Database Security. 2.1 Oleeo shall keep and maintain a back-up copy of the Database and shall, if the Database (or any part thereof) is in any way damaged, destroyed, modified in an unauthorised way or becomes corrupted:
2.1.1 use a back-up copy to replace the damaged, destroyed, modified or corrupted copy of the Database;
2.1.2 notify the Client in writing of such damage, destruction, modification or corruption and the reasons therefore (if known to Oleeo); and
2.1.3 take whatever steps may be practicable in the circumstances to avoid any such damage, destruction, modification or corruption from occurring again.
2.2 Oleeo shall back-up the Database onto a hard-drive at the end of each Business Day.
Database Security. Data storage and security is a major concern for all enterprise applications. Given the nature of the customers we serve and the data that we house, we have built a very robust reliability system. Our services are orchestrated by Kubernetes and containerized via Docker, with the entire setup declared using Terraform. This setup allows us to quickly spin up new machines to handle unexpected events, as well as leaning on built-in AWS features for auto-scaling technology.
Database Security. Licensee acknowledges that the Licensed Databases are proprietary to Jade or its Licensor(s), and have been compiled and maintained at significant time and expense, and have been maintained as trade secrets of Jade or its Licensor(s). Licensee agrees to store the Licensed Databases in such a manner to maintain and protect the security of the Licensed Databases and not to disclose or use them for any purpose not authorized by this Agreement. Licensee agrees to adopt and employ appropriate safeguards in light of its own operating activities to erasure the protection of the Licensed Databases and the maintenance of their status as trade secrets of Jade or its Licensor(s).
Database Security. Transeo encrypts all database data at rest and in transit. Credentials are stored on machines via environment variables and are not available to individual Transeo employees. Primary databases have limited IP whitelists that prevent unauthorized parties attempting logins.
Database Security. 7.9.1 A documented policy and procedures exist to prevent unauthorized updates to databases.
7.9.2 All database access must be traceable to specific individuals.
Database Security. AD will be provide Affiliate with access to and ----------------- support an off site hosting facility that will contain an electronic patient database consisting of information related to clinical trials. The hosting facility will be in material compliance with the requirements of Health Insurance Portability and Accountability Act, as it may be amended from time to time ("HIPAA") and applicable federal and state regulations relating to patient data security.
Database Security. Affiliate will fully comply with the requirements ----------------- of HIPAA and all-applicable federal, state or local laws with respect to securing of patient data. Affiliate may elect to satisfy its obligation under this paragraph by utilizing AD's hosting facility, at no cost to Affiliate. If Affiliate elects to satisfy its obligation under this paragraph independently, any costs incurred shall be borne by Affiliate and Affiliate must provide AD, on a quarterly basis, with written verification of compliance.
Database Security. GoodData database servers are stored in the third tier of the Platform security layers. Servers are secured behind a firewall and cannot be directly reached from the public Internet.
Database Security. Licensee acknowledges that the Licensed Databases are proprietary to KnowledgeMax or its Licensor(s), and have been compiled and maintained at significant time and expense, and have been maintained as trade secrets of KnowledgeMax or its Licensor(s). Licensee agrees to store the Licensed Databases in such a manner to maintain and protect the security of the Licensed Databases and not to disclose or use them for any purpose not authorized by this Agreement. Licensee agrees to adopt and employ appropriate safeguards in light of its own operating activities to erasure the protection of the Licensed Databases and the maintenance of their status as trade secrets of KnowledgeMax or its Licensor(s).
Database Security. The IBM CIO maintains extensive detailed technical specifications for security settings for database middleware. Databases, like servers in general, have physical and logical control requirements. Databases are required to have several levels of access controls, which can also vary by the sensitivity of the data kept within them. Database administrators, as with other elevated privilege users, are subject to more security requirements than general users.