Hosted Data Sample Clauses

Hosted Data. During the Subscription Term, PTC or its subcontractors will perform daily backup of changed Hosted Data files, each of which will be stored for at least seven (7) days from the date of backup unless a subsequent backup replaces it. Such daily backup as provided herein should not be considered a replacement for Subscriber having appropriate disaster or business recovery plans for the destruction, loss, interception or damage to Subscriber’s data, and Subscriber acknowledges that PTC’s liability under this Section 8 is expressly limited by Section 12 below. PTC shall treat all Hosted Data as confidential and shall only use such Hosted Data to (a) provide the Services, (b) aggregate information relating to transactions for statistical analysis and business measures of the performance of the Services, (c) monitor Subscriber’s and its Permitted Users’ use of the Services for security purposes, (d) enforce the terms of this Agreement, and (e) share with any PTC subcontractors who need to know such information in order to provide the Services, provided that they are bound by similar confidentiality obligations. For purposes of clarity, PTC’s obligation to keep such Hosted Data confidential shall not apply to information that (1) PTC learns of from another source or independently develops without reference to the Hosted Data and does not reveal to be included in Subscriber’s Hosted Data or (2) PTC is required to disclose by law (but only to the extent of such required disclosure). PTC may retain copies of Hosted Data solely for back-up purposes after termination or expiration of this Agreement, provided, however, that PTC shall not be obligated to retain any such copies of the Hosted Data for more than thirty days following termination of expiration of this Agreement.
AutoNDA by SimpleDocs
Hosted Data. Subscriber may download the Hosted Data to Subscriber’s computer system by using the export function provided in the Hosted Software at any time during the Subscription Term and for up to thirty days after expiration or termination of this Agreement (except during any time period when the Services have been suspended pursuant to paragraph (e) below). Subscriber shall be responsible for downloading the Hosted Data within thirty days following termination or expiration of this Agreement and PTC shall have no obligation after such thirty day period to maintain or store or otherwise deliver the Hosted Data to Subscriber. Subscriber acknowledges that PTC may delete all Hosted Data after thirty days following any termination or expiration of this Agreement.
Hosted Data. With respect to Hosted Data, Jama will make reasonable efforts to avoid the loss of Hosted Data and will employ, at a minimum, industry standard security technologies and procedures. However, Jama is not responsible for backup of Hosted Data processed or provided through the Hosted Solution. Licensee is ultimately and solely responsible for maintaining a back up of Hosted Data.
Hosted Data. (a) PTC shall take commercially reasonable steps, or cause such commercially reasonable steps to be taken, designed to prevent security breaches. Customer agrees that the Hosted Data will not include: (i) any information, or documents or technical data that are classified, Controlled Unclassified Information, ITAR controlled or otherwise have been determined by the United States Government or by a foreign government to require protection against unauthorized disclosure for reasons of national security (provided, however, that this restriction shall not apply with respect to ITAR controlled data if the Quote so specifies), and/or (ii) any data that is “protected health information, including any medical, demographic, visual or descriptive information that can be used to identify a particular patient/individual” and/or any other data subject to the U.S. “Health Insurance Portability & Accountability Act of 1996and regulations promulgated under that Act (collectively “HIPAA”). (b) PTC shall treat all Hosted Data as confidential and shall only use the Hosted Data to (i) provide the Services (including reporting to Customer on their use of the Services), (ii) monitor Customer’s use of the Services for security and technical support purposes and for validating Customer’s compliance and usage limitations, and for purposes of otherwise complying with PTC’s obligations to Customer, and (iii) share with any PTC subcontractors who need to know such information in order to provide the Services, provided that they are bound by similar confidentiality obligations. For purposes of clarity, PTC’s obligation to keep such Hosted Data confidential shall not apply to information that PTC is required to disclose by law (but only to the extent of such required disclosure). (c) All personal data received, or collected by PTC in connection with the performance of its obligations will be processed in accordance with the Data Processing Terms and Conditions available at xxxxx://xxx.xxx.xxx/en/documents/policies and PTC’s privacy policy xxxxx://xxx.xxx.xxx/en/documents/policies/privacy. Customer acknowledges that PTC is part of a global company with global operations, and that personal data may be processed outside Customer’s country. All such transfers of personal data shall be in accordance with applicable data privacy laws. Customer certifies that it has obtained any personal data provided to PTC in accordance with applicable data protection laws.
Hosted Data. Client will have the sole responsibility for the accuracy, quality, integrity, legality, reliability, and appropriateness of all data Client and its Users have input into the SAAS that is processed or stored by SNOVASYS and/or its service providers (“Hosted Data”).
Hosted Data. If SubContractor hosts University Compliant Data or Business Sensitive Data, in or on SubContractor facilities, the following additional clauses apply. A. Contactor computers that host University Compliant Data or Business Sensitive Information shall be housed in secure areas that have adequate walls and entry control such as a card controlled entry or staffed reception desk. Only authorized personnel shall be allowed to enter and visitor entry will be strictly controlled. B. SubContractor shall design and apply physical protection against damage from fire, flood, earthquake, explosion, civil unrest, and other forms of natural or man-made disasters. SubContractor shall protect hosted systems with Uninterruptible Power Supply (UPS) devices sufficient to meet business continuity requirements. C. SubContractor shall backup systems or media stored at a separate location with incremental back-ups at least daily and full back-ups at least weekly. Incremental and full back-ups shall be retained for 15 days and 45 days respectively. SubContractor shall test restore procedures not less than once per year. D. SubContractor shall provide for reasonable and adequate protection on its network and system to include firewall and intrusion detection/prevention. E. SubContractor shall use strong encryption and certificate-based authentication on any server hosting on-line and e-commerce transactions with the University to ensure the confidentiality and non-repudiation of the transaction while crossing networks. F. The installation or modification of software on systems containing University Compliant Data or Business Sensitive Information shall be subject to formal change management procedures and segregation of duties requirements. G. SubContractor who hosts University Compliant Data or Business Sensitive Information shall engage an independent third-party auditor to evaluate the information security controls not less than every two (2) years. Such evaluations shall be made available to the University upon request. H. SubContractor shall require strong passwords for any user accessing personally identifiable information or data covered under law, regulation, or standard such as HIPAA, FERPA, or PCI. Strong passwords shall be at least eight characters long; contain at least one upper and one lower case alphabetic characters; and contain at least one numeric or special character.
Hosted Data. Thirty (30) days after termination, Edge Delta shall have no further obligation to Customer and will permanently delete or destroy Customer’s instance of the Service and all information and materials contained therein. 2.12
AutoNDA by SimpleDocs
Hosted Data. Through its Services, the Company provides technology hosting services used to host a variety of internet-based solutions, including websites and other internet- based communication and applications (including “mobile apps”). As a result, the Company’s hosting services store and transmit information about our customers, their business, as well as information collected by those businesses (the “Hosted Info”). Hosted Info may include personal information and other information that belongs to our customers’ own customers, website visitors, or other users. With respect to all Hosted Info, the Company is a passive recipient and takes no active part in collecting or storing any Hosted Info. Moreover, except in extraordinary cases, the Company does not purposefully access any Hosted Info. However, the Company and its agents may occasionally access Hosted Info through the delivery of services and support and such access shall be permissible for all purposes.

