Compliance with Privacy and Information Security Requirements Sample Clauses

Compliance with Privacy and Information Security Requirements. (A) Each Party shall comply with all Privacy Laws in connection with Processing Personal Information pursuant to the Agreement. S&SC shall promptly inform Customer if, in S&SC’s opinion, an instruction from Customer infringes applicable Privacy Laws.
AutoNDA by SimpleDocs
Compliance with Privacy and Information Security Requirements. 4.1 Supplier shall comply with all Privacy Laws.
Compliance with Privacy and Information Security Requirements. (a) Service Provider shall comply with applicable Requirements;
Compliance with Privacy and Information Security Requirements a. Compliance with Laws. CrowdStrike shall comply with all Privacy and Security Laws, the EU-US Privacy Shield Framework and the Swiss-US Privacy Shield Framework as set forth by the US Department of Commerce regarding the collection, use, and retention of Personal Data from the European Economic Area, Switzerland, and the United Kingdom, as applicable. & U R Z G 6 W U L N Hhtt¶ps:/V/www.croSwdsUtrikLe.coYm/prDivacFy-no\ xxxx/. TQo the extent necessary to comply with Privacy and Security Laws, including but not limited to when Customer is a controller of Personal Data processed by CrowdStrike originating in the European Union, Switzerland, or the United Kingdom, the Data Protection Addendum set forth R W L here V K D O O D S S O \ W R & U R Z G 6 W U L N b. Safeguards. CrowdStrike shall maintain appropriate technical and organizational safeguards commensurate with the sensitivity of the Customer Data and Personal Data processed by it on & X V W R P H U ¶ V E H K D O I Z K L F K D such Customer Data and Personal Data and protect such Customer Data and Personal Data against accidental or unlawful destruction or accidental loss, alteration, unauthorized disclosure R U D F F H V V Z K L F K V X E V W D Q W L D 6 H F X U L W \ & R Q W U R O V I R U & U R Z 5. Customer Obligations. Customer, along with its Affiliates, represents and warrants that: (i) it owns or has a right of use from a third party, and controls, directly or indirectly, all of the V R I W Z D U H K D U G Z P DV U· H DZ QK GH U FH R P CrowdStrike Tools will be installed or that will be the subject of, or investigated during, the Offerings, (ii) to the extent required under any federal, state, or local U.S. or non-US laws (e.g., Computer Fraud and Abuse Act, 18 U.S.C. § 1030 et seq., Title III, 18 U.S.C. 2510 et seq., and the Electronic Communications Privacy Act, 18 U.S.C. § 2701 et seq.) it has authorized CrowdStrike to access the Systems and process and transmit data through the Offerings and CrowdStrike Tools in accordance with this Agreement and as necessary to provide and perform the Offerings, (iii) it has a lawful basis in having CrowdStrike investigate the Systems, process the Customer Data and the Personal Data; (iv) that it is and will at all relevant times remain duly and effectively authorized to instruct CrowdStrike to carry out the Offerings, and (v) it has made all necessary disclosures, obtained all necessary consents and government authorizations required under applicable law to...
Compliance with Privacy and Information Security Requirements a. Compliance with Laws. CrowdStrike shall comply with all Privacy and Security Laws, the EU-US Privacy Shield Framework and the Swiss-US Privacy Shield Framework as set forth by the US Department of Commerce regarding the collection, use, and retention of Personal Data from the European Economic Area, Switzerland, and the United Kingdom, as applicable. CrowdStrike’s privacy notice may be found at xxxx://xxx.xxxxxxxxxxx.xxx/privacy-notice/. To the extent necessary to comply with Privacy and Security Laws, including but not limited to when Customer is a controller of Personal Data processed by CrowdStrike originating in the European Union, Switzerland, or the United Kingdom, the Data Protection Addendum set forth here xxxxx://xxx.xxxxxxxxxxx.xxx/data-protection-agreement/ shall apply to CrowdStrike’s processing of such Customer Personal Data.
Compliance with Privacy and Information Security Requirements 

Related to Compliance with Privacy and Information Security Requirements

  • Compliance with Audit and Reporting Requirements; Maintenance of Records A. The Grantee shall submit to an audit of funds paid through this Grant Agreement and shall make all books, accounting records and other documents available at all reasonable times during the term of this Grant Agreement and for a period of three (3) years after final payment for inspection by the State or its authorized designee. Copies shall be furnished to the State at no cost

  • Electronic and Information Resources Accessibility and Security Standards a. Applicability: The following Electronic and Information Resources (“EIR”) requirements apply to the Contract because the Grantee performs services that include EIR that the System Agency's employees are required or permitted to access or members of the public are required or permitted to access. This Section does not apply to incidental uses of EIR in the performance of the Agreement, unless the Parties agree that the EIR will become property of the State of Texas or will be used by HHSC’s clients or recipients after completion of the Agreement. Nothing in this section is intended to prescribe the use of particular designs or technologies or to prevent the use of alternative technologies, provided they result in substantially equivalent or greater access to and use of a Product.

  • Compliance with Data Privacy Laws The Company and its Subsidiaries are, and at all prior times were, in material compliance with all applicable state and federal data privacy and security laws and regulations, including, without limitation, HIPAA, and the Company and its Subsidiaries are in compliance with the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679) as applicable (collectively, the “Privacy Laws”). To ensure compliance with the Privacy Laws, the Company and its Subsidiaries have in place, comply with, and take appropriate steps reasonably designed to ensure compliance in all material respects with their policies and procedures relating to data privacy and security and the collection, storage, use, disclosure, handling, and analysis of Personal Data (the “Policies”). The Company and its Subsidiaries have, to the knowledge of the Company, at all times made all disclosures to users or customers required by applicable laws and regulatory rules or requirements, and none of such disclosures made or contained in any Policy have, to the knowledge of the Company, been inaccurate or in violation of any applicable laws and regulatory rules or requirements in any material respect. The Company further certifies that neither it nor any Subsidiary: (i) has received notice of any actual or potential liability under or relating to, or actual or potential violation of, any of the Privacy Laws, and has no knowledge of any event or condition that would reasonably be expected to result in any such notice; (ii) is currently conducting or paying for, in whole or in part, any investigation, remediation, or other corrective action pursuant to any Privacy Law; or (iii) is a party to any order, decree, or agreement that imposes any obligation or liability under any Privacy Law.

Time is Money Join Law Insider Premium to draft better contracts faster.