DATA SECURITY AND PROTECTION. The Contractor will hold County Information, as defined below, in the strictest confidence and will comply with all applicable County security and network resources policies, as well as all local, state and federal laws and regulatory requirements concerning data privacy and security. The Contractor must develop, implement, maintain, continually monitor and use appropriate administrative, technical and physical security measures to control access to and to preserve the confidentiality, privacy, integrity and availability of all electronically maintained or transmitted information received from or created or maintained on behalf of the County. For purposes of this provision, and as more fully described in this Contract and in the County’s Non-Disclosure and Data Security Agreement (NDA), “County Information” includes, but is not limited to, electronic information; documents; data; images; financial records; personally identifiable information; personal health information (PHI); personnel, educational, voting, registration, tax and assessment records; information related to public safety; County networked resources; and County databases, software and security measures that are created, maintained, transmitted or accessed to perform the Work under this Contract.
DATA SECURITY AND PROTECTION. The Contractor shall hold FW Information in the strictest confidence and comply with all applicable FW security and network resources policies as well as all local, state and federal laws or regulatory requirements concerning data privacy and security. The Contractor shall develop, implement, maintain, continually monitor and use appropriate administrative, technical and physical security measures to preserve the confidentiality, privacy, integrity and availability of all electronically maintained or transmitted FW Information received from, created or maintained on behalf of FW and strictly control access to FW Information. For purposes of this provision, and as more fully described in this Contract and FW’s Non-Disclosure and Data Security Agreement (“NDA”), “FW Information” (also referred to as “FW Data” or “data”) includes, but is not limited to, electronic information, documents, data, images, and records including, but not limited to, financial records, personally identifiable information, Personal Health Information (PHI), personnel, educational, registration, tax or assessment records, information related to public safety, FW networked resources, and FW databases, software and security measures which is created, maintained, transmitted or accessed to perform the work under this Contract.
DATA SECURITY AND PROTECTION. 6.1 The Recipient must use best practice methods to keep all Data which is in the power, possession or control of the Recipient secure and protected from unauthorised access, misuse, damage, destruction, unauthorised disclosure or modification, or theft.
6.2 Subject to clause 6.3 below, the Recipient must not distribute or release the Data to any third party, and must make sure that no one is allowed to take or send the Data to any location other than a location under the control of the Recipient without the Administering Institution’s prior written permission.
6.3 The Recipient may disclose the Data to:
(a) those of its employees, officers, students and contractors who:
(i) have a need to access the Data for the Purpose;
(ii) are named on the Application Form; and
(iii) who have agreed to use the Data in accordance with the terms of this Agreement (Authorised Users); and
(b) Authorised Collaborators, on condition that the Administering Institution has confirmed in writing to the Recipient that the Authorised Collaborator has executed an Australian Genomics Data Access and Sharing Agreement with Administering Institution which governs the Authorised Collaborator’s use of the Data for the Purpose.
6.4 The Recipient is responsible for monitoring and ensuring that all Authorised Users comply with the terms of this Agreement and will be liable for any breaches by Authorised Users.
6.5 The Recipient must immediately notify the Administering Institution if any Authorised User ceases to have a legitimate reason to continue to access the Data under the terms of this Agreement (whether due to cessation or transfer of employment, change of duties or project or any other reason).
6.6 If the Recipient wishes to disclose the Data to a person or third party who is not named on the Application Form as an Authorised User or Authorised Collaborator, the Recipient must re-submit the Application Form or otherwise obtain the Administering Institution’s prior written consent to such disclosure of the Data.
6.7 In the event that Recipient becomes aware of a Data Breach (or suspected Data Breach) or any other use or disclosure of the Data that is inconsistent with this Agreement, the Recipient must:
(a) notify Australian Genomics immediately by email to: xxxxxxxx@xxxxxxxxxxxxxxxxxx.xxx.xx; and
(b) comply with the procedures set out in the Data Breach Policy, as applicable.
