DATA SECURITY IN TRANSITION AND STORAGE Sample Clauses

DATA SECURITY IN TRANSITION AND STORAGE. You expressly acknowledge that any wireless access to your Accounts may not be secure and, as such, you assume the risk associated with unauthorized access to mobile banking and any information contained therein resulting from such wireless connectivity. You assume all risk that any information you download or otherwise store on your wireless access device may be accessed by unauthorized third parties. Without limiting the foregoing, you acknowledge that your wireless access device may become subject to unauthorized tracking, “hacking” or other manipulation by spyware, viruses or other malicious code (“malware”). We are not responsible for advising you of the existence or potential effect of any malware. Your use of your hardware and software is at your own risk. We are not responsible for the security and confidentiality of information when you:
AutoNDA by SimpleDocs
DATA SECURITY IN TRANSITION AND STORAGE. You expressly acknowledge that any wireless access to your Accounts may not be secure and, as such, you assume the risk associated with unauthorized access to mobile banking and any information contained therein resulting from such wireless connectivity. You assume all risk that any information you download or otherwise store on your wireless access device may be accessed by unauthorized third parties. Without limiting the foregoing, you acknowledge that your wireless access device may become subject to unauthorized tracking, “hacking” or other manipulation by spyware, viruses or other malicious code (“malware”). We are not responsible for advising you of the existence or potential effect of any malware. Your use of your hardware and software is at your own risk. We are not responsible for the security and confidentiality of information when you: (i) use wireless connections to download your Account information, in which case you acknowledge such connection may permit other persons to access the information being downloaded; or (ii) allow other persons access to your wireless access device. You agree that any account information that you download is done at your own risk, and you are solely responsible for any damage that might occur to the electronic device to which you download any information, or any loss or corruption of data that might occur as a result of the downloading or its storage on an electronic device.

Related to DATA SECURITY IN TRANSITION AND STORAGE

  • COMPLIANCE WITH BREACH NOTIFICATION AND DATA SECURITY LAWS Contractor shall comply with the provisions of the New York State Information Security Breach and Notification Act (General Business Law § 899-aa and State Technology Law § 208) and commencing March 21, 2020 shall also comply with General Business Law § 899-bb.

  • Certain Notifications Until Closing From the Signing Date until the Closing, the Company shall promptly notify the Investor of (i) any fact, event or circumstance of which it is aware and which would reasonably be expected to cause any representation or warranty of the Company contained in this Agreement to be untrue or inaccurate in any material respect or to cause any covenant or agreement of the Company contained in this Agreement not to be complied with or satisfied in any material respect and (ii) except as Previously Disclosed, any fact, circumstance, event, change, occurrence, condition or development of which the Company is aware and which, individually or in the aggregate, has had or would reasonably be expected to have a Company Material Adverse Effect; provided, however, that delivery of any notice pursuant to this Section 3.4 shall not limit or affect any rights of or remedies available to the Investor; provided, further, that a failure to comply with this Section 3.4 shall not constitute a breach of this Agreement or the failure of any condition set forth in Section 1.2 to be satisfied unless the underlying Company Material Adverse Effect or material breach would independently result in the failure of a condition set forth in Section 1.2 to be satisfied.

  • Provide Data In Compliance With FERPA School Unit shall provide data for the purposes of the Service Agreement in compliance with FERPA, COPPA, PPRA, IDEA, MSIPA, and MUSER and all other Maine privacy statutes and regulations referenced or identified in this DPA.

  • APPLICATION AND PARTIES BOUND 5.1 The parties bound by this General Agreement are listed in Schedule 5.

  • Information Transfer and Storage Supplier will use Industry Standard encryption to encrypt Accenture Data that is in transit. Supplier will also use Industry Standard encryption to restrict access to Accenture Data stored on physical media that is transported outside of Supplier facilities.

  • Documentation and compliance (a) The data importer shall promptly and adequately deal with enquiries from the data exporter that relate to the processing under these Clauses.

  • Limitation on Out-of-State Litigation - Texas Business and Commerce Code § 272 This is a requirement of the TIPS Contract and is non-negotiable. Texas Business and Commerce Code § 272 prohibits a construction contract, or an agreement collateral to or affecting the construction contract, from containing a provision making the contract or agreement, or any conflict arising under the contract or agreement, subject to another state’s law, litigation in the courts of another state, or arbitration in another state. If included in Texas construction contracts, such provisions are voidable by a party obligated by the contract or agreement to perform the work. By submission of this proposal, Vendor acknowledges this law and if Vendor enters into a construction contract with a Texas TIPS Member under this procurement, Vendor certifies compliance.

  • COMPLIANCE WITH NEW YORK STATE INFORMATION SECURITY BREACH AND NOTIFICATION ACT Contractor shall comply with the provisions of the New York State Information Security Breach and Notification Act (General Business Law Section 899-aa; State Technology Law Section 208).

  • Telephone Monitoring and Recording You consent to and authorize us and any of our affiliates, agents and marketing associates to monitor and/or record any of your telephone conversations with any of our or their representatives for quality control, training and other lawful purposes.

  • Confidentiality and Safeguarding of University Records; Press Releases; Public Information Under this Agreement, Contractor may (1) create, (2) receive from or on behalf of University, or (3) have access to, records or record systems (collectively, University Records). Among other things, University Records may contain social security numbers, credit card numbers, or data protected or made confidential or sensitive by Applicable Laws. [Option (Include if University Records are subject to FERPA.): Additional mandatory confidentiality and security compliance requirements with respect to University Records subject to the Family Educational Rights and Privacy Act, 20 United States Code (USC) §1232g (FERPA) are addressed in Section 12.41.] [Option (Include if University is a HIPAA Covered Entity and University Records are subject to HIPAA.): Additional mandatory confidentiality and security compliance requirements with respect to University Records subject to the Health Insurance Portability and Accountability Act and 45 Code of Federal Regulations (CFR) Part 160 and subparts A and E of Part 164 (collectively, HIPAA) are addressed in Section 12.26.] Contractor represents, warrants, and agrees that it will: (1) hold University Records in strict confidence and will not use or disclose University Records except as (a) permitted or required by this Agreement, (b) required by Applicable Laws, or (c) otherwise authorized by University in writing; (2) safeguard University Records according to reasonable administrative, physical and technical standards (such as standards established by the National Institute of Standards and Technology and the Center for Internet Security [Option (Include if Section 12.39 related to Payment Card Industry Data Security Standards is not include in this Agreement.):, as well as the Payment Card Industry Data Security Standards]) that are no less rigorous than the standards by which Contractor protects its own confidential information; (3) continually monitor its operations and take any action necessary to assure that University Records are safeguarded and the confidentiality of University Records is maintained in accordance with all Applicable Laws and the terms of this Agreement; and (4) comply with University Rules regarding access to and use of University’s computer systems, including UTS165 at xxxx://xxx.xxxxxxxx.xxx/board-of-regents/policy-library/policies/uts165-information-resources-use-and-security-policy. At the request of University, Contractor agrees to provide University with a written summary of the procedures Contractor uses to safeguard and maintain the confidentiality of University Records.

Time is Money Join Law Insider Premium to draft better contracts faster.