Data Privacy and Data Security Sample Clauses

Data Privacy and Data Security. During the Term, the terms of the Data Sharing Agreement shall apply with respect to the Partiescompliance with data privacy and data security Laws and obligations.
AutoNDA by SimpleDocs
Data Privacy and Data Security. SAP and Customer agree on the provisions of the “Data Processing Agreement for SAP Cloud Services” in Schedule D for the Cloud Service, subject to the provisions in the AWS Addendum to Data Processing Agreement for SAP Cloud Services in effect as of the effective date (“AWS Addendum”) which has been attached to this Order Document as Schedule D-1. In any case of deviation between the AWS Addendum and the Data Processing Agreement for SAP Cloud Services, the provisions of the AWS Addendum shall prevail. Schedule D and Schedule D-1 are part of the Agreement by way of reference and form a written agreement for commissioned data processing. In the case of electronic contract conclusion, SAP recommends that after entering into this Agreement, Customer documents in writing for Customer’s records the commissioned data processing agreement referring to this present Agreement, as follows: Customer may, citing the contract number for this present Order Document, request, and SAP will thereupon provide, a hard copy, signed by SAP, of the content of this present Agreement, which Customer will countersign and return to SAP. The Cloud Service includes the platform on which Authorized Users can access the Cloud Service (“Authorized Users”). SAP may collect and process data or content collected from or submitted by individual Authorized Users accessing the platform directly as well as transaction log data collected by the Cloud Service (“Authorized User Data”). Authorized User Data that is personal data will be handled in accordance the terms of the Privacy Statement located within the Cloud Service and available at xxxxx://xxxxxxx.xxx/pages/privacy.html, which Authorized Users must accept. The Data Processing Agreement for SAP Cloud Services shall not apply to SAP’s collection and use of Authorized User Data. If Customer receives access requests or other requests related to rights in personal data related to such Authorized User Data, Customer shall forward such requests to SAP without undue delay. These supplemental terms and conditions (“the Supplement”) are part of an agreement for certain SAP Cloud services (“Agreement”) between SAP and Customer and apply solely to Ruum by SAP (the “Cloud Service”).
Data Privacy and Data Security. 11.1 Each Party will comply with its respective legal obligations under applicable Data Protection Legislation in its processing of any personal information exchanged under this Agreement and comply with any Data Processing Agreement (where this has been separately put in place). 11.2 At all times the Parties shall maintain adequate administrative, technical, and physical measures, controls, tools, systems, policies and procedures in accordance with good data security industry practice. 11.3 Supplier will notify invoX in writing about any security breach or cyber-attack affecting or which may affect any IT infrastructure or data or facilities owned, leased or used by Supplier, which may affect Supplier’s ability to supply Goods and/or Services or otherwise comply with its obligations under the Agreement without undue delay and in any event within 24 hours after Supplier becomes aware of or suspects that a security breach and/or cyber-attack has occurred. Such notification will be, in the first instance, sent by e-mail to the following e-mail address: xxxxx@xxxxxxxxxxxxxxxxxx.xxx and immediately followed up by telephone to +00 00 0000 0000.
Data Privacy and Data Security. Franchisee agrees to fully comply with all policies and procedures regarding the collection, storage, use, processing and transfer of personal data (i.e., any information which identifies or is capable of identifying an individual) that Hyatt may promulgate from time to time. Additionally, Franchisee agrees to execute any agreements or other documents, and to take any actions, that Hyatt may require Franchisee and all similarly situated franchisees (subject to Reasonable Deviations) to execute or take from time to time in furtherance of the implementation of Hyatt’s data privacy or data security compliance program.
