\u2587.\u2587\u2587\u2587.\u2587\u2587/government/publications/security-policy-framework and the Government Security Classification policy at \u2587\u2587\u2587\u2587\u2587://\u2587\u2587\u2587.\u2587\u2587\u2587.\u2587\u2587/government/publications/government-security-classifications guidance issued by the Centre for Protection of National Infrastructure on Risk Management at \u2587\u2587\u2587\u2587\u2587://\u2587\u2587\u2587.\u2587\u2587\u2587\u2587.\u2587\u2587\u2587.\u2587\u2587/content/adopt-risk-management-approach and Accreditation of Information Systems at \u2587\u2587\u2587\u2587\u2587://\u2587\u2587\u2587.\u2587\u2587\u2587\u2587.\u2587\u2587\u2587.\u2587\u2587/protection-sensitive-information-and-assets the National Cyber Security Centre\u2019s (NCSC) information risk management guidance, available at \u2587\u2587\u2587\u2587\u2587://\u2587\u2587\u2587.\u2587\u2587\u2587\u2587.\u2587\u2587\u2587.\u2587\u2587/guidance/risk-management-collection government best practice in the design and implementation of system components, including network principles, security design principles for digital services and the secure email blueprint, available at \u2587\u2587\u2587\u2587\u2587://\u2587\u2587\u2587.\u2587\u2587\u2587.\u2587\u2587/government/publications/technology-code-of-practice/technology-code-of-practice the security requirements of cloud services using the NCSC Cloud Security Principles and accompanying guidance at \u2587\u2587\u2587\u2587\u2587://\u2587\u2587\u2587.\u2587\u2587\u2587\u2587.\u2587\u2587\u2587.\u2587\u2587/guidance/implementing-cloud-security-principles The Buyer will specify any security requirements for this project in the Order Form. If the Supplier suspects that the Buyer Data has or may become corrupted, lost, breached or significantly degraded in any way for any reason, then the Supplier will notify the Buyer immediately and will (at its own cost if corruption, loss, breach or degradation of the Buyer Data was caused by the action or omission of the Supplier) comply with any remedial action reasonably proposed by the Buyer. The Supplier agrees to use the appropriate organisational, operational and technological processes to keep the Buyer Data safe from unauthorised use or access, loss, destruction, theft or disclosure. The provisions of this clause 13 will apply during the term of this Call-Off Contract and for as long as the Supplier holds the Buyer\u2019s Data.", "hash": "b8e7d13a4c1d4a22c0d491363334f07d", "id": 3}, {"samples": [{"hash": "8OFDjjG4VRA", "uri": "/contracts/8OFDjjG4VRA#buyer-data", "label": "Call Off Contract", "score": 34.527721405, "published": true}, {"hash": "gqTohZGUqux", "uri": "/contracts/gqTohZGUqux#buyer-data", "label": "Call Off Contract", "score": 33.2042579651, "published": true}, {"hash": "fw2MjAIgmgA", "uri": "/contracts/fw2MjAIgmgA#buyer-data", "label": "Call Off Contract", "score": 32.9140853882, "published": true}], "size": 55, "snippet_links": [{"key": "the-supplier-must-not", "type": "clause", "offset": [5, 26]}, {"key": "notices-in", "type": "clause", "offset": [50, 60]}, {"key": "the-supplier-will", "type": "clause", "offset": [82, 99]}, {"key": "not-store", "type": "definition", "offset": [100, 109]}, {"key": "the-data", "type": "clause", "offset": [249, 257]}, {"key": "to-the-buyer", "type": "clause", "offset": [258, 270]}, {"key": "as-requested", "type": "clause", "offset": [271, 283]}, {"key": "supplier-system", "type": "definition", "offset": [324, 339]}, {"key": "secure-system", "type": "definition", "offset": [371, 384]}, {"key": "security-policies", "type": "definition", "offset": [431, 448]}, {"key": "buyer-requirements", "type": "clause", "offset": [457, 475]}, {"key": "order-form", "type": "definition", "offset": [483, 493]}, {"key": "of-buyer", "type": "clause", "offset": [541, 549]}, {"key": "protectively-marked", "type": "definition", "offset": [689, 708]}, {"key": "government-data", "type": "definition", "offset": [729, 