D ata Security Sample Clauses

D ata Security. The Provider agrees to abide by and maintain adequate data security measures, consistent with industry standards and technology best practices, to protect Student Data from unauthorized disclosure or acquisition by an unauthorized person. The general security duties of Provider are set forth below. Provider may further detail its security programs and measures in Exhibit “F” hereto. These measures shall include, but are not limited to:
AutoNDA by SimpleDocs
D ata Security. 42Gears and any third-party service provider that 42Gears may engage shall employ commercially reasonable physical, administrative, and technical safeguards to secure any Customer Data in its possession, custody, or control from unauthorized use or disclosure.
D ata Security. Unaro shall implement and maintain commercially reasonable technical and organisational security measures designed to meet the following objectives: (i) ensure the security and confidentiality of Customer Data in the custody of and processed by Unaro; (ii) protect against any anticipated threats or hazards to the security or integrity of such Customer Data; (iii) protect against unauthorised access to or use of such Customer Data; and (iv) ensure that Unaro’s return or disposal of such Customer Data is performed in a manner consistent with Unaro’s obligations under items (i)-(iii).
D ata Security. Vendor shall take all appropriate legal, organizational and technical measures to protect against unlawful and unauthorized processing of Personal Data or Phase Four Confidential Information (“Confidential Data”). Vendor shall maintain reasonable operating standards and security procedures, and shall use its best efforts to secure Confidential Data through the use of appropriate physical and logical security measures including, but not limited to, appropriate network security and encryption technologies, and the use of reasonable user identification or password control requirements, including multiple-factor authentication, strong passwords, session time-outs, and other security procedures as may be issued from time to time by Phase Four. If requested by Phase Four at any time during the term of this Agreement, Vendor shall provide Phase Four with a copy of Vendor’s then current security policy. Vendor shall promptly notify Phase Four in the event that Vendor learns or has reason to believe that any person or entity has breached or attempted to breach Vendor’s security measures, or gained unauthorized access to Confidential Data (“Information Security Breach”). Upon any such discovery, Vendor will (a) investigate, remediate, and mitigate the effects of the Information Security Breach, and (b) provide Phase Four with assurances reasonably satisfactory to Phase Four that such Information Security Breach will not recur. If Phase Four determines that notices (whether in Phase Four’s or Vendor’s name) or other remedial measures (including notice, credit monitoring services, fraud insurance and the establishment of a call center to respond to customer inquiries) are warranted following a Security Breach, Vendor will, at Phase Four’s request and at Vendor’s cost and expense, undertake the aforementioned remedial actions.
D ata Security. Calm will maintain reasonable timely written notice of such disclosure requirement to administrative, physical and technical safeguards as determined within Calm’s discretion that are designed to prevent unauthorized access, use or disclosure of Customer Data and Service Data.

Related to D ata Security

  • Data Security The Provider agrees to utilize administrative, physical, and technical safeguards designed to protect Student Data from unauthorized access, disclosure, acquisition, destruction, use, or modification. The Provider shall adhere to any applicable law relating to data security. The provider shall implement an adequate Cybersecurity Framework based on one of the nationally recognized standards set forth set forth in Exhibit “F”. Exclusions, variations, or exemptions to the identified Cybersecurity Framework must be detailed in an attachment to Exhibit “H”. Additionally, Provider may choose to further detail its security programs and measures that augment or are in addition to the Cybersecurity Framework in Exhibit “F”. Provider shall provide, in the Standard Schedule to the DPA, contact information of an employee who XXX may contact if there are any data security concerns or questions.

  • E7 Security E7.1 The Authority shall be responsible for maintaining the security of the Authority’s Premises in accordance with its standard security requirements. The Contractor shall comply with all security requirements of the Authority while on the Authority’s Premises, and shall ensure that all Staff comply with such requirements.

