Data Security Audits Sample Clauses

Data Security Audits. Passport shall audit its compliance against data protection and information security standards on a regular basis. Upon Customer’s written request, and subject to obligations of confidentiality, Passport will temporarily make available to Customer a summary of its most recent relevant audit report, and/or other documentation reasonably required by Customer which Passport makes generally available to its Customers, so that Customer can verify Passport’s compliance with this Agreement subject to confidentiality rights and concerns. Passport shall provide accurate and honest responses to Customer’s reasonable questions related to data protection and information security measures or controls arising out of or related to the audit report or related to Passport’s compliance with this Agreement, as well as any applicable laws or industry standards, within ten (10) business days.
AutoNDA by SimpleDocs
Data Security Audits. Arctic Wolf shall audit its compliance against data protection and information security standards in accordance with the controls and processes set forth in its SOC2 Report. Upon Customer’s written request, and subject to obligations of confidentiality, Arctic Wolf will temporarily make available to Customer a summary of its most recent relevant audit report, and/or other documentation reasonably required by Customer which Arctic Wolf makes generally available to its Customers, so that Customer can verify Arctic Wolf’s compliance with this Agreement. Arctic Wolf shall provide accurate and honest responses to Customer’s reasonable questions related to data protection and information security measures or controls arising out of or related to the audit report or related to Arctic Wolf’s compliance with this Agreement, as well as any applicable laws or industry standards, within ten (10) business days.
Data Security Audits. City shall obtain audits covering Data security. Data security audits must demonstrate compliance with Data security standards adopted by WaTech and OCIO, and as set forth in this Agreement. At a minimum, audit(s) must determine whether Data security policies, procedures, and controls are in place to ensure compliance with all Data security requirements set forth herein, and as required by state and federal law. City will also allow for the Department to conduct contract compliance audits, at the Department’s discretion, to verify that City is properly and fully complying with all other terms and conditions of this Agreement.
Data Security Audits. In accordance with the NACHA Rules, Company is required to conduct, or cause to be conducted, no less frequently than annually, a data security audit to ensure that the financial information that Company obtains from Receivers is protected by security practices that include adequate levels of: (i) physical security to protect against theft, tampering, or damage; (ii) personnel and access controls to protect against unauthorized access and use; and (iii) network security to ensure secure capture, transmission, distribution, and storage until destruction of financial information. More specific details of the audit requirements are set forth in the User Guide.
Data Security Audits. OEM may request no more than once a calendar year upon ten days written notice to ISS (unless additional audits or shorter notice is required, in each case, due to a Security Incident, but in no case less than reasonable notice (and for the avoidance of doubt, the Parties agree that there will be no more than one audit per Security Incident)), that ISS provide (and will cause its affiliates, agents, or subcontractors to provide) OEM (or its designated representatives) with access to facilities, systems, data backups, records and supporting documentation in order to audit ISS’ (and/or its subcontractors') compliance with its obligations under this Section 5 during normal business hours. Audits shall be conducted in a manner that minimizes any disruption of ISS’s performance of services and other normal operations. ISS shall take proper steps to address any control weaknesses identified by OEM as a result of such audit. The results of any such audit shall be deemed ISS’ Confidential Information and protected as such under Section 12.9.
Data Security Audits. To ensure Business Associate’s compliance with the Privacy Regulations and Security Regulations at its sole expense, Allina will have the right to conduct an annual data security audit at Business Associate’s site during the term of this Agreement. The data security audit will be conducted by Allina during Business Associate’s regular business hours and upon reasonable advance notice to Business Associate. In addition to the above, Allina will have the right to conduct a six (6) month follow-up on-site data security audit if problems are identified during any annual audit.
Data Security Audits iService represents that it will retain a certified public accounting firm to perform an annual audit of the System’s data protection features and to provide a SOC 2 Type II report, pursuant to the standards of the American Institute of Certified Public Accountants (the “AICPA”), or such other report as AICPA may promulgate to replace SOC 2 Type II. Reasonably promptly after Dealer’s request, iService will provide a copy of its most recent such report, provided such report will be iService’s Confidential Information pursuant to Article 9 below.
AutoNDA by SimpleDocs

Related to Data Security Audits

  • Data Security The Provider agrees to utilize administrative, physical, and technical safeguards designed to protect Student Data from unauthorized access, disclosure, acquisition, destruction, use, or modification. The Provider shall adhere to any applicable law relating to data security. The provider shall implement an adequate Cybersecurity Framework based on one of the nationally recognized standards set forth set forth in Exhibit “F”. Exclusions, variations, or exemptions to the identified Cybersecurity Framework must be detailed in an attachment to Exhibit “H”. Additionally, Provider may choose to further detail its security programs and measures that augment or are in addition to the Cybersecurity Framework in Exhibit “F”. Provider shall provide, in the Standard Schedule to the DPA, contact information of an employee who XXX may contact if there are any data security concerns or questions.

  • New Hampshire Specific Data Security Requirements The Provider agrees to the following privacy and security standards from “the Minimum Standards for Privacy and Security of Student and Employee Data” from the New Hampshire Department of Education. Specifically, the Provider agrees to:

  • Data Security and Privacy Plan As more fully described herein, throughout the term of the Master Agreement, Vendor will have a Data Security and Privacy Plan in place to protect the confidentiality, privacy and security of the Protected Data it receives from the District. Vendor’s Plan for protecting the District’s Protected Data includes, but is not limited to, its agreement to comply with the terms of the District’s Bill of Rights for Data Security and Privacy, a copy of which is set forth below and has been signed by the Vendor. Additional components of Vendor’s Data Security and Privacy Plan for protection of the District’s Protected Data throughout the term of the Master Agreement are as follows:

  • Background and Security Investigations 7.5.1 Each of Contractor’s staff performing services under this Master Agreement who is in a designated sensitive position, as determined by County in County's sole discretion, shall undergo and pass a background investigation to the satisfaction of County as a condition of beginning and continuing to perform services under this Master Agreement. Such background investigation must be obtained through fingerprints submitted to the California Department of Justice to include State, local, and federal-level review, which may include, but shall not be limited to, criminal conviction information. The fees associated with the background investigation shall be at the expense of the Contractor, regardless if the member of Contractor’s staff passes or fails the background investigation.

  • Search, Enquiry, Investigation, Examination And Verification a. The Property is sold on an “as is where is basis” subject to all the necessary inspection, search (including but not limited to the status of title), enquiry (including but not limited to the terms of consent to transfer and/or assignment and outstanding charges), investigation, examination and verification of which the Purchaser is already advised to conduct prior to the auction and which the Purchaser warrants to the Assignee has been conducted by the Purchaser’s independent legal advisors at the time of execution of the Memorandum.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!