744]}, {"key": "comply-with", "type": "definition", "offset": [750, 761]}, {"key": "the-principles", "type": "clause", "offset": [770, 784]}, {"key": "security-policy-framework", "type": "definition", "offset": [792, 817]}, {"key": "government-security-classification-policy", "type": "definition", "offset": [896, 937]}, {"key": "issued-by", "type": "clause", "offset": [955, 964]}, {"key": "the-centre", "type": "clause", "offset": [965, 975]}, {"key": "risk-management", "type": "clause", "offset": [1021, 1036]}, {"key": "sensitive-information-and-assets", "type": "definition", "offset": [1119, 1151]}, {"key": "national-cyber-security-centre", "type": "definition", "offset": [1232, 1262]}, {"key": "best-practice", "type": "clause", "offset": [1328, 1341]}, {"key": "design-and-implementation", "type": "clause", "offset": [1349, 1374]}, {"key": "system-components", "type": "clause", "offset": [1378, 1395]}, {"key": "design-principles", "type": "clause", "offset": [1436, 1453]}, {"key": "services-and", "type": "clause", "offset": [1466, 1478]}, {"key": "secure-email", "type": "clause", "offset": [1483, 1495]}, {"key": "security-requirements", "type": "clause", "offset": [1518, 1539]}, {"key": "cloud-services", "type": "definition", "offset": [1543, 1557]}, {"key": "ncsc-cloud-security-principles", "type": "definition", "offset": [1568, 1598]}, {"key": "in-respect-of", "type": "clause", "offset": [1724, 1737]}, {"key": "ethical-standards", "type": "clause", "offset": [1741, 1758]}, {"key": "the-buyer-will", "type": "clause", "offset": [1765, 1779]}, {"key": "requirements-for", "type": "clause", "offset": [1801, 1817]}, {"key": "if-the-supplier", "type": "clause", "offset": [1855, 1870]}, {"key": "for-any-reason", "type": "clause", "offset": [1981, 1995]}, {"key": "notify-the", "type": "clause", "offset": [2020, 2030]}, {"key": "own-cost", "type": "clause", "offset": [2066, 2074]}, {"key": "of-the-buyer", "type": "clause", "offset": [2118, 2130]}, {"key": "caused-by", "type": "clause", "offset": [2140, 2149]}, {"key": "the-action", "type": "definition", "offset": [2150, 2160]}, {"key": "remedial-action", "type": "definition", "offset": [2206, 2221]}, {"key": "by-the-buyer", "type": "clause", "offset": [2242, 2254]}, {"key": "agrees-to", "type": "clause", "offset": [2274, 2283]}, {"key": "unauthorised-use", "type": "definition", "offset": [2393, 2409]}, {"key": "clause-13", "type": "clause", "offset": [2490, 2499]}, {"key": "term-of-this", "type": "clause", "offset": [2522, 2534]}], "snippet": "13.1 The Supplier must not remove any proprietary notices in the Buyer Data.\n13.2 The Supplier will not store or use Buyer Data except if necessary to fulfil its obligations.\n13.3 If Buyer Data is processed by the Supplier, the Supplier will supply the data to the Buyer as requested.\n13.4 The Supplier must ensure that any Supplier system that holds any Buyer Data is a secure system that complies with the Supplier\u2019s and Buyer\u2019s security policies and all Buyer requirements in the Order Form.\n13.5 The Supplier will preserve the integrity of Buyer Data processed by the Supplier and prevent its corruption and loss.\n13.6 The Supplier will ensure that any Supplier system which holds any protectively marked Buyer Data or other government data will comply with:\n13.6.1 the principles in the Security Policy Framework: \u2587\u2587\u2587\u2587\u2587://\u2587\u2587\u2587.\u2587\u2587\u2587.\u2587\u2587/government/publications/security-policy-framework and the Government Security Classification policy:\n13.6.2 guidance issued by the Centre for Protection of National Infrastructure on Risk Management: \u2587\u2587\u2587\u2587\u2587://\u2587\u2587\u2587.\u2587\u2587\u2587\u2587.\u2587\u2587\u2587.\u2587\u2587/content/adopt-risk-management-approach and Protection of Sensitive Information and Assets: \u2587\u2587\u2587\u2587\u2587://\u2587\u2587\u2587.\u2587\u2587\u2587\u2587.\u2587\u2587\u2587.