Data Security Practices Sample Clauses

Data Security Practices. Customer agrees to use security technologies and techniques in accordance with industry best practices, including those relating to the prevention and detection of unauthorized use and access of systems and networks. A “Security Breach” is any act or omission that results in: (i) the unauthorized access or use of confidential information; or (ii) a breach of the physical, technical, administrative or organizational safeguards put in place by the either Party, that relate to the protection of the security, confidentiality, or integrity of confidential information. In the event of a Security Breach, Customer shall provide Teesnap with the name and contact information for a Customer employee or position which shall serve as Teesnap’s primary contact and shall be available to assist Teesnap twenty-four (24) hours per day, seven (7) days per week as a contact in resolving obligations associated with a Security Breach. To the extent permitted by law and law enforcement authorities, Customer shall notify Teesnap of a Security Breach as soon as practicable by phone and in writing, but no later than twenty-four (24) hours after Customer becomes aware of it. Immediately following Customer’s notification to Teesnap of a Security Breach, the Parties shall coordinate with each other to investigate the Security Breach.
AutoNDA by SimpleDocs
Data Security Practices. 13.10.1. Lottery may, through an industry-recognized and reputable third party, conduct penetration testing and vulnerability scanning and testing of the Software at Lottery’s sole expense; however, SBTech reserves the right to reject such third party in its reasonable discretion (e.g., in the event such third party is a competitor of SBTech), and require Lottery to select an alternate third party provider. Lottery will conduct such testing only after giving SBTech no less than thirty (30) days prior written notice (which notice shall provide the name of the third party selected by Lottery to perform the testing described in this Section), and will conduct such testing in accordance with reasonable instructions provided by SBTech for purposes of minimizing the disruption to the Services and SBTech’s operations. Lottery may conduct the testing and scanning as described in this Section no more frequently than once in any twelve (12) month period; provided that Lottery may conduct such scanning or testing as described in this Section following the unauthorized access to or disclosure of Lottery Data through the Software regardless of the date of the most recent scanning and testing conducted under this Section.

Related to Data Security Practices

  • Security Practices A. Protected data provided to the contractor will be stored: (include where and how) B. The security protections taken to ensure data will be protected that align with the NIST Cybersecurity Framework and industry best practices include:

  • SAFETY PRACTICES (a) The employer will take reasonable measures to prevent and eliminate any present or potential job hazards which the employees may encounter at their places of work.

  • Safety and Security Procedures Contractor shall maintain and enforce, at the Contractor Work Locations, industry-standard safety and physical security policies and procedures. While at each Court Work Location, Contractor shall comply with the safety and security policies and procedures in effect at such Court Work Location.

  • Pay Practices The Employer recognizes the importance of regularity in pay practices and to the greatest extent possible the Employer will not alter the payment routines. Nurses will be notified in writing by the Employer not less than sixty (60) days in advance of a change to the pay practices.

  • Data Practices The Parties acknowledge that this Agreement is subject to the requirements of Minnesota’s Government Data Practices Act, Minnesota Statutes, Section 13.01

  • Security Protocols Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.

  • Data Security Requirements A. Data Transport. When transporting Confidential Information electronically, including via email, the data will be protected by:

  • Security Procedures The Fund shall comply with data access operating standards and procedures and with user identification or other password control requirements and other security procedures as may be issued from time to time by State Street for use of the System on a remote basis and to access the Data Access Services. The Fund shall have access only to the Fund Data and authorized transactions agreed upon from time to time by State Street and, upon notice from State Street, the Fund shall discontinue remote use of the System and access to Data Access Services for any security reasons cited by State Street; provided, that, in such event, State Street shall, for a period not less than 180 days (or such other shorter period specified by the Fund) after such discontinuance, assume responsibility to provide accounting services under the terms of the Custodian Agreement.

  • Notice of Privacy Practices Business Associate shall abide by the limitations of Covered Entity’s Notice of which it has knowledge. Any use or disclosure permitted by this Agreement may be amended by changes to Covered Entity’s Notice; provided, however, that the amended Notice shall not affect permitted uses and disclosures on which Business Associate relied prior to receiving notice of such amended Notice.

  • Security Program Contractor will develop and implement an effective security program for the Project Site, which program shall require the Contractor and subcontractors to take measures for the protection of their tools, materials, equipment, and structures. As between Contractor and Owner, Contractor shall be solely responsible for security against theft of and damage of all tools and equipment of every kind and nature and used in connection with the Work, regardless of by whom owned.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!