We use cookies on our site to analyze traffic, enhance your experience, and provide you with tailored content.

For more information visit our privacy policy.

Data Privacy and Data Security Sample Clauses

Data Privacy and Data SecurityDuring the Term, the terms of the Data Sharing Agreement shall apply with respect to the Partiescompliance with data privacy and data security Laws and obligations.
Data Privacy and Data Security. SAP and Customer agree on the provisions of the “Data Processing Agreement for SAP Cloud Services” in Schedule D for the Cloud Service, subject to the provisions in the AWS Addendum to Data Processing Agreement for SAP Cloud Services in effect as of the effective date (“AWS Addendum”) which has been attached to this Order Document as Schedule D-1. In any case of deviation between the AWS Addendum and the Data Processing Agreement for SAP Cloud Services, the provisions of the AWS Addendum shall prevail. Schedule D and Schedule D-1 are part of the Agreement by way of reference and form a written agreement for commissioned data processing. In the case of electronic contract conclusion, SAP recommends that after entering into this Agreement, Customer documents in writing for Customer’s records the commissioned data processing agreement referring to this present Agreement, as follows: Customer may, citing the contract number for this present Order Document, request, and SAP will thereupon provide, a hard copy, signed by SAP, of the content of this present Agreement, which Customer will countersign and return to SAP. The Cloud Service includes the platform on which Authorized Users can access the Cloud Service (“Authorized Users”). SAP may collect and process data or content collected from or submitted by individual Authorized Users accessing the platform directly as well as transaction log data collected by the Cloud Service (“Authorized User Data”). Authorized User Data that is personal data will be handled in accordance the terms of the Privacy Statement located within the Cloud Service and available at xxxxx://xxxxxxx.xxx/pages/privacy.html, which Authorized Users must accept. The Data Processing Agreement for SAP Cloud Services shall not apply to SAP’s collection and use of Authorized User Data. If Customer receives access requests or other requests related to rights in personal data related to such Authorized User Data, Customer shall forward such requests to SAP without undue delay. These supplemental terms and conditions (“the Supplement”) are part of an agreement for certain SAP Cloud services (“Agreement”) between SAP and Customer and apply solely to Ruum by SAP (the “Cloud Service”).
Data Privacy and Data Security. 11.1 Each Party will comply with its respective legal obligations under applicable Data Protection Legislation in its processing of any personal information exchanged under this Agreement and comply with any Data Processing Agreement (where this has been separately put in place). 11.2 At all times the Parties shall maintain adequate administrative, technical, and physical measures, controls, tools, systems, policies and procedures in accordance with good data security industry practice. 11.3 Supplier will notify invoX in writing about any security breach or cyber-attack affecting or which may affect any IT infrastructure or data or facilities owned, leased or used by Supplier, which may affect Supplier’s ability to supply Goods and/or Services or otherwise comply with its obligations under the Agreement without undue delay and in any event within 24 hours after Supplier becomes aware of or suspects that a security breach and/or cyber-attack has occurred. Such notification will be, in the first instance, sent by e-mail to the following e-mail address: xxxxx@xxxxxxxxxxxxxxxxxx.xxx and immediately followed up by telephone to +00 00 0000 0000.
Data Privacy and Data Security. Franchisee agrees to fully comply with all policies and procedures regarding the collection, storage, use, processing and transfer of personal data (i.e., any information which identifies or is capable of identifying an individual) that Hyatt may promulgate from time to time. Additionally, Franchisee agrees to execute any agreements or other documents, and to take any actions, that Hyatt may require Franchisee and all similarly situated franchisees (subject to Reasonable Deviations) to execute or take from time to time in furtherance of the implementation of Hyatt’s data privacy or data security compliance program.
Data Privacy and Data Security. Service Provider Agency agrees to protect NJDOH data collected, used, and maintained through the professional services provided pursuant to this MOA pursuant to applicable federal and State law, standards and policies of the State of New Jersey Office of Information Technology, as amended and supplemented, and accessed at xxxx://xxx.xxxxx.xx.xx/it/services/policies.shtml. Service Provider Agency further agrees to protect NJDOH data collected, used, and maintained according to the standards set forth at Attachment C, incorporated herein by reference.
Data Privacy and Data Security. (a) The Acquiror Parties and their respective Subsidiaries take at least industry standard steps to ensure that the Personal Information Processed by or on behalf of them are protected against loss and unauthorized access, use, modification, processing, disclosure or other misuse, including by implementing and monitoring compliance with appropriate technical and physical security measures, except as would not reasonably be expected to be material to the Acquiror Parties, taken as a whole. (b) To the Knowledge of the Acquiror Parties, in connection with the Processing of Personal Information, the Acquiror Parties and their Subsidiaries are not in violation of (i) any Privacy and Data Security Laws; (ii) their written privacy and data security policies and notices; and (iii) the requirements related to data privacy or security of any Contract to which any of them is a party, except as would not reasonably be expected to be material to the Acquiror Parties, taken as a whole.
