Data Security. Seller shall take all appropriate legal, organizational and technical measures to protect against unlawful and unauthorized processing of Personal Data or Apple Confidential Information ("Confidential Data"). Seller shall maintain reasonable operating standards and security procedures, and shall use its best efforts to secure Confidential Data through the use of appropriate physical and logical security measures including, but not limited to, appropriate network security and encryption technologies, and the use of reasonable user identification or password control requirements, including multiple-factor authentication, strong passwords, session time-outs, and other security procedures as may be issued from time to time by Apple. If requested by Apple at any time during the term of this Agreement, Seller shall provide Apple with a copy of Seller’s then current security policy. Seller shall promptly notify Apple if Seller knows or has reason to believe there has been any misuse, compromise, loss, or unauthorized disclosure or acquisition of, or access to, Confidential Data (“Information Security Breach”). Upon any discovery of an Information Security Breach, Seller will investigate, remediate, and mitigate the effects of the Information Security Breach, and provide Apple with assurances reasonably satisfactory to Apple that such Information Security Breach will not recur. Seller shall provide at Apple’s request information related to any such Information Security Breach, including but not limited to, vulnerabilities or flaws, start or end date, date of discovery, and specific actions taken to contain and/or mitigate. If any Information Security Breach occurs as a result of an act or omission of Seller or Seller Parties, Seller will, at Seller’s sole expense, undertake remedial measures (including notice, credit monitoring services, fraud insurance and the establishment of a call center to respond to customer inquiries) in accordance with Apple’s instructions.
Appears in 76 contracts
Samples: Purchase Agreement, Purchase Agreement, Purchase Agreement
Data Security. Seller shall take all appropriate legal, organizational and technical measures to protect against unlawful and unauthorized processing of Personal Data or Apple Confidential Information ("Confidential Data"). Seller shall maintain reasonable operating standards and security procedures, and shall use its best efforts to secure Confidential Data through the use of appropriate physical and logical security measures including, but not limited to, appropriate network security and encryption technologies, and the use of reasonable user identification or password control requirements, including multiple-factor authentication, strong passwords, session time-outs, and other security procedures as may be issued from time to time by Apple. If requested by Apple at any time during the term of this Agreement, Seller shall provide Apple with a copy of Seller’s then current security policy. Seller shall promptly notify Apple if Seller knows or has reason to believe there has been any misuse, compromise, loss, or unauthorized disclosure or acquisition of, or access to, Confidential Data (“"Information Security Breach”"). Upon any discovery of an Information Security Breach, Seller will investigate, remediate, and mitigate the effects of the Information Security Breach, and provide Apple with assurances reasonably satisfactory to Apple that such Information Security Breach will not recur. Seller shall provide at Apple’s request information related to any such Information Security Breach, including but not limited to, vulnerabilities or flaws, start or end date, date of discovery, and specific actions taken to contain and/or mitigate. If any Information Security Breach occurs as a result of an act or omission of Seller or Seller Parties, Seller will, at Seller’s sole expense, undertake remedial measures (including notice, credit monitoring services, fraud insurance and the establishment of a call center to respond to customer inquiries) in accordance with Apple’s instructions.
Appears in 9 contracts
Samples: Purchase Agreement, Purchase Agreement, Purchase Agreement
Data Security. Seller shall take all appropriate legal, organizational and technical measures to protect against unlawful and unauthorized processing of Personal Data or Apple ACWN Confidential Information ("Confidential Data"). Seller shall maintain reasonable operating standards and security procedures, and shall use its best efforts to secure Confidential Data through the use of appropriate physical and logical security measures including, but not limited to, appropriate network security and encryption technologies, and the use of reasonable user identification or password control requirements, including multiple-factor authentication, strong passwords, session time-outs, and other security procedures as may be issued from time to time by AppleACWN. If requested by Apple ACWN at any time during the term of this Agreement, Seller shall provide Apple ACWN with a copy of Seller’s then current security policy. Seller shall promptly notify Apple ACWN if Seller knows or has reason to believe there has been any misuse, compromise, loss, or unauthorized disclosure or acquisition of, or access to, Confidential Data (“Information Security Breach”). Upon any discovery of an Information Security Breach, Seller will investigate, remediate, and mitigate the effects of the Information Security Breach, and provide Apple ACWN with assurances reasonably satisfactory to Apple ACWN that such Information Security Breach will not recur. Seller shall provide at AppleACWN’s request information related to any such Information Security Breach, including but not limited to, vulnerabilities or flaws, start or end date, date of discovery, and specific actions taken to contain and/or mitigate. If any Information Security Breach occurs as a result of an act or omission of Seller or Seller Parties, Seller will, at Seller’s sole expense, undertake remedial measures (including notice, credit monitoring services, fraud insurance and the establishment of a call center to respond to customer inquiries) in accordance with AppleACWN’s instructions.
Appears in 1 contract
Samples: Purchase Agreement
Data Security. Seller shall take all appropriate legal, organizational and technical measures to protect against unlawful and unauthorized processing of Personal Data or Apple Confidential Information ("Confidential Data"). Seller shall maintain reasonable operating standards and security procedures, and shall use its best efforts to secure Confidential Data through the use of appropriate physical and logical security measures including, but not limited to, appropriate network security and encryption technologies, and the use of reasonable user identification or password control requirements, including multiple-factor authentication, strong passwords, session time-outs, and other security procedures as may be issued from time to time by Apple. If requested by Apple at any time during the term of this Agreement, Seller shall provide Apple with a copy of Seller’s then current security policy. Seller shall promptly notify Apple if Seller knows or has reason to believe there has been any misuse, compromise, loss, or unauthorized disclosure or acquisition of, or access to, Confidential Data (“Information Security Breach”). Upon any discovery of an Information Security Breach, Seller will investigate, remediate, and mitigate the effects of the Information Security Breach, and provide Apple with assurances reasonably satisfactory to Apple that such Information Security Breach will not recur. Seller shall provide at Apple’s request information related to any such Information Security Breach, including but not limited to, vulnerabilities or flaws, start or end date, date of discovery, and specific actions taken to contain and/or mitigate. If any Information Security Breach occurs as a result of an act or omission of Seller or Seller PartiesSeller’s Affiliates, Seller will, at Seller’s sole expense, undertake remedial measures (including notice, credit monitoring services, fraud insurance and the establishment of a call center to respond to customer inquiries) in accordance with Apple’s instructions.
Appears in 1 contract
Samples: Purchase Agreement