6.8 Without limiting the Recipient’s obligation to comply with the procedures set out in the Data Breach Po...
DATA SECURITY AND PROTECTION. 16.1 The Service Provider shall:
(a) implement and maintain the security and business continuity procedures set out in Schedule 3 and ensure that at all times it has in place appropriate security procedures to prevent the unauthorised disclosure, destruction, damage, loss or alteration of Data, including any procedures or changes to the procedure set out in Schedule 3 notified from time to time by the Network Operators’ Representative; and
(b) take such steps as all or any of the Network Operators may reasonably require to enable them to comply with their obligations under the Data Protection Xxx 0000, as amended from time to time (the DPA), and any other applicable statutory obligations relating to Data and, upon request from any Network Operator, shall provide that Network Operator with such information as it may require to satisfy itself that the Service Provider has taken such steps.
16.2 The Service Provider shall reconstitute any Data which is lost, destroyed or damaged to the extent it is reasonably able from any backups of the Data which it has access to. The Service Provider shall bear the reasonable costs of such reconstitution to the extent the Data was lost, destroyed or damaged as a result of its negligence or breach of its obligations under this Agreement. Each Network Operator shall assist the Service Provider to the extent it is reasonably able by providing and procuring that Users and any other relevant third parties provide the Service Provider with such back up copies of the Data as may exist.
16.3 The Parties acknowledge that the Service Provider shall be the data processor (as defined under the DPA) of each Network Operator in respect of its processing (as defined under the DPA) (processing) of Data. Accordingly, the Service Provider shall have no liability whatsoever to any person (including, without limitation, to any data subject, as defined under the DPA) in respect of any processing of Data carried out under this Agreement by the Service Provider in its capacity as data processor of each Network Operator.
DATA SECURITY AND PROTECTION. 6.1 Each Party will process data (whether Contract Data, Party Data or Services Data), which may include personal data (such as the personal data of end users or a Party's staff), for the purposes of performing its obligations and exercising its rights under or in connection with this Agreement.
6.2 When acting as a data processor, the relevant Party shall:
(a) process Controller Data:
(i) only on the documented instructions of the data controller. For the purposes of this Agreement, those instructions are as set out in this Clause 6, the parts of the CDSP Service Description applicable to the UK Link User Services, or as otherwise notified in writing by the data controller to the data processor. The data processor reserves the right to charge the data controller for any material change or addition to the instructions set out in this Agreement; and
(ii) as required by European Union or English law applicable to the data processor, in which case the data processor shall first inform the data controller of the legal requirement, unless that law prohibits such prior notification;
(b) not engage any sub-processor if such engagement will have a material adverse effect on the data controller (and the relevant data controller hereby authorises the data processor to engage a sub-processor, provided such engagement will not have a material adverse effect on the data controller);
(c) not transfer any Controller Data to any country or territory outside the European Economic Area without obtaining the prior written consent of the data controller and provided that such transfer also complies with Data Protection Law;
(d) implement appropriate technical and organisational measures to ensure the security of the Controller Data, including protection against unauthorised or unlawful processing and against accidental loss, destruction or damage; and
(e) permit the data controller, or a third party auditor acting on the data controller's behalf and bound by a confidentiality agreement that is acceptable to the data processor, to conduct, at the data controller's cost, annual audits concerning the data processor’s compliance with this Agreement. The data controller is entitled to more frequent audits if this is required by Data Protection Law. The data processor may provide sufficient evidence of its compliance with these procedures in lieu of conducting any such audits. The CDSP's information security arrangements for the purposes of the DSC from time to time shall operate a...
DATA SECURITY AND PROTECTION. The Contractor shall hold FW Information in the strictest confidence and comply with all applicable FW security and network resources policies as well as all local, state and federal laws or regulatory requirements concerning data privacy and security. The Contractor shall develop, implement, maintain, continually monitor and use appropriate administrative, technical and physical security measures to preserve the confidentiality, privacy, integrity and availability of all electronically maintained or transmitted FW Information received from, created or maintained on behalf of FW and strictly control access to FW Information. For purposes of this provision, and as more fully described in this Contract and FW’s Non-Disclosure and Data Security Agreement (“NDA”), “FW Information” (also referred to as “FW Data” or “data”) includes, but is not limited to, electronic information, documents, data, images, and records including, but not limited to, financial records, personally identifiable information, Personal Health Information (PHI), personnel, educational, registration, tax or assessment records, information related to public safety, FW networked resources, and FW databases, software and security measures which is created, maintained, transmitted or accessed to perform the work under this Contract.
a) F W’s Non-Disclosure and Data Security Agreement (NDA). The Contractor shall require that an authorized Contractor designee, and all key employees, agents or subcontractors working on-site at FW facilities or otherwise performing non-incidental work under this Contract, sign the NDA (attached as an Exhibit hereto) prior to performing any work or permitting access to FW networked resources, application systems or databases under this Contract. Copies of the signed NDAs shall be available to the FW Project Officer upon request.