\u2587\u2587/protection-sensitive-information-and-assets\n13.6.3 the National Cyber Security Centre\u2019s (NCSC) information risk management guidance:\n13.6.4 government best practice in the design and implementation of system components, including network principles, security design principles for digital services and the secure email blueprint:\n13.6.5 the security requirements of cloud services using the NCSC Cloud Security Principles and accompanying guidance: \u2587\u2587\u2587\u2587\u2587://\u2587\u2587\u2587.\u2587\u2587\u2587\u2587.\u2587\u2587\u2587.\u2587\u2587/guidance/implementing-cloud-security-principles\n13.6.6 buyer requirements in respect of AI ethical standards.\n13.7 The Buyer will specify any security requirements for this project in the Order Form.\n13.8 If the Supplier suspects that the Buyer Data has or may become corrupted, lost, breached or significantly degraded in any way for any reason, then the Supplier will notify the Buyer immediately and will (at its own cost if corruption, loss, breach or degradation of the Buyer Data was caused by the action or omission of the Supplier) comply with any remedial action reasonably proposed by the Buyer.\n13.9 The Supplier agrees to use the appropriate organisational, operational and technological processes to keep the Buyer Data safe from unauthorised use or access, loss, destruction, theft or disclosure.\n13.10 The provisions of this clause 13 will apply during the term of this Call-Off Contract and for as long as the Supplier holds the Buyer\u2019s Data.", "hash": "f02d09bc02028310de81f44447b9094b", "id": 4}, {"samples": [{"hash": "d4EqiePpdNM", "uri": "/contracts/d4EqiePpdNM#buyer-data", "label": "Terms and Conditions for the Purchase of Works", "score": 30.313539505, "published": true}, {"hash": "jiouRksLDfj", "uri": "/contracts/jiouRksLDfj#buyer-data", "label": "Standard Terms and Conditions for the Purchase of Goods and Services", "score": 25.8637924194, "published": true}, {"hash": "kPOeJa4Narh", "uri": "/contracts/kPOeJa4Narh#buyer-data", "label": "Standard Terms and Conditions for the Purchase of Goods and Services", "score": 25.1108837128, "published": true}], "size": 11, "snippet_links": [{"key": "all-intellectual-property-rights", "type": "clause", "offset": [0, 32]}, {"key": "either-party", "type": "clause", "offset": [44, 56]}, {"key": "prior-to-the", "type": "clause", "offset": [57, 69]}, {"key": "date-of-this-agreement", "type": "clause", "offset": [70, 92]}, {"key": "such-party", "type": "clause", "offset": [116, 126]}, {"key": "other-provision-of-this-agreement", "type": "clause", "offset": [147, 180]}], "snippet": "All Intellectual Property Rights vesting in either Party prior to the date of this Agreement shall remain vested in such Party notwithstanding any other provision of this Agreement.", "hash": "1944f8919a81d45ca00b19fa55765366", "id": 6}, {"samples": [{"hash": "eQQUZSTlyFb", "uri": "/contracts/eQQUZSTlyFb#buyer-data", "label": "Terms and Conditions for the Purchase of Services", "score": 25.8637924194, "published": true}, {"hash": "kxyHmM6YfQy", "uri": "/contracts/kxyHmM6YfQy#buyer-data", "label": "Terms and Conditions for the Purchase of Services", "score": 24.880903244, "published": true}], "size": 8, "snippet_links": [{"key": "supplier-shall", "type": "clause", "offset": [4, 18]}, {"key": "the-european-union", "type": "clause", "offset": [89, 107]}, {"key": "data-protection-directive", "type": "definition", "offset": [108, 133]}, {"key": "the-data-protection-act-1998", "type": "clause", "offset": [183, 211]}, {"key": "in-relation-to", "type": "clause", "offset": [232, 246]}, {"key": "relating-to", "type": "definition", "offset": [297, 308]}, {"key": "from-the-buyer", "type": "definition", "offset": [324, 338]}, {"key": "gain-access", "type": "definition", "offset": [398, 409]}, {"key": "for-the-purposes-of", "type": "clause", "offset": [410, 429]}, {"key": "the-arrangements", "type": "clause", "offset": [445, 