Data Management and Security Sample Clauses

Data Management and Security. CENTURYLINK STRONGLY RECOMMENDS USE OF COMMERCIAL ANTI- VIRUS AND FIREWALL SOFTWARE. You are responsible for the management and security of your data, including without limitation backing up and restoring your data, managing file and print sharing, implementing procedures for accuracy of data and its transmission, and implementing security such as anti-virus and firewalls. CenturyLink is not responsible or liable for the management or security of your data, including without limitation loss of your data or back- up or restoration of your data, regardless of whether your data is maintained on CenturyLink servers or your computer or server.
Data Management and Security dishNET STRONGLY RECOMMENDS USE OF COMMERCIAL ANTI-VIRUS AND FIREWALL SOFTWARE. You are responsible for the management and security of your data, including, without limitation, backing up and restoring your data, managing file and print sharing, implementing procedures for accuracy of data and its transmission, and implementing security such as anti- virus and firewalls. dishNET is not responsible or liable for the management or security of your data, including, without limitation, loss of your data or back-up or restoration of your data, regardless of whether your data is maintained on dishNET servers or your computer or server.
Data Management and Security. WE STRONGLY RECOMMEND USE OF COMMERCIAL ANTI-VIRUS AND FIREWALL SOFTWARE. You are responsible for the management and security of your data, including without limitation backing up and restoring your data, managing file and print sharing, implementing procedures for accuracy of data and its transmission, and implementing security such as anti-virus and firewalls. We are not responsible for the management of your data, including without limitation loss of your data or back-up or restoration of your data. We are not responsible for the security of your data on your computer or server.
Data Management and Security. Proper data management is critical to ensuring client confidentiality above all else. In addition, when properly used for case management, data can ensure that the survivor is always receiving comprehensive treatment and opportunities, which can empower the survivor to avoid being back in the same situation in the future. Lastly, secure and confidential data can be analyzed to inform the community about what is happening with their people. An efficient data system is achieved through the following:  Use only minimal personal identifiers and information on the forms. The organization should only collect information that is pertinent to referrals. Remember that if someone else were to find the data, the information could be used against the survivor in the news, in court, in public shaming, etc. Therefore, if information does not need to be written down or collected, then be respectful of this risk.  Forms should be kept in solid folders (not clear) so that others cannot view information recorded on the forms. Completed forms should never be left unattended or in areas where they may be viewed or obtained by other staff.  All completed screening forms should be stored in a secure, designated location.
Data Management and Security. (a) Client warrants that it has the right to use and to have Provider use on behalf of Client and data provided to Provider or its Affiliates by Client including specifically customer names, identifying information, addresses and other contact information and related personal information (“Data”). Client further warrants that it will designate on the applicable Order if Data provided pursuant to that Order is subject to HIPAA, Xxxxx-Xxxxx- Xxxxxx or other statutes providing enhanced data protection or requiring enhanced data security procedures.
Data Management and Security. OCE will store all collected data and information on a secure server that is aligned with Shared Services Canada protocols. • All collected data and information will be password protected. • Access to collected data and information in its raw format, except for the project performance data listed in Appendix 1, will be limited to OCE staff directly involved in the AVIN, unless otherwise specified by the data and information owner. • Project performance may be shared with Ontario and in accordance with the OCE’s privacy policy and the Agreement between Ontario and OCE. • No person, organization, specific product or service will be singled out or identified in any public reporting, unless approval is obtained from this person or organization and in accordance with the OCE’s privacy policy (xxxx://xxx.xxx-xxxxxxx.xxx/privacy-policy). NOTE: Reported data and information is the sole responsibility of the entity that makes them available. OCE will not be liable for false data or misrepresentation of the data. Additionally, OCE and Ontario will not be liable for any loss or damage that result from the reporting process. NOTE: Participants will retain full ownership of the data and information provided to OCE.
AutoNDA by SimpleDocs
Data Management and Security. MHz Holdings LLC STRONGLY RECOMMENDS USE OF COMMERCIAL ANTI-VIRUS AND FIREWALL SOFTWARE. You are responsible for the management and security of your data, including without limitation backing up and restoring your data, managing file and print sharing, implementing procedures for accuracy of data and its transmission and implementing security such as anti-virus and firewalIs. MHz Holdings LLC is not responsible or liable for the management or security of your data, including without limitation loss of your data or back-up or restoration of your data, regardless of whether your data is maintained on MHz Holdings LLC servers or your computer or server.
Data Management and Security. Contractor shall adhere to a security program that is based on industry best practices and is aligned with NIST 800-53 (Moderate), COBIT, ISO 27001 and 27002, and SSAE 18 guidelines, and the requirements and Contractor representations of this Master Agreement. As part of the security program, Contractor follows a policy, standard and procedure format for establishing, updating, and adhering to policy and procedures for the governance of security and data protection. Contractor shall provide to the requesting entity a copy of its annual security review of processes and attestation of compliance, specifically including Contractor’s SOC 2 Type II reports for its Services, including applications and the associated environments, and PCI Attestation of Compliance (AOC), at the request of Lead State or a Participating Entity.
Data Management and Security. 1. Safeguards to Protect City Data. Provider shall implement and maintain appropriate physical, technical, administrative, and organizational safeguards in accordance with industry best practices and applicable law to protect the security, confidentiality, availability, and integrity of City Data, including, but not limited to, the safeguards described in this Rider.
Time is Money Join Law Insider Premium to draft better contracts faster.