Data and Information Security Sample Clauses

Data and Information Security. The customs authorities of Member States shall put in place adequate measures related to the accessibility to, authenticity, integrity and privacy of information in the application of ICT, including in the course of exchanging data between customs authorities.
AutoNDA by SimpleDocs
Data and Information Security. 9.1. By providing and/or submitting any individual's Personal Data to Taskize, the Client for itself and on behalf of each Obliged Group Entity confirms that appropriate consent and authority has been received from such individuals to the collection, use, storage, disclosure and other processing of such Personal Data:
Data and Information Security. 16.1 Safeguarding of WG Data
Data and Information Security. 13.1 COMPANY's personal data protection rules are available at xxxxx://xxxxxxxxxxxxxx.xxx/privacy_policy.pdf at xxxxx://xxxxxxxxxxxxxx.xxx/privacy_policy.pdf COMPANY is very concerned about the protection of personal data. The personal data collected by COMPANY in the context of the present document will be subject to automated processing in accordance with applicable law. All information collected as part of the provision of the service is recorded by COMPANY, which is a data controller, unless otherwise provided in Privacy policy. It is essential for the operation of the services offered by COMPANY In order to exercise one or more of his/her rights, the User must provide proof of identity and contact the person in charge of data protection at COMPANY (via Company’s Support)).
Data and Information Security. 3.1 The SUPPLIER shall ensure that security is maintained to the level required by Schedule 2-17 of the Contract, and subject to the relevant audit rights at Clause 39 of the Contract.
Data and Information Security. 13.1 The COMPANY's personal data protection rules are available on the website xxxxx://xxxxxxxxxxx.xxx. The COMPANY is very serious about the protection of personal data. The personal data collected by the COMPANY in the context of the present document will be subject to automated processing in accordance with applicable law and the COMPANY’s personal data protection rules. All information collected as part of the provision of the service is recorded by the COMPANY, which is a data controller. It is essential for the operation of the services offered by the COMPANY In order to exercise one or more of their rights, the User must provide proof of identity and contact the person in charge of data protection at the COMPANY (via Service Support at xxxxxxx@xxxxxxxxxxx.xxx or writing to Xxxxx Xxxxx, Building A, the Opus tower by Omnyat, Dubai, The United Arab Emirates).
Data and Information Security. 8.1 You provide Ecoplay and his partners data at the creation of the Account as well as any other information placed in the Game Service at Your own risk. Though Ecoplay undertakes all efforts for ensuring confidentiality of those data which are not intended for public viewing , it is necessary to consider that no security measures are perfect and they can be bypassed.
AutoNDA by SimpleDocs
Data and Information Security. 1. LLVision will take reasonable technical measures and other necessary measures to protect your information security in accordance with the provisions of laws and administrative regulations as well as the mandatory requirements of national standards. However, there are certain unknown and uncertain data security risks in Internet data transmission, storage and conversion, which may lead to various consequences, including but not limited to data loss, leakage, damage, unreadability or unextractability. You confirm that you are clearly aware of and agree to accept such risks and consequences arising from the Internet and that you have taken appropriate measures (such as data backup) to minimize losses when such risks occur.
Data and Information Security. 13.1 COMPANY's personal data protection rules are available on the website https:// xxxxxxxxxxxxx.xx.xxxxx/terms/mygames_privacy. COMPANY is very concerned about the protection of personal data. The personal data collected by COMPANY in the context of the present document will be subject to automated processing in accordance with applicable law and the COMPANY’s personal data protection rules. All information collected as part of the provision of the service is recorded by COMPANY, which is data controller. It is essential for the operation of the services offered by COMPANY In order to exercise one or more of his/her rights, the User must provide proof of identity and contact the person in charge of data protection at COMPANY (via Service Support at xxxxx://xxxxxxx.xx.xxxxx/ or writing to Barbara Xxxxxxxxxxx 000, 0000 XX, Xxxxxxxxx, xxx Xxxxxxxxxxx). In the event of a complaint, it is possible to contact the authority of the User’s country of residence. If the User resides in France, he/she may oppose at any time any commercial canvassing correspondence and may also register on the list of opposition to telephone canvassing on xxx.xxxxxxx.xx. Such User can also contact CNIL at xxx.xxxx.xx.
Data and Information Security. Softcat places great emphasis on security in all aspects of business particularly on the confidentiality, integrity, availability of information and as such has developed, implemented and maintained a security management plan which complies with ISO27001 and ISO27002. Due to the ever changing security landscape and threats which IT security presents, Softcat audits and improves this plan at least twice a year. Softcat’s status as a security reseller as a business we are fortunate to be party to new products which significantly change and improve the way in which our security is maintained. The Security Management Plan (as well as the Business Continuity/Disaster Recovery Plan) is part of the over-arching IT policy which is owned by the Operations Director who has Board-level responsibility for ensuring its maintenance and continual improvement. Wherever systems exist which contain business information, they all have appropriate BC/DR plans in place in order to ensure availability. It is mandatory for all staff and sub-contractors to read and sign the over-arching IT policy which dictates how they must conduct themselves when making use of company IT systems either on premise or working remotely. All users of IT systems are familiar with the security operating procedures governing their use. They receive appropriate security training, and are aware of local processes for reporting issues of security concern. All of the staff who manage and maintain the secure configuration of IT systems, and those with access to information assets, are appropriately trained, are aware of incident reporting, and the minimum standards relating to the handling of protectively marked data The Plan addresses the actions required to meet the prevailing threat to our business, its assets and those of our customers. Softcat’s policy is to treat all customer products as if they contain data or information. They will therefore be subject to the policy above and dealt with in accordance with the processes described below. This process will ensure the confidentiality and integrity of the data. Controlling access to our premises is achieved through a combination of the following:- All visitors (customers, sub-contractors) and staff report to reception and are signed in and signed out. All staff use an automatic access control fob in order to gain access into any of our offices. All visitors are issued with a temporary access control fob, visitor pass and temporary access to controlled a...
Time is Money Join Law Insider Premium to draft better contracts faster.