Handling of Subscriber’s Data Sample Clauses

Handling of Subscriber’s Data. “Subscriber’s Data” is any information, data, files, or software (but not, for the avoidance of doubt, any Contractor owned or licensed software) that is generated by Subscriber Endpoints and stored on those computer systems hosting the Services covered by this Agreement (“Contractor Systems”) in conjunction with the Services. Neither Execution Profile/Metric Data or Threat Actor Data are Subscriber’s Data. The Contractor must use due diligence to ensure computer and telecommunications systems and Services involved in storing, using, or transmitting Subscriber’s Data are secure and to protect that data from unauthorized disclosure, modification, or destruction. To accomplish this, the Contractor must comply with all applicable National Institute of Standards and Technology (“NIST”) standards for Moderate Impact systems and with respect to Contractor Systems:
AutoNDA by SimpleDocs
Handling of Subscriber’s Data. “Subscriber’s Data” is any information, data, files, or software that a Subscriber uses or stores on or in conjunction with the Services, including but not limited to Generated Files. The Contractor must use due diligence to ensure computer and telecommunications systems and Services involved in storing, using, or transmitting Subscriber’s Data are secure and to protect that data from unauthorized disclosure, modification, or destruction. To accomplish this, the Contractor must comply with all applicable National Institute of Standards and Technology (“NIST”) standards for Moderate Impact systems and:

Related to Handling of Subscriber’s Data

  • Why We Collect Information and For How Long We are collecting your data for several reasons: · To better understand your needs and provide you with the services you have requested; · To fulfill our legitimate interest in improving our services and products; · To send you promotional emails containing information we think you may like when we have your consent to do so; · To contact you to fill out surveys or participate in other types of market research, when we have your consent to do so; · To customize our website according to your online behavior and personal preferences. The data we collect from you will be stored for no longer than necessary. The length of time we retain said information will be determined based upon the following criteria: the length of time your personal information remains relevant; the length of time it is reasonable to keep records to demonstrate that we have fulfilled our duties and obligations; any limitation periods within which claims might be made; any retention periods prescribed by law or recommended by regulators, professional bodies or associations; the type of contract we have with you, the existence of your consent, and our legitimate interest in keeping such information as stated in this Policy.

  • Court Ordered Requests for Call Detail Records and Other Subscriber Information 7.1 To the extent technically feasible, BellSouth maintains call detail records for Mpower end users for limited time periods and can respond to subpoenas and court ordered requests for this information. BellSouth shall maintain such information for Mpower end users for the same length of time it maintains such information for its own end users.

  • Handling Sensitive Personal Information and Breach Notification A. As part of its contract with HHSC Contractor may receive or create sensitive personal information, as section 521.002 of the Business and Commerce Code defines that phrase. Contractor must use appropriate safeguards to protect this sensitive personal information. These safeguards must include maintaining the sensitive personal information in a form that is unusable, unreadable, or indecipherable to unauthorized persons. Contractor may consult the “Guidance to Render Unsecured Protected Health Information Unusable, Unreadable, or Indecipherable to Unauthorized Individuals” issued by the U.S. Department of Health and Human Services to determine ways to meet this standard.

  • Changes in Subscriber Carrier Selection 17.1 Each Party will abide by applicable state or federal laws and regulations in obtaining End User authorization prior to changing End User’s Local Service Provider to itself and in assuming responsibility for any applicable charges as specified in §258 (b) of the Telecommunications Act of 1996. Either Party shall make authorization available to the other Party upon reasonable requests and at no charge.

Time is Money Join Law Insider Premium to draft better contracts faster.