Data Privacy and Data Security. Each of Maple Leaf Group Companies has established, with respect to and for the Maple Leaf Business, privacy policies that are in conformance in all material respects with reputable industry practice and all Applicable Law, including Personal Data Laws. At all times when conducting the Maple Leaf Business, each of Maple Xxxx.Xxxx B.V. and Maple Xxxx.Xxxx LLC has provided, with respect to and for the Maple Leaf Business, accurate notice of its privacy practices on all of its websites (and through mobile applications and other client-side and web interface products); these notices have not contained any material omissions and have not been misleading, deceptive or in violation of Applicable Law, including Personal Data Laws. Each of Maple Leaf Group Companies has complied in all material respects with and is in material compliance with (i) Applicable Law, including Personal Data Laws, (ii) all requirements of self-regulatory organizations, (iii) its internal and external privacy policies, and (iv) any contractual obligations and consumer-facing statements made by or on behalf of Maple Xxxx.Xxxx B.V. or Maple Xxxx.Xxxx LLC (including any such statements on its Web site, through mobile applications and other client-side and web interface products, and in any marketing or promotional materials) relating to its use, collection, retention, storage, disclosure, transfer, disposal, and other processing of any PII; and the execution, delivery and performance of this Agreement will not result in a material breach or violation of any of the foregoing. None of Maple Leaf, any of its Affiliates or any Maple Leaf Group Companies has received, and to the knowledge of Maple Leaf, there has been no, complaint to any Governmental Authority, or any Action against, any Maple Leaf Group Company by any private party or any Governmental Authority, regarding the collection, use, retention, storage, security, transfer, disposal, disclosure or other processing of PII by any Maple Leaf Group Company for the Maple Leaf Business. Each of Maple Leaf Group Companies has implemented and maintains reasonable and appropriate disaster recovery and security plans, procedures and facilities and has taken other reasonable steps consistent with industry practices of companies offering similar services to safeguard the confidential information, PII, and information technology systems utilized in the operation of the Maple Leaf Business (“Maple Leaf IT Systems”), from unauthorized or illegal acces...
Data Privacy and Data SecurityXxxxxx agrees to comply with the data privacy and data security requirements in Annex C attached hereto.
Data Privacy and Data Security. (a) Since the Look Back Date, no Group Company or, to the Company’s Knowledge, any third party Processing Group Company Data for or on behalf of a Group Company has experienced a Security Incident that has resulted in material liability for the Group Companies. Since the Look Back Date, no Group Company has received any claim or notice from any party that a Security Incident may have occurred or is being investigated and no Group Company is or has been required under any Data Security Requirement to notify any Person, Governmental Entity, or other third party of a Security Incident. No Group Company is aware of any circumstance that may result in any of the foregoing. (b) No Group Company or, to the Company’s Knowledge, any of their service providers in connection with their Processing of Group Company Data has, since the Look Back Date, been subject to, or received any notice of or audit request relating to, any Action relating to the Processing of Group Company Data that constitutes Personal Information, the security of IT Systems, or any actual or alleged non-compliance with any Data Security Requirement. No Person has alleged in writing that a Group Company has failed to comply with any Data Security Requirement. (c) The Group Companies have established, and are, and have been in compliance in all material respects with written information security programs that, accounting for the Group Companies’ scale and industry, (i) are designed to implement and monitor reasonable and appropriate administrative, technical and physical safeguards for the security, confidentiality, and integrity of transactions, the IT Systems and Group Company Data; (ii) are designed to protect in all material respects against unauthorized access to the IT Systems, Group Company Data, and the systems of any third party service providers that have access to Group Company Data or IT Systems; (iii) periodically monitors for threats to the confidentiality or security of Group Company Data and intrusions into IT Systems (including if established through a third-party provider); and (iv) to the extent applicable, complies with PCI DSS. (d) The IT Systems (i) are in good working condition and, to the Company’s Knowledge, contain no Malicious Code and are sufficient for the immediate and currently anticipated future needs of the Group Companies, including as to capacity, scalability and ability to process current and anticipated peak volumes in a timely manner, and (ii) include a sufficie...
Data Privacy and Data Security. Client acknowledges and agrees that Client will have access to certain data and information regarding the Participants taking part in each Class, including Participant Recordings (“Participant Data”). Client agrees to use all Participant Data solely for purposes of providing the Classes in accordance with the terms of this Agreement and all Guidelines. In particular, all use by Client of Participant Data will be subject to LENA’s then-current data privacy policy for Clients of the Program (“Client Data Privacy Policy”). XXXX may collect and use Participant Data in accordance with the terms of LENA’s then-current privacy policy for Participants in the Program. Notwithstanding the foregoing, XXXX will have the right to capture and analyze Participant Data and other data or information collected through any Class or the Services and Resources that is non-personally identifiable (data or information that does not identify, and cannot be used to reasonably identify, an natural person as the source thereof) (“Program Data”) for any lawful business purpose without any duty or obligation to Client or any third party.