461]}, {"key": "contemplated-by-this-agreement", "type": "clause", "offset": [462, 492]}, {"key": "by-the-parties", "type": "clause", "offset": [553, 567]}, {"key": "in-writing", "type": "definition", "offset": [568, 578]}, {"key": "neither-supplier", "type": "clause", "offset": [586, 602]}, {"key": "the-processing", "type": "clause", "offset": [659, 673]}, {"key": "in-place", "type": "definition", "offset": [821, 829]}, {"key": "measures-to", "type": "clause", "offset": [915, 926]}, {"key": "all-personal-data", "type": "definition", "offset": [932, 949]}, {"key": "the-personal-data", "type": "definition", "offset": [1027, 1044]}, {"key": "accidental-loss", "type": "clause", "offset": [1053, 1068]}, {"key": "except-to-the-extent", "type": "clause", "offset": [1138, 1158]}, {"key": "required-by-law", "type": "clause", "offset": [1169, 1184]}, {"key": "employees-only", "type": "clause", "offset": [1312, 1326]}, {"key": "in-accordance-with", "type": "definition", "offset": [1327, 1345]}, {"key": "property-of-the-buyer", "type": "clause", "offset": [1547, 1568]}, {"key": "all-intellectual-property-rights", "type": "clause", "offset": [1585, 1617]}, {"key": "by-the-buyer", "type": "clause", "offset": [1658, 1670]}, {"key": "of-buyer", "type": "clause", "offset": [1743, 1751]}, {"key": "of-supplier", "type": "clause", "offset": [1773, 1784]}, {"key": "copyright-notices", "type": "clause", "offset": [1894, 1911]}, {"key": "right-to", "type": "definition", "offset": [1992, 2000]}, {"key": "by-supplier", "type": "clause", "offset": [2050, 2061]}, {"key": "for-the-benefit-of", "type": "definition", "offset": [2099, 2117]}, {"key": "disclosure-of", "type": "clause", "offset": [2176, 2189]}, {"key": "need-to-know-basis", "type": "definition", "offset": [2282, 2300]}, {"key": "the-performance", "type": "clause", "offset": [2325, 2340]}, {"key": "available-to", "type": "definition", "offset": [2397, 2409]}, {"key": "reasonable-notice", "type": "definition", "offset": [2419, 2436]}, {"key": "access-to-buyer-data", "type": "clause", "offset": [2505, 2525]}, {"key": "from-time-to-time", "type": "clause", "offset": [2526, 2543]}, {"key": "persons-to-whom", "type": "clause", "offset": [2614, 2629]}, {"key": "to-disclose", "type": "definition", "offset": [2647, 2658]}, {"key": "such-buyer", "type": "definition", "offset": [2659, 2669]}, {"key": "terms-of-this-agreement", "type": "clause", "offset": [2698, 2721]}, {"key": "prior-to", "type": "definition", "offset": [2758, 2766]}, {"key": "confidential-nature", "type": "clause", "offset": [2786, 2805]}, {"key": "duty-of-confidence", "type": "clause", "offset": [2834, 2852]}, {"key": "to-the-buyer", "type": "clause", "offset": [2853, 2865]}, {"key": "such-information", "type": "definition", "offset": [2880, 2896]}, {"key": "best-endeavours", "type": "definition", "offset": [2917, 2932]}, {"key": "to-ensure", "type": "clause", "offset": [2933, 2942]}, {"key": "act-or-omission", "type": "definition", "offset": [3154, 3169]}, {"key": "most-recent", "type": "definition", "offset": [3273, 3284]}, {"key": "possession-or-control", "type": "definition", "offset": [3342, 3363]}, {"key": "supplier-sub", "type": "clause", "offset": [3490, 3502]}, {"key": "the-buyer-shall", "type": "clause", "offset": [3577, 3592]}, {"key": "an-agreement", "type": "clause", "offset": [3604, 3616]}, {"key": "terms-to", "type": "definition", "offset": [3655, 3663]}, {"key": "the-undertakings", "type": "clause", "offset": [3664, 3680]}, {"key": "in-this-clause", "type": "clause", "offset": [3712, 3726]}], "snippet": "9.1 Supplier shall, and shall procure that Supplier\u2019s sub-contractors shall, comply with the European Union Data Protection Directive, the Telecoms Data Protection Directive 1997 and the Data Protection Act 1998 (the \"Legislation\") in relation to any personal data (as defined in the Legislation) relating to or originating from the Buyer or its employees to which Supplier and its sub-contractors gain access for the purposes of or pursuant to the arrangements contemplated by this Agreement.