Data Security Laws Compliance Sample Clauses

Data Security Laws Compliance. Vendor shall comply with the Data Security Laws. For any Vendor IT using a Cloud Service Offering that accesses, stores, or otherwise processes USAC Data, and/or PII, Vendor shall provide documentation and proof of FedRAMP Authorization for use at a moderate risk before any such cloud-based Service may be used. USAC reserves the right to inspect the Authority to Operate or the complete package of documents for those with agency accreditation.
AutoNDA by SimpleDocs
Data Security Laws Compliance. Vendor shall comply with FISMA, 44 U.S.C. § 3541, et seq., the Privacy Act as amended (as may be applicable), and NIST SP 800-53 Rev 5. Vendor shall protect PII in accordance with all federal and USAC requirements, including, but not limited to, OMB Memoranda M-17-12 and guidance from NIST including, but not limited to, NIST SP 800-53 Rev 5 and NIST SP 800-61 Rev 2 (or most current version), and FIPS 140-3. Vendor shall cooperate with USAC to implement the abovementioned and any federally mandated information security and privacy requirements not described herein (collectively with the aforementioned laws, regulations, requirements, memoranda and guidance, the “Data Security Laws”). For any Vendor Owned / Controlled IT cloud-based Service that accesses, stores, or otherwise processes USAC Data, and/or PII, Vendor shall provide documentation and proof of FedRAMP Authorized Designation for use at a moderate risk before any such cloud-based Service may be used. USAC reserves the right to inspect the Authority to Operate notice certified by the Joint Accreditation Board for FedRAMP or the complete package of documents for those with agency accreditation.

Related to Data Security Laws Compliance

  • Compliance with Data Privacy and Security Laws and Standards Contractor shall comply with all applicable State and federal data privacy and data security laws, rules, and regulations.

  • Anti-Corruption Compliance (a) For the past three (3) years, neither the Company nor any of its Subsidiaries, nor, to the knowledge of the Company, any director, officer, employee or agent acting on behalf of the Company or any of the Company’s Subsidiaries, has offered or given anything of value to: (i) any official or employee of a Governmental Authority, any political party or official thereof, or any candidate for political office or (ii) any other Person, in any such case while knowing that all or a portion of such money or thing of value will be offered, given or promised, directly or indirectly, to any official or employee of a Governmental Authority or candidate for political office, in each case in violation of the Anti-Bribery Laws.

  • COMPLIANCE WITH BREACH NOTIFICATION AND DATA SECURITY LAWS Contractor shall comply with the provisions of the New York State Information Security Breach and Notification Act (General Business Law § 899-aa and State Technology Law § 208) and commencing March 21, 2020 shall also comply with General Business Law § 899-bb.

  • Data Security Requirements A. Data Transport. When transporting Confidential Information electronically, including via email, the data will be protected by:

  • Compliance with Texas Privacy Laws and Regulations In performing their respective obligations under the Agreement, the LEA and the Provider shall comply with all Texas laws and regulations pertaining to LEA data privacy and confidentiality, including but not limited to the Texas Education Code Chapter 32, and Texas Government Code Chapter 560.

  • Data Security and Privacy Plan As more fully described herein, throughout the term of the Master Agreement, Vendor will have a Data Security and Privacy Plan in place to protect the confidentiality, privacy and security of the Protected Data it receives from the District. Vendor’s Plan for protecting the District’s Protected Data includes, but is not limited to, its agreement to comply with the terms of the District’s Bill of Rights for Data Security and Privacy, a copy of which is set forth below and has been signed by the Vendor. Additional components of Vendor’s Data Security and Privacy Plan for protection of the District’s Protected Data throughout the term of the Master Agreement are as follows:

  • Provide Data in Compliance with Applicable Laws LEA shall provide Student Data for the purposes of obtaining the Services in compliance with all applicable federal, state, and local privacy laws, rules, and regulations, all as may be amended from time to time.

  • Data Security The Provider agrees to utilize administrative, physical, and technical safeguards designed to protect Student Data from unauthorized access, disclosure, acquisition, destruction, use, or modification. The Provider shall adhere to any applicable law relating to data security. The provider shall implement an adequate Cybersecurity Framework based on one of the nationally recognized standards set forth set forth in Exhibit “F”. Exclusions, variations, or exemptions to the identified Cybersecurity Framework must be detailed in an attachment to Exhibit “H”. Additionally, Provider may choose to further detail its security programs and measures that augment or are in addition to the Cybersecurity Framework in Exhibit “F”. Provider shall provide, in the Standard Schedule to the DPA, contact information of an employee who XXX may contact if there are any data security concerns or questions.

  • Data Security and Privacy 12.1 SERVICE PROVIDER acknowledges the importance of Data Security and agrees to adhere to the Terms and Conditions of the Data Security Policy of IIMC.

  • PCI-DSS Compliance Merchant shall be in full compliance with rules, regulations, guidelines and procedures adopted by any Card Association or Payment Network relating to the privacy and security of Cardholder and Card transaction data, including without limitation the most up-to-date version of the Payment Card Industry Data Security Standard (PCI-DSS), as amended from time to time by the Payment Card Industry Security Standards Council. Detailed information pertaining to aforementioned requirements may be found at xxxxx://xxx.xxxxxxxxxxxxxxxxxxxx.xxx. Additional information regarding security requirements may be found on the Card Association’s respective web sites.

Time is Money Join Law Insider Premium to draft better contracts faster.