DATA SECURITY AND PROTECTION. You shall be bound by the Cyber Security and Data Protection Terms and Conditions published/located at xxxxx://xxx.xxxxxx.xxx/our-business/suppliers (or such other website/webpage as may be determined by Axiata Group Berhad from time to time) which may be varied from time to time, which are incorporated by reference in these Axiata General Terms and Conditions.
DATA SECURITY AND PROTECTION. 6.1 The Parties acknowledge that for the purposes of the Data Protection Legislation, the Client is the Data Controller and Eckoh is the Data Processor of the Personal Data.
6.2 Xxxxx and the Client hereby agree to comply with their obligations in relation to Personal Data as set out in Schedule 1.
6.3 The Client is entitled, on giving at least thirty (30) days’ notice to Xxxxx, to inspect or appoint representatives to inspect all facilities, equipment, records, documents and electronic data relating to the Processing of Personal Data by Xxxxx under this clause 6 and Schedule 1. Any audit will be conducted so as not to disrupt Xxxxx’s day to day operations and will be subject to the Client covering Xxxxx’s reasonable costs and complying with all security, confidentiality and safety requirements notified by Eckoh.
6.4 The requirement under clause 6.3 to give notice will not apply if an audit is required by a Regulatory Body due to suspected breach by Xxxxx of the Data Protection Legislation in relation to the Processing of Personal Data under this Agreement or the Client otherwise reasonably believes in good faith that Eckoh is in material breach of any of its obligations under this clause 6 or Schedule 1.
6.5 This clause 6 shall survive the termination of this Agreement and shall continue for a period of one (1) year following the destruction or return of all Personal Data Processed by Eckoh under this Agreement.
DATA SECURITY AND PROTECTION. 1 . All data collected pursuant to this MOU shall:
a. be de-identified by the DCSC (or its designee) to the maximum extent possible (e .g ., participant data for compensation purposes only will not be de-identified);
DATA SECURITY AND PROTECTION. 1. The FRMC is responsible for developing data security and protection procedures. Such procedures will be agreed upon and set forth in writing prior to any data collection under this LOA. At a minimum, such procedures will require that data:
a. be de-identified by the FRMC (or its designee) to the maximum extent possible so that the identity of the Crew Member cannot be discovered;
b. be stored in de-identified form in electronic format on a secure server; and
c. be released only by the PRP (or ARP) (in de-identified format) to an individual or entity other than the FRMC, Company, Union, or the PRPs (or ARPs) only upon obtaining prior written permission from the Company and the Union, or when required by law. If either party fails to provide written authorization, the PRP (or the ARP) will not make the proposed disclosure unless required by law. The PRP (or ARP) will provide written notice to the Company and the Union prior to making any disclosure required by law.
2. The Crew Member protections set forth in Article 26.C of the Agreement will apply to data and reports collected pursuant to this LOA, subject to the following limitations as provided in the FRMP Guidelines: • Must not involve intentional disregard for safety; • Must not involve intentional violation of FARs; • Must not involve criminal activity; • Must not involve substance abuse; and • Must not have been intentionally falsified.
3. The data collected by the FRMC and the analyses of the PRP (or the ARP) will not be used by the Company or Union to support their respective efforts to change existing, proposed or future law or regulations. Neither party will use the data collected or analyses of the PRP (or the ARP) in litigation of any type, including but not limited to grievances and System Board of Adjustment proceedings conducted pursuant to Articles 19, 20, and 21 of the Agreement, without the written consent of the Company and the Atlas EXCO Chairman.
4. The Company may use de-identified data collected by the FRMC and the analyses of the PRP to support the approval of its FRMS by the FAA. In the event that the Company's FRMS submission utilizes analyses, conclusions, recommendations, or opinions of the PRP, which led to the preparation of a report on the same subject by the ARP, the Company, in its FRMS submission to the FAA, must include the analyses, conclusions, recommendations, or opinions from both research partners. Under no circumstances will data that has not been de-identified be...