\n9.2 Supplier undertakes that except where otherwise agreed by the Parties in writing:\n9.2.1 neither Supplier nor any of its sub-contractors shall process, or direct the processing of any personal data relating to or originating from Buyer or its employees other than in the UK;\n9.2.2 Supplier and its sub-contractors each have in place now and shall on a continuing basis take all reasonable technical and organisational measures to keep all personal data relating to or originating from Buyer or its employees secure and to protect the personal data against accidental loss or unlawful destruction, alteration, disclosure or access; and\n9.2.3 except to the extent otherwise required by law, Supplier and its sub-contractors shall each act in relation to personal data relating to or originating from the Buyer or its employees only in accordance with Buyer's instructions except to the extent that Supplier can show that the instructions are not in accordance with the Legislation.\n9.3 Supplier acknowledges and agrees that Buyer Data is the exclusive property of the Buyer and that:\n9.3.1 all Intellectual Property Rights in Buyer Data is and shall remain owned by the Buyer notwithstanding any Modifications created or developed to or in respect of Buyer Data by or on behalf of Supplier or its sub-contractors; and\n9.3.2 neither Supplier nor any of its sub-contractors shall delete or remove any copyright notices contained within or relating to any Buyer Data.\n9.4 Supplier shall not have any right to nor shall it permit the:\n9.4.1 use of Buyer Data by Supplier or any sub-contractor otherwise than for the benefit of the Buyer and in accordance with this Agreement; or\n9.4.2 disclosure of any Buyer Data except to Supplier\u2019s employees or permitted sub-contractors of Supplier on a need to know basis directly concerned with the performance of its obligations and Supplier shall maintain and make available to Buyer on reasonable notice a log identifying such Supplier\u2019s employees and the extent of their access to Buyer Data from time to time; or\n9.4.3 unless required by law, disclosure of any Buyer Data to any persons to whom Supplier is able to disclose such Buyer Data in accordance with the terms of this Agreement unless such persons are made aware, prior to disclosure, of the confidential nature thereof and that they owe a duty of confidence to the Buyer in respect of such information and Supplier to use best endeavours to ensure that such persons comply with such duty; or\n9.4.4 use of Buyer Data by Supplier or any sub-contractor in any way that would be harmful to the Buyer.\n9.5 If any Buyer Data is lost or corrupted as a result of any act or omission of any of Supplier or its sub-contractors, Supplier shall restore Buyer Data at its own expense to the most recent back-up point. Buyer shall ensure that Buyer Data in its possession or control is backed up regularly in accordance with its policy on performing back-up of Buyer Data.\n9.6 Supplier shall ensure that each Supplier sub-contractor who processes personal data (as defined in the Legislation) of the Buyer shall enter into an agreement undertaking to Supplier in equivalent terms to the undertakings given by Supplier to the Buyer in this clause.", "hash": "ffbdb92ecef7080d9a251a86c7c1dd7d", "id": 7}, {"samples": [{"hash": "38g1FtwrZwh", "uri": "/contracts/38g1FtwrZwh#buyer-data", "label": "Supplier Terms", "score": 33.1032905579, "published": true}, {"hash": "8gp0g6HIY2Z", "uri": "/contracts/8gp0g6HIY2Z#buyer-data", "label": "Supplier Terms", "score": 33.0982398987, "published": true}, {"hash": "hv1QkWgqLwy", "uri": "/contracts/hv1QkWgqLwy#buyer-data", "label": "Supplier Terms", "score": 31.3154163361, "published": true}], "size": 4, "snippet_links": [{"key": "subject-to-sub", "type": "clause", "offset": [5, 