Data and Security Sample Clauses

Data and Security. [SECTION INSTRUCTIONS: the JBE should modify the provisions below depending on the specific privacy, data security, and IT requirements for its project.]
Data and Security. If this Contract involves Confidential Information, the following terms apply:
Data and Security. [The JUDICIAL COUNCIL should modify the provisions below depending on the specific privacy, data security, and IT requirements for its project.]
Data and Security. 4.1 Customer grants Tessian and its Affiliates a worldwide, non-exclusive, sublicensable, non-transferable license to receive, store and process Customer Data and other data derived from Customer’s use of the POV Services, including Threat Intelligence and Usage Data, to (i) provide to Customer, the POV Services, threat insights and other reports; (ii) identify and analyze global threat trends, and (iii) enhance, improve and develop the POV Services. 4.2 Customer, (i) reserves the right to remove Tessian’s access to Customer Data at any time during the POV Period; and (ii) acknowledges that if such permissions are removed in accordance with (i) above, either prior to the delivery of a Report and/or prior to the end of the POV Period, Customer agrees and understands that Tessian will not be able to, respectively, produce Reports and/or effectively provide POV Services. 4.3 All personal data shall be processed in accordance with Tessian’s Privacy Policy and the Data Protection Exhibit. Tessian will delete its copies of Customer Data if the Customer decides not to proceed with a Tessian product. 4.4 Tessian will comply with the security standards set out in the Data Security Exhibit.
Data and Security. 15.1. The Customer is responsible for ensuring proper backup of the Customer's data unless otherwise agreed in writing. 15.2. The Customer is responsible for the accuracy and integrity of any data processed by Apport when utilising the Services and in connection with the Customer's transfer, migration and/or conversion of the Customer's data to or from the Services. 15.3. The Customer may not require Apport's employees to personally accept any terms relating to the Customer's IT security policy.
Data and Security. 22.1 Supplier may collect and use any data from the Supply gathered from sensors, instruments, monitors, data collection unit or other industrial control or SCADA devices (“Data”) to support and develop its processes, products, software or services. Any enrichment, report or derivative work developed or derived from such Data shall belong exclusively to the Supplier. 22.2 Buyer will be responsible for the data connections and other integration of the Equipment or Software in Buyer’s systems including protection of the same against cyber security threats.
AutoNDA by SimpleDocs
Data and Security. 3.1 Onshore Tencent and Leju undertake that any cooperation under this Agreement shall be conditioned on protecting the security of Users’ data and that there would be no infringement of Users’ legitimate rights and interests. It is further agreed that any cooperation under this Agreement which uses the platform or product of a party to this Agreement (such party, the “Platform Party”) shall comply with each applicable product policy, agency policy, platform rule and user agreement, as published by the Platform Party or any of its Affiliates from time to time. The parties shall negotiate and cooperate with each other to make relevant adjustments to their respective platforms, products and services with respect to any data collection or disclosure that requires authorization from the Users following the cooperation. 3.2 Each party undertakes that it shall only use the data received from the other party for uses that are within the scope of the cooperation hereunder, shall not provide any relevant data or materials to any third party, and without the written consent of the other party, shall not independently develop any products based on the data received from the other party.
Data and Security. Subject to the survival of the Sections identified in Section 8.5, above, if this Agreement is terminated prior to expiration of the term specified in Article 2, this Agreement shall be of no further force or effect. Contractor shall transfer title to City, and deliver in the manner, at the times, and to the extent, if any, directed by City, any work in progress, completed work, supplies, equipment, and other materials produced as a part of, or acquired in connection with the performance of this Agreement, and any completed or partially completed work which, if this Agreement had been completed, would have been required to be furnished to City.
Data and Security a. The protection and safe handling of your data and that of your customers is one of Xxxxxx's primary concerns. While we build our systems and Services with this in mind, as a person with access to this data you must also share this concern while using the Services and conducting your business. b. There are several types of information (collectively, "Information") that Helcim uses to provide the Services: i. Personal Information – means information about a specific, identifiable individual.
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!