  • Data Security Requirements A. Data Transport. When transporting Confidential Information electronically, including via email, the data will be protected by:

  • Network Security 10.1 Protection of Service and Property. Each Party shall exercise the same degree of care to prevent harm or damage to the other Party and any third parties, its employees, agents or End User Customers, or their property as it employs to protect its own personnel, End User Customers and property, etc.

  • Data Security and Privacy 12.1 SERVICE PROVIDER acknowledges the importance of Data Security and agrees to adhere to the Terms and Conditions of the Data Security Policy of IIMC.

  • Data Security and Privacy Plan As more fully described herein, throughout the term of the Master Agreement, Vendor will have a Data Security and Privacy Plan in place to protect the confidentiality, privacy and security of the Protected Data it receives from the District. Vendor’s Plan for protecting the District’s Protected Data includes, but is not limited to, its agreement to comply with the terms of the District’s Bill of Rights for Data Security and Privacy, a copy of which is set forth below and has been signed by the Vendor. Additional components of Vendor’s Data Security and Privacy Plan for protection of the District’s Protected Data throughout the term of the Master Agreement are as follows:

  • Confidentiality and Data Security (a) The Custodian agrees to keep confidential, and to cause its employees and agents to keep confidential, all records of the Funds and information relating to the Funds, including without limitation information as to their respective shareholders and their respective portfolio holdings, unless the release of such records or information is made (i) in connection with the services provided under this Agreement, (ii) at the written direction of the applicable Fund or otherwise consented to, in writing, by the respective Funds, (iii) in response to a request of a governmental, regulatory or self-regulatory authority or agency or pursuant to a subpoena, court order or other legal process, in each case with respect to which the Custodian has determined, on the advice of counsel, that it is required to comply, or (iv) where the Custodian has determined, on the advice of counsel, that the failure to release such information would expose the Custodian to civil or criminal contempt proceedings; provided in the case of clause (iii) or (iv) the Custodian provides the applicable Fund written notice of such requirement to release such records or information, to the extent such notice is permitted. The foregoing shall not be applicable to any information that is publicly available when provided and shall cease to be applicable to any information that thereafter becomes publicly available, other than through a breach of this Section 10(a), or that is independently derived by any party hereto without the use of any information derived in connection with the services provided under this Agreement. Notwithstanding the foregoing but subject to Section 10(d), (1) the Custodian may use information regarding the Funds in connection with certain functions performed on a centralized basis by the Custodian, its affiliates or its or their service providers (including audit, accounting, risk, legal, compliance, sales, administration, product communication, relationship management, compilation and analysis of customer-related data and storage) and disclose such information to its affiliates and to its or their service providers who are subject to the confidentiality obligations hereunder with respect to such information, but only for the purpose of servicing the Funds in connection with the relationship contemplated by this Agreement or providing additional services to the Funds, and (2) the Custodian may aggregate Fund or Portfolio data with similar data of other customers of the Custodian (“Aggregated Data”) and may use Aggregated Data so long as such Aggregated Data represents such a sufficiently large sample that no Fund or Portfolio data can be identified either directly or by inference or implication.

  • JOB SECURITY 23.01 Subject to the willingness and capacity of individual employees to accept relocation and retraining, the Employer will make every reasonable effort to ensure that any reduction in the work force will be accomplished through attrition.

  • Card Security This Card may be used without a personal identification number (PIN) to make purchases. Therefore, if you lose your Card, someone will be able to use it. Protect your Card and PIN at all times.

  • Mobile Deposit Security You will complete each deposit promptly. If you are unable to complete your deposit promptly, you will ensure that your mobile device remains securely in your possession until the deposit has been completed. It is your responsibility to establish and maintain procedures to safeguard against unauthorized deposits. You will notify us immediately by telephone with written confirmation if you learn of any loss or theft of original checks. You will ensure the safety and integrity of original checks from the time of receipt until the time of destruction. If warranted in our reasonable judgment, we may audit and monitor you, and you agree to cooperate with us to permit such monitoring, to confirm that you have satisfied your obligations under this Agreement.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!