19]}, {"key": "all-intellectual-property-rights", "type": "clause", "offset": [33, 65]}, {"key": "property-of-the-buyer", "type": "clause", "offset": [116, 137]}, {"key": "to-third-parties", "type": "clause", "offset": [174, 190]}, {"key": "in-such-cases", "type": "clause", "offset": [192, 205]}, {"key": "buyer-warrants", "type": "definition", "offset": [211, 225]}, {"key": "such-buyer", "type": "definition", "offset": [235, 245]}, {"key": "consent-of", "type": "clause", "offset": [268, 278]}, {"key": "relevant-third-parties", "type": "definition", "offset": [279, 301]}, {"key": "a-non", "type": "clause", "offset": [338, 343]}, {"key": "licence-to-use", "type": "clause", "offset": [368, 382]}, {"key": "during-the-term", "type": "clause", "offset": [398, 413]}, {"key": "for-the-purpose-of", "type": "definition", "offset": [414, 432]}, {"key": "the-service", "type": "clause", "offset": [444, 455]}, {"key": "represents-that", "type": "clause", "offset": [480, 495]}, {"key": "rights-of", "type": "definition", "offset": [597, 606]}, {"key": "third-party", "type": "clause", "offset": [611, 622]}, {"key": "by-the-parties", "type": "clause", "offset": [663, 677]}, {"key": "in-writing", "type": "definition", "offset": [678, 688]}, {"key": "no-personal-data", "type": "clause", "offset": [714, 730]}, {"key": "the-supplier-shall", "type": "clause", "offset": [766, 784]}, {"key": "for-buyer", "type": "definition", "offset": [826, 835]}, {"key": "in-the-event-of", "type": "definition", "offset": [842, 857]}, {"key": "damage-to-buyer", "type": "clause", "offset": [870, 885]}, {"key": "sole-and-exclusive-remedy", "type": "clause", "offset": [904, 929]}, {"key": "for-the-supplier", "type": "clause", "offset": [960, 976]}, {"key": "lost-or-damaged", "type": "clause", "offset": [1032, 1047]}, {"key": "responsible-for", "type": "clause", "offset": [1156, 1171]}, {"key": "of-buyer", "type": "clause", "offset": [1220, 1228]}, {"key": "caused-by", "type": "clause", "offset": [1234, 1243]}, {"key": "perform-services", "type": "clause", "offset": [1322, 1338]}, {"key": "related-to", "type": "definition", "offset": [1339, 1349]}, {"key": "maintenance-and", "type": "clause", "offset": [1361, 1376]}, {"key": "these-terms", "type": "clause", "offset": [1435, 1446]}, {"key": "the-buyer-shall", "type": "clause", "offset": [1454, 1469]}, {"key": "damages-and-expenses", "type": "definition", "offset": [1516, 1536]}, {"key": "legal-expenses", "type": "clause", "offset": [1559, 1573]}, {"key": "this-clause-16", "type": "clause", "offset": [1637, 1651]}], "snippet": "16.1 Subject to sub-Clause 16.2, all Intellectual Property Rights subsisting in Buyer Data are and shall remain the property of the Buyer.\n16.2 Certain Buyer Data may belong to third parties. In such cases, the Buyer warrants that all such Buyer Data is used with the consent of relevant third parties.\n16.3 The Buyer grants the Supplier a non-exclusive, royalty-free licence to use the Buyer Data during the term for the purpose of performing the Service. The Buyer warrants and represents that the Supplier\u2019s use of the Buyer Data for the purpose of performing the Service will not infringe the rights of any third party.\n16.4 Unless expressly agreed otherwise by the parties in writing, the Buyer warrants that no Personal Data exists within the Buyer Data.\n16.5 The Supplier shall follow its standard archiving procedures for Buyer Data. In the event of any loss or damage to Buyer Data, the Buyer\u2019s sole and exclusive remedy against the Supplier shall be for the Supplier to use reasonable commercial endeavours to restore the lost or damaged Buyer Data from the latest back-up of such Buyer Data maintained by the Supplier. The Supplier shall not be responsible for any loss, destruction, alteration or disclosure of Buyer Data caused by any third party (except those third parties sub-contracted by the Supplier to perform services related to Buyer Data maintenance and back-up for which it shall remain fully liable subject to these terms).