Data Security, Recovery, and Hosting Sample Clauses

Data Security, Recovery, and Hosting. Vendor will maintain and enforce safety and physical security procedures, including regularly scheduled back-up of Beaumont data that are at least equal to industry standards and that provide reasonably appropriate technical and organizational safeguards against accidental or unlawful destruction, loss, alteration or unauthorized disclosures or access of Beaumont information. Xxxxxxxx shall have the right to require special back-up for their data and to keep back-up data and data files in its possession. Vendor shall take all reasonable measures to secure and defend the data against unauthorized access. Vendor shall report to Beaumont in a prompt and timely fashion any breaches of security or unauthorized access to Beaumont data and will comply with applicable laws, including but not limited to, state and federal laws on data breach notification. Vendor shall maintain throughout the Term of this Agreement, disaster recovery capabilities that permit recovery of Beaumont data from a disaster and continue to provide services to within a commercially reasonable time period. Vendor represents that the servers that maintain Beaumont’s and/or Hospital’s data are owned and managed by Vendor and will remain in the jurisdiction of the United States of America. In the event that Vendor arranges for subcontracting of the host services or transfer Beaumont data outside of the U.S.A., Vendor must provide Beaumont thirty (30) days prior written notice of same. Upon such written notice, Xxxxxxxx shall have the right to immediately terminate this Agreement without penalty, and the annual fee shall be prorated through the effective date of termination and returned to Beaumont.
AutoNDA by SimpleDocs

Related to Data Security, Recovery, and Hosting

  • Data Security Requirements A. Data Transport. When transporting Confidential Information electronically, including via email, the data will be protected by:

  • Data Security The Provider agrees to utilize administrative, physical, and technical safeguards designed to protect Student Data from unauthorized access, disclosure, acquisition, destruction, use, or modification. The Provider shall adhere to any applicable law relating to data security. The provider shall implement an adequate Cybersecurity Framework based on one of the nationally recognized standards set forth set forth in Exhibit “F”. Exclusions, variations, or exemptions to the identified Cybersecurity Framework must be detailed in an attachment to Exhibit “H”. Additionally, Provider may choose to further detail its security programs and measures that augment or are in addition to the Cybersecurity Framework in Exhibit “F”. Provider shall provide, in the Standard Schedule to the DPA, contact information of an employee who XXX may contact if there are any data security concerns or questions.

  • Data Protection and Security A. In this Agreement the following terms shall have the meanings respectively ascribed to them:

  • DATA PROTECTION AND DATA PROCESSING 6.1 The Company and the Client acknowledge that for the purposes of the Data Protection Xxx 0000 and the GDPR, that the Client and the Company shall be considered separate data controllers in relation to the provision of the Services, save and except that in the case of lead generation services, the Client shall be the data controller and the Company shall be the data processor.

  • Procurement of Recovered Materials (1) In the performance of this contract, the Contractor shall make maximum use of products containing recovered materials that are EPA-designated items unless the product cannot be acquired

  • DATA HANDLING AND SECURITY It will always be the responsibility of the selected Contractor to manage data transfer and to secure all data appropriately during the project to prevent unauthorized access to all data, products, and deliverables.

  • PROCUREMENT OF RECOVERED MATERIAL H-GAC and the Respondent must comply with section 6002 of the Solid Waste Disposal Act, as amended by the Resource Conservation and Recovery Act. The requirements of Section 6002 include: (1) procuring only items designated in guidelines of the Environmental Protection Agency (EPA) at 40 CFR part 247 that contain the highest percentage of recovered materials practicable, consistent with maintaining a satisfactory level of competition, where the purchase price of the item exceeds $10,000 or the value of the quantity acquired during the preceding fiscal year exceeded $10,000; (2) procuring solid waste management services in a manner that maximizes energy and resource recovery; and (3) establishing an affirmative procurement program for procurement of recovered materials identified in the EPA guidelines. Pursuant to the Federal Rule above, as required by the Resource Conservation and Recovery Act of 1976 (42 U.S.C. § 6962(c)(3)(A)(i)), Respondent certifies that the percentage of recovered materials content for EPA-designated items to be delivered or used in the performance of the Contract will be at least the amount required by the applicable contract specifications or other contractual requirements. A RTICLE 40: XXXXXXXX “ANTI-KICKBACK” ACT Contractor shall comply with 18 U.S.C. § 874, 40 U.S.C. § 3145, and the requirements of 29 C.F.R. pt. 3 as may be applicable, which are incorporated by reference into the contract. The contractor or subcontractor shall insert in any subcontracts the clause above and such other clauses as appropriate agency instructions require, and also a clause requiring the subcontractors to include these clauses in any lower tier subcontracts. The prime contractor shall be responsible for the compliance by any subcontractor or lower tier subcontractor with all of these contract clauses. A breach of the contract clauses above may be grounds for termination of the Contract, and for debarment as a contractor and subcontractor as provided in 29 C.F.R. § 5.12.

  • Data Security and Privacy Plan As more fully described herein, throughout the term of the Master Agreement, Vendor will have a Data Security and Privacy Plan in place to protect the confidentiality, privacy and security of the Protected Data it receives from the District. Vendor’s Plan for protecting the District’s Protected Data includes, but is not limited to, its agreement to comply with the terms of the District’s Bill of Rights for Data Security and Privacy, a copy of which is set forth below and has been signed by the Vendor. Additional components of Vendor’s Data Security and Privacy Plan for protection of the District’s Protected Data throughout the term of the Master Agreement are as follows:

  • System Security and Data Safeguards When SAP is given access to Licensee’s systems and data, SAP shall comply with Licensee’s reasonable administrative, technical, and physical safeguards to protect such data and guard against unauthorized access. In connection with such access, Licensee shall be responsible for providing Consultants with user authorizations and passwords to access its systems and revoking such authorizations and terminating such access, as Licensee deems appropriate from time to time. Licensee shall not grant SAP access to Licensee systems or personal information (of Licensee or any third party) unless such access is essential for the performance of Services under the Agreement. The parties agree that no breach of this provision shall be deemed to have occurred in the event of SAP non-conformance with the aforementioned safeguard but where no personal information has been compromised.

  • SYSTEM AGENCY DATA A. As between the Parties, all data and information acquired, accessed, or made available to Grantee by, through, or on behalf of System Agency or System Agency contractors, including all electronic data generated, processed, transmitted, or stored by Grantee in the course of providing data processing services in connection with Xxxxxxx’s performance hereunder (the “System Agency Data”), is owned solely by System Agency.

Time is Money Join Law Insider Premium to draft better contracts faster.