Related to Hosted Data

  • De-Identified Data Provider agrees not to attempt to re-identify de-identified Student Data. De-Identified Data may be used by the Provider for those purposes allowed under FERPA and the following purposes: (1) assisting the LEA or other governmental agencies in conducting research and other studies; and (2) research and development of the Provider's educational sites, services, or applications, and to demonstrate the effectiveness of the Services; and (3) for adaptive learning purpose and for customized student learning. Provider's use of De-Identified Data shall survive termination of this DPA or any request by XXX to return or destroy Student Data. Except for Subprocessors, Xxxxxxxx agrees not to transfer de- identified Student Data to any party unless (a) that party agrees in writing not to attempt re-identification, and (b) prior written notice has been given to the LEA who has provided prior written consent for such transfer. Prior to publishing any document that names the LEA explicitly or indirectly, the Provider shall obtain the LEA’s written approval of the manner in which de-identified data is presented.

  • Client Data The Subrecipient shall maintain client data demonstrating client eligibility for services provided. Such data shall include, but not be limited to, client name, address, income level or other basis for determining eligibility, and description of service provided. Such information shall be made available to Grantee monitors or their designees for review upon request.

  • Customer Data 5.1 The Customer shall have sole responsibility for the legality, reliability, integrity, accuracy and quality of the Customer Data. The customer being a contractor of DSA Airport, the customer shall not own the rights, title and interest in and to the Data which belongs to DSA Airport. 5.2 The Supplier shall follow its archiving procedures for Customer Data as set out in its Back- Up Policy available at xxx.xxxxxxxxxxxx.xxx or such other website address as may be notified to the Customer from time to time, as such document may be amended by the Supplier in its sole discretion from time to time. In the event of any loss or damage to Customer Data, the Customer's sole and exclusive remedy shall be for the Supplier to use reasonable commercial endeavours to restore the lost or damaged Customer Data from the latest back-up of such Customer Data maintained by the Supplier in accordance with the archiving procedure described in its Back-Up Policy. The Supplier shall not be responsible for any loss, destruction, alteration or disclosure of Customer Data caused by any third party (except those third parties subcontracted by the Supplier to perform services related to Customer Data maintenance and back-up). 5.3 The Supplier shall, in providing the Services, comply with its Privacy and Security Policy relating to the privacy and security of the Customer Data available at xxx.xxxxxxxxxxxx.xxx or such other website address as may be notified to the Customer from time to time, as such document may be amended from time to time by the Supplier in its sole discretion. 5.4 If the Supplier processes any personal data on the Customer’s behalf when performing its obligations under this agreement, the parties record their intention that the Customer shall be the data controller and the Supplier shall be a data processor and in any such case: (a) the Customer acknowledges and agrees that the personal data may be transferred or stored outside the EEA or the country where the Customer and the Authorised Users are located in order to carry out the Services and the Supplier’s other obligations under this agreement; (b) the Customer shall ensure that the Customer is entitled to transfer the relevant personal data to the Supplier so that the Supplier may lawfully use, process and transfer the personal data in accordance with this agreement on the Customer's behalf; (c) the Customer shall ensure that the relevant third parties have been informed of, and have given their consent to, such use, processing, and transfer as required by all applicable data protection legislation; (d) the Supplier shall process the personal data only in accordance with the terms of this agreement and any lawful instructions reasonably given by the Customer from time to time; and (e) each party shall take appropriate technical and organisational measures against unauthorised or unlawful processing of the personal data or its accidental loss, destruction or damage.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!