\n16.6 The Buyer shall indemnify the Supplier for any claims, costs, damages and expenses (including reasonable legal expenses) incurred by the Supplier as a result of the Buyer\u2019s breach of this clause 16.", "hash": "14a0a75a91ffbe1b9173fbfba507245b", "id": 8}, {"samples": [{"hash": "4BFgf4dsx7w", "uri": "/contracts/4BFgf4dsx7w#buyer-data", "label": "Terms and Conditions Agreement", "score": 30.9653205872, "published": true}, {"hash": "84peuFzTBIa", "uri": "/contracts/84peuFzTBIa#buyer-data", "label": "Terms and Conditions Agreement", "score": 30.7627868652, "published": true}, {"hash": "kdBWk16FMtk", "uri": "/contracts/kdBWk16FMtk#buyer-data", "label": "Terms and Conditions", "score": 24.4832305908, "published": true}], "size": 4, "snippet_links": [{"key": "to-the-extent", "type": "clause", "offset": [0, 13]}, {"key": "by-seller", "type": "clause", "offset": [33, 42]}, {"key": "of-seller", "type": "clause", "offset": [62, 71]}, {"key": "the-goods", "type": "clause", "offset": [124, 133]}, {"key": "the-provision-of-services", "type": "clause", "offset": [137, 162]}, {"key": "seller-shall", "type": "clause", "offset": [178, 190]}, {"key": "for-the-buyer", "type": "clause", "offset": [213, 226]}, {"key": "resulting-from-the", "type": "clause", "offset": [248, 266]}, {"key": "entitled-to-rely", "type": "clause", "offset": [307, 323]}, {"key": "of-the-buyer", "type": "clause", "offset": [353, 365]}, {"key": "no-obligation", "type": "clause", "offset": [390, 403]}, {"key": "to-the-buyer", "type": "clause", "offset": [461, 473]}, {"key": "the-services", "type": "definition", "offset": [513, 525]}, {"key": "without-limiting-the-foregoing", "type": "clause", "offset": [527, 557]}, {"key": "actual-operating-conditions", "type": "definition", "offset": [562, 589]}, {"key": "other-conditions", "type": "definition", "offset": [593, 609]}, {"key": "by-buyer", "type": "clause", "offset": [640, 648]}, {"key": "other-provisions", "type": "definition", "offset": [686, 702]}, {"key": "affected-by", "type": "definition", "offset": [730, 741]}, {"key": "null-and-void", "type": "definition", "offset": [767, 780]}, {"key": "mutually-agreed", "type": "definition", "offset": [799, 814]}, {"key": "in-writing", "type": "definition", "offset": [820, 830]}], "snippet": "To the extent Buyer Data is used by Seller in the preparation of Seller\u2019s quotation, the selection, design or production of the Goods or the provision of Services, Buyer and not Seller shall be wholly responsible for the Buyer Data and any effects resulting from the use thereof. Seller shall be absolutely entitled to rely on the accuracy and validity of the Buyer Data and shall be under no obligation whatsoever to detect any errors in or offer improvements to the Buyer Data unless as a necessary incident of the Services. Without limiting the foregoing, if actual operating conditions or other conditions differ from those represented by Buyer in the Buyer Data, any warranties or other provisions contained herein which are affected by such conditions shall be null and void, unless otherwise mutually agreed upon in writing.", "hash": "b714024349371f09d942be0dff709645", "id": 9}, {"samples": [{"hash": "1suKZanmVvT", "uri": "/contracts/1suKZanmVvT#buyer-data", "label": "Asset Purchase Agreement (Algonquin Power & Utilities Corp.)", "score": 23.661190033, "published": true}, {"hash": "dfzhIznYfO", "uri": "/contracts/dfzhIznYfO#buyer-data", "label": "Asset Purchase Agreement", "score": 22.3306522369, "published": true}], "size": 3, "snippet_links": [{"key": "data-file", "type": "definition", "offset": [24, 33]}, {"key": "other-information", "type": "definition", "offset": [45, 62]}, {"key": "by-buyer", "type": "clause", "offset": [99, 107]}, {"key": "in-connection-with", "type": "clause", "offset": [212, 230]}, {"key": "any-service", "type": "clause", "offset": [231, 