Data Privacy and Data Security. Each of Maple Leaf Group Companies has established, with respect to and for the Maple Leaf Business, privacy policies that are in conformance in all material respects with reputable industry practice and all Applicable Law, including Personal Data Laws. At all times when conducting the Maple Leaf Business, each of Maple Xxxx.Xxxx B.V. and Maple Xxxx.Xxxx LLC has provided, with respect to and for the Maple Leaf Business, accurate notice of its privacy practices on all of its websites (and through mobile applications and other client-side and web interface products); these notices have not contained any material omissions and have not been misleading, deceptive or in violation of Applicable Law, including Personal Data Laws. Each of Maple Leaf Group Companies has complied in all material respects with and is in material compliance with (i) Applicable Law, including Personal Data Laws, (ii) all requirements of self-regulatory organizations, (iii) its internal and external privacy policies, and (iv) any contractual obligations and consumer-facing statements made by or on behalf of Maple Xxxx.Xxxx B.V. or Maple Xxxx.Xxxx LLC (including any such statements on its Web site, through mobile applications and other client-side and web interface products, and in any marketing or promotional materials) relating to its use, collection, retention, storage, disclosure, transfer, disposal, and other processing of any PII; and the execution, delivery and performance of this Agreement will not result in a material breach or violation of any of the foregoing. None of Maple Leaf, any of its Affiliates or any Maple Leaf Group Companies has received, and to the knowledge of Maple Leaf, there has been no, complaint to any Governmental Authority, or any Action against, any Maple Leaf Group Company by any private party or any Governmental Authority, regarding the collection, use, retention, storage, security, transfer, disposal, disclosure or other processing of PII by any Maple Leaf Group Company for the Maple Leaf Business. Each of Maple Leaf Group Companies has implemented and maintains reasonable and appropriate disaster recovery and security plans, procedures and facilities and has taken other reasonable steps consistent with industry practices of companies offering similar services to safeguard the confidential information, PII, and information technology systems utilized in the operation of the Maple Leaf Business (“Maple Leaf IT Systems”), from unauthorized or illegal acces...
Data Privacy and Data Security. In order to ensure the secure operation of the service, USB – in addition to the internet provider Monzoon – may collect various data (e.g. internet protocol, IP addresses and technical data such as logs recording duration of use, etc.). Such technical data cannot be directly attributed to a specific individual, however. IP addresses and technical data are stored by USB for a certain period of time (max. six months) and then deleted. Data is only collected, stored and processed insofar as this is necessary for the use of the service and permitted by statutory regulations or mandated by law. The data is not passed on to unauthorised third parties. Users should note that the wireless internet connection provided by this service is not secure. Connections may be intercepted by third parties. The user is responsible for installing and using any additional technical tools that seem necessary to protect their data. The user is responsible for the security of their computer or networked devices. USB recommends installing anti-virus software and a personal firewall to protect a private device from unauthorised access and damage.
Data Privacy and Data Security a. Except for Contact Tracers and Social Support Coordinators performing tasks directed by XXXXX, XXXXX agrees that RUSPH will not have access to CommCare or to any data or information in CommCare. XXXXX agrees to protect the privacy and confidentiality of personally identifiable information it collects for Contract Tracers and Social Support Coordinators recruited pursuant to this MOA. XXXXX shall not use or disclose personally identifiable information of Contract Tracers and Social Support Coordinators recruited under this agreement except to NJDOH or a Local Health Department in performance of this MOA. b. Only to the extent RUSPH supplies any equipment to the Contact Tracers and Social Support Coordinators, RUSPH agrees to comply with applicable federal and State law, as well as standards and policies of the State of New Jersey Office of Information Technology, as amended and supplemented, and accessed at xxxxx://xxx.xx.xxx/it/services/policies.shtml and xxxxx://xxx.xxxx.xx.xxx/it/docs/ps/NJ_Statewide_Information_Security_ Manual.pdf and telecommuting resources for COVID-19 and monthly bulletins issued by NJ Office of Homeland Security and Preparedness at xxxxx://xxx.xxxxx.xx.xxx/ c. Equipment and Telecommuting Security. RUSHP shall ensure that any equipment used by Contact Tracers shall at a minimum include the following technology requirements for the Contact Tracers: access to reliable/trusted Wi-Fi/internet connection; PC with Windows 10, Antivirus Protection: Windows Defender and Windows Firewall; or Mac with Apple OS X 10.13, Antivirus Protection: Sophos; PC with audio capability or a headset required. In addition, XXXXX agrees to require each Contract Tracer and Social Support Coordinator to sign and abide by the additional terms and conditions set forth at Attachment D, incorporated herein by reference. RUSPH shall ensure that all equipment it provides to the Contract Tracers and Social Support Coordinators, and any personal devices the Contact Tracer or Social Support Coordinator brings to use, complies with the security requirements set forth herein and in Attachment D including security requirements for use of any RUSPH or personal devices and telecommuting.
