Data and Data Security Sample Clauses

Data and Data Security. 7.1. Each party retains ownership of its Data.
AutoNDA by SimpleDocs
Data and Data Security. (a) As between Licensor and Licensee, (i) Licensor is the owner of all Hilton Data and (ii) Licensee is the owner of all Licensee Data. Unless otherwise specified, to the extent that any data may fall within the definitions of both Hilton Data and Licensee Data, the use by a Party of such data shall be in accordance with the rights and restrictions applicable to data owned by such Party, without regard to the restrictions applicable to the same data to the extent owned by the other Party.
Data and Data Security. Section 14.2(b) of the Existing Agreement is hereby deleted and replaced with the following: “Subject to all terms and conditions herein, including this Section 14.2(b), Licensor grants to Licensee during the Term a limited, nontransferable right to use the Hilton Data: (i) to engage in the promotion of the Licensed Vacation Ownership Business and (ii) for research and analysis in furtherance of Licensee’s internal business purposes, in each case solely in connection with Licensee’s operation of the Licensed Vacation Ownership Business. Except as otherwise expressly set forth herein, Licensee shall not use the Hilton Data (including in aggregate form) for any purpose. Without limiting the generality of the foregoing, in no event shall Hilton Data (including in aggregate form) be: (x) disclosed, sold, assigned, leased or otherwise provided to any Hilton Competitors or other third parties (including any non-Subsidiary Licensee Parties and Separate Operations) by Licensee, or (y) used by Licensee in the promotion or operation of any Separate Operation (including any Diamond Property or Bluegreen Property) unless and until such property has been converted to a Licensed Vacation Ownership Property in accordance with the terms of the Existing Agreement, in each case except as otherwise expressly permitted pursuant to the Existing Agreement or this Amendment or with Licensor’s prior written consent. Notwithstanding the above rights, Licensor is not required to provide any Hilton Data to Licensee to the extent such provision would result in Licensor’s violation of any applicable Laws, Privacy Policies or Data Security Policies.”
Data and Data Security. 7.1 NCR Voyix has implemented reasonable and appropriate security policies and procedures designed to protect the security of Company Data and Customer Data in NCR Voyix’s possession, and to prevent the unauthorized access, use, storage, and disposal of such data. Such policies and procedures include: (a) maintaining an appropriate level of physical security controls over its data center including, but not limited to, appropriate alarm systems, fire suppression, and access controls (including off-hour controls); (b) periodically testing its systems for security breach vulnerabilities; and (c) using commercially reasonable efforts to protect its systems from unauthorized access, including the use of firewalls and, where appropriate, data encryption technologies. Company Data and Customer Data may be subject to regulations and examination by auditors and regulatory agencies. NCR Voyix will use reasonable efforts to prevent the disclosure of Company Data and Customer Data to third parties and its employees who do not have a need to know, but may disclose it to the extent compelled by process of law, provided that Company is given notice (unless providing such notice is prohibited by law). Notwithstanding the foregoing, Company acknowledges that NCR Voyix cannot guarantee that unauthorized third parties will never be able to defeat these measures or use Company Data and Customer Data for improper purposes.
Data and Data Security. In the Course Portal, Agency will have access to certain information about Enrolled Agency Clients, which may include: names and addresses, phone number, date of birth, gender, marital and education status, veteran and disabled status, number and dependents living in the household, income information, race and ethnicity information, home purchase steps completed, first time homebuyer and first generation homebuyer status, and Course information (collectively, the “Enrolled Agency Client Information”). Agency shall at all times provide industry DocuSign Envelope ID: 29AC90C7-19F8-4798-B006-279A30CF74C4 standard security measures to ensure that all Enrolled Agency Client Information that is accessed or accessible by Agency is maintained and used (a) in compliance with applicable law, (b) only in connection with uses specified immediately below, and (c) in a manner that prevents the unauthorized disclosure of, unauthorized use of, unauthorized access to, misappropriation of, loss of, or alteration of any Enrolled Agency Client Information while it is directly or indirectly in the possession or control of Agency. Such security measures shall include, without limitation, taking those steps Agency would take to protect the confidentiality of its own most valuable confidential information and implementing and maintaining appropriate administrative, technical and physical safeguards to protect against reasonably anticipated threats or hazards to the privacy, security, integrity and/or confidentiality of Enrolled Agency Client Information. Agency shall notify Framework immediately of any known or suspected security breaches or holes. As between Framework and Agency, Framework shall be the owner of the Enrolled Agency Client Information. The Enrolled Agency Client Information may only be used by Agency (i) to make contact with the subject Enrolled Agency Clients in direct connection with the counseling services being provided to them by Agency, and (ii) for the preparation and filing of any reports required by applicable law. Agency shall never use, or enable another person or organization to use, any of the Enrolled Agency Client Information for any commercial purpose, including without limitation, for marketing, surveys, reviews, outreach, evaluations, or sales of products or services. Upon the termination of this Agreement, Agency shall maintain or dispose of the Enrolled Agency Client Information in its possession or control in compliance with applicable law and...
Data and Data Security 

Related to Data and Data Security

  • Data Security The Provider agrees to utilize administrative, physical, and technical safeguards designed to protect Student Data from unauthorized access, disclosure, acquisition, destruction, use, or modification. The Provider shall adhere to any applicable law relating to data security. The provider shall implement an adequate Cybersecurity Framework based on one of the nationally recognized standards set forth set forth in Exhibit “F”. Exclusions, variations, or exemptions to the identified Cybersecurity Framework must be detailed in an attachment to Exhibit “H”. Additionally, Provider may choose to further detail its security programs and measures that augment or are in addition to the Cybersecurity Framework in Exhibit “F”. Provider shall provide, in the Standard Schedule to the DPA, contact information of an employee who XXX may contact if there are any data security concerns or questions.

  • Privacy and Data Protection 8.1 The Receiving Party undertakes to comply with South Africa’s general privacy protection in terms Section 14 of the Xxxx of Rights in connection with this Bid and shall procure that its personnel shall observe the provisions of such Act [as applicable] or any amendments and re-enactments thereof and any regulations made pursuant thereto.

  • Cybersecurity and Data Protection The Company and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are reasonably believed by the Company to be adequate in all material respects for, and operate and perform as required in connection with, the operation of the business of the Company and its Subsidiaries as currently conducted and, to the Company’s knowledge, are free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants, except as would not individually or in the aggregate reasonably be expected to result in a Material Adverse Effect. The Company and its Subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (“Personal Data”)) used in connection with the business of the Company and its Subsidiaries as currently conducted, and, to the knowledge of the Company, there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same, except for such failures as would not individually or in the aggregate reasonably be expected to result in a Material Adverse Effect. The Company and its Subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification, except for such failures as would not individually or in the aggregate reasonably be expected to result in a Material Adverse Effect.

Time is Money Join Law Insider Premium to draft better contracts faster.