242]}, {"key": "from-time-to-time", "type": "clause", "offset": [285, 302]}, {"key": "relevant-third-party", "type": "definition", "offset": [342, 362]}, {"key": "property-of-buyer", "type": "clause", "offset": [432, 449]}, {"key": "the-case", "type": "definition", "offset": [472, 480]}, {"key": "the-foregoing", "type": "definition", "offset": [507, 520]}, {"key": "no-circumstances", "type": "clause", "offset": [528, 544]}, {"key": "pursuant-to-this-agreement", "type": "clause", "offset": [590, 616]}, {"key": "ownership-right", "type": "clause", "offset": [622, 637]}, {"key": "license-in", "type": "definition", "offset": [641, 651]}, {"key": "intellectual-property", "type": "definition", "offset": [666, 687]}, {"key": "of-the-buyer", "type": "clause", "offset": [726, 738]}], "snippet": "Any software, database, data file, record or other information owned, licensed, leased or provided by Buyer or any of its Affiliates that is provided to, or stored or accessed by, Seller or any of its Affiliates in connection with any Service, each as modified, maintained or enhanced from time to time by Buyer, any of its Affiliates or any relevant third party (collectively, the \u201cBuyer Data\u201d) shall remain the sole and exclusive property of Buyer or its Affiliates, as the case may be. In furtherance of the foregoing, under no circumstances will Seller or any of its Affiliates obtain, pursuant to this Agreement, any ownership right or license in or to (a) any Intellectual Property of Buyer or its Affiliates or (b) any of the Buyer Data", "hash": "4797f0f2a037ad11666199f2238f744c", "id": 10}], "next_curs": "ClMSTWoVc35sYXdpbnNpZGVyY29udHJhY3Rzci8LEhZDbGF1c2VTbmlwcGV0R3JvdXBfdjU2IhNidXllci1kYXRhIzAwMDAwMDBhDKIBAmVuGAAgAA==", "clause": {"children": [["no-control-over-buyer-data", "No Control over Buyer Data"], ["access-to-buyer-data", "Access to Buyer Data"], ["business-rules", "Business Rules"], ["monitoring-rights", "Monitoring Rights"], ["data-encryption", "Data Encryption"]], "size": 662, "title": "Buyer Data", "parents": [["liability", "Liability"], ["cloud-lot", "Cloud lot"], ["developments", "Developments"], ["background-to-the-agreement", "Background to the agreement"], ["by-the-buyer", "By the Buyer"]], "id": "buyer-data", "related": [["subscriber-data", "Subscriber Data", "Subscriber Data"], ["user-data", "User Data", "User Data"], ["customer-data", "Customer Data", "Customer Data"], ["buyer-information", "Buyer Information", "Buyer Information"], ["buyer", "Buyer", "Buyer"]], "related_snippets": [], "updated": "2025-07-26T06:21:18+00:00", "also_ask": ["What key protections should be included to safeguard Buyer Data from misuse or unauthorized access?", "How can the clause be negotiated to limit the seller\u2019s liability for data breaches involving Buyer Data?", "What are the most common legal pitfalls or ambiguities in Buyer Data clauses that could undermine enforceability?", "How does this clause compare to standard Buyer Data provisions in similar industry contracts?", "What evidence is typically required in court to prove a breach of Buyer Data obligations under this clause?"], "drafting_tip": "Define 'Buyer Data' precisely to avoid ambiguity; specify permitted uses to protect buyer privacy; require data security measures to ensure compliance with applicable laws.", "explanation": "The \"Buyer Data\" clause defines how information provided by the buyer, such as personal, financial, or transactional data, will be handled by the seller or service provider. Typically, this clause outlines the purposes for which buyer data may be collected, stored, and used, and may specify any restrictions on sharing such data with third parties. Its core practical function is to protect the buyer's privacy and ensure compliance with data protection laws, while clarifying the responsibilities of both parties regarding the handling of sensitive information."}, "json": true, "cursor": ""}}