AutoNDA by SimpleDocs
Data Privacy and Data Security. Service Provider Agency agrees to protect NJDOH data collected, used, and maintained through the professional services provided pursuant to this MOA pursuant to applicable federal and State law, standards and policies of the State of New Jersey Office of Information Technology, as amended and supplemented, and accessed at xxxx://xxx.xxxxx.xx.xx/it/services/policies.shtml. Service Provider Agency further agrees to protect NJDOH data collected, used, and maintained according to the standards set forth at Attachment C, incorporated herein by reference.
Data Privacy and Data Security. (a) Except as would not, individually or in the aggregate, reasonably be expected to be material to the Company: (i) the Company owns, leases or licenses all IT Systems and such IT Systems are sufficient for the Company’s business, and the Company has taken reasonable efforts to maintain the IT Systems owned by the Company; (ii) the IT Systems are free of any and all “back door,” “time bomb,” “Trojan horse,” “worm,” “drop dead device,” “virus” or other software routines, malware or hardware components that permit unauthorized access, disruption, modification, restriction, or loss of such IT Systems (or any parts thereof) or any data or software; (iii) the Company has implemented commercially reasonable disaster recovery plans with respect to the IT Systems, and the IT Systems are protected by commercially reasonable security, firewall and anti-virus protection hardware and software; and (iv) since January 1, 2019, there has not been any material failure or security incident involving any IT System. (b) The Company: (i) is, and since January 1, 2019 has been, in compliance in all material respects with all applicable Data Security Requirements; and (ii) has commercially reasonable security measures and policies in place to protect the personally identifiable information and stored, accessed or otherwise processed by them or on their behalf, together with any material Company trade secrets, from unauthorized access, use, or disclosure. Since January 1, 2019, there has not occurred any material breach of security, phishing incident, ransomware or malware attack or other incident, in each case, in which confidential or sensitive information, payment card data, or any personally identifiable information that was in the possession or control of the Company was accessed, disclosed or exfiltrated in an unauthorized manner (a “Security Incident”), and the Company has not received any written notices or complaints from any Person or been the subject of any Action with respect thereto since January 1, 2019. (c) With respect to each Security Incident (if any), (i) the Company notified all affected Persons of such Security Incident in accordance with the terms of any Contract with such affected Person and applicable Law and (ii) the Company has used its commercially reasonable efforts to remediate the underlying problems, facts and circumstances giving rise to such Security Incident as required by the Data Security Requirements.
Data Privacy and Data Security. (a) The Acquiror Parties and their respective Subsidiaries take at least industry standard steps to ensure that the Personal Information Processed by or on behalf of them are protected against loss and unauthorized access, use, modification, processing, disclosure or other misuse, including by implementing and monitoring compliance with appropriate technical and physical security measures, except as would not reasonably be expected to be material to the Acquiror Parties, taken as a whole. (b) To the Knowledge of the Acquiror Parties, in connection with the Processing of Personal Information, the Acquiror Parties and their Subsidiaries are not in violation of (i) any Privacy and Data Security Laws; (ii) their written privacy and data security policies and notices; and (iii) the requirements related to data privacy or security of any Contract to which any of them is a party, except as would not reasonably be expected to be material to the Acquiror Parties, taken as a whole.
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!