How ConstructSecure Stores and Protects Your Information Sample Clauses

How ConstructSecure Stores and Protects Your Information. In order to verify the accuracy of its Assessments, ConstructSecure retains copies of all information submitted by you. Although you understand and agree that no service that utilizes the Internet can be completely secure, in order to protect your data and the Assessments, ConstructSecure takes the following precautions: • Any data transfer or download happens via the SSL protocol. • To access or download any data, the user must login with username/password. Our tests indicate that without such login, data cannot be changed. • During uploading of data, files are encrypted and stored in the database in encrypted form. • Any stored backups are encrypted. • Any stored logs are encrypted. • Each encrypted data file has its own unique key. • During processing of data, ConstructSecure does not use any temporary storage where the data would be stored in an unencrypted form. The data is processed in an isolated place.
AutoNDA by SimpleDocs
How ConstructSecure Stores and Protects Your Information. Implementing an ISO 27001 compliant Information Security Management System (ISMS) is not only best practice, but it is also integral to demonstrating data protection compliance to clients and third parties. In addition, by implementing ISO 27001, ConstructSecure has created a strong framework to ensure compliance with the European Union General Data Protection Regulation (GDPR) that went into effect on 5/25/2018. ConstructSecure’s ISMS is managed internally by our Chief Technology Officer, who acts as our Chief Information Security Officer (CISO) as defined in ISO 27001 and as our Data Protection Officer as defined in Article 37 of the GDPR. As clients use our services and systems, the Chief Technology Officer sets clear parameters on how data is used and the ways in which a user’s privacy is protected. Although you understand and agree that no service that utilizes the Internet can be completely secure, in order to protect your data and the Assessments, ConstructSecure takes specific precautions described in the CS Privacy Policy, including but not limited to:  ConstructSecure processes data solely for the purposes defined in the Client Contract Agreement and/or the Subcontractor Participation Agreement and utilizes Amazon Web Services for all of our cloud computing as detailed in the CS Privacy Policy;  ConstructSecure guarantees the confidentiality of personal data processed as defined in the contract agreements and within this document;  ConstructSecure does not share data with any third parties and does not use any third party advertising providers;  ConstructSecure ensures that its employees are fully vetted and receive the appropriate personal data protection training as defined in the CS Administrative Manual and the CS Employee Handbook;  Any data transfer or download happens via the SSL protocol;  To access data, the user must login with a username/password as fully defined in the CS Password Policy;  During uploading of data, files are encrypted and stored as fully defined in the CS Encryption Policy, including the requirement that each encrypted file has its own key;  Stored backups and logs are encrypted as fully defined in the CS Data Backup Policy, including the requirement that ConstructSecure does not use any temporary storage; and,  ConstructSecure retains end user data only for as long as we have an ongoing legitimate need to do so and are working under a client contract agreement. Upon termination of a client contract agreement...

Related to How ConstructSecure Stores and Protects Your Information

  • Contractor Information The Contractor will provide up to date information for each of the following in the form and manner specified by OGS:

  • Verizon OSS Information 8.5.1 Subject to the provisions of this Section 8 and Applicable Law, Verizon grants to Reconex a non-exclusive license to use Verizon OSS Information. 8.5.2 All Verizon OSS Information shall at all times remain the property of Verizon. Except as expressly stated in this Section 8, Reconex shall acquire no rights in or to any Verizon OSS Information. 8.5.2.1 The provisions of this Section 8.5.2 shall apply to all Verizon OSS Information, except (a) Reconex Usage Information, (b) CPNI of Reconex, and (c) CPNI of a Verizon Customer or a Reconex Customer, to the extent the Customer has authorized Reconex to use the Customer Information. 8.5.2.2 Verizon OSS Information may be accessed and used by Reconex only to provide Telecommunications Services to Reconex Customers. 8.5.2.3 Reconex shall treat Verizon OSS Information that is designated by Verizon, through written or electronic notice (including, but not limited to, through the Verizon OSS Services), as “Confidential” or “Proprietary” as Confidential Information of Verizon pursuant to Section 10 of the Agreement. 8.5.2.4 Except as expressly stated in this Section 8, this Agreement does not grant to Reconex any right or license to grant sublicenses to other persons, or permission to other persons (except Reconex’s employees, agents or contractors, in accordance with Section 8.5.2.5 below, to access, use or disclose Verizon OSS Information. 8.5.2.5 Reconex’s employees, agents and contractors may access, use and disclose Verizon OSS Information only to the extent necessary for Reconex’s access to, and use and disclosure of, Verizon OSS Information permitted by this Section 8. Any access to, or use or disclosure of, Verizon OSS Information by Reconex’s employees, agents or contractors, shall be subject to the provisions of this Agreement, including, but not limited to, Section 10 of the Agreement and Section 8.5.2.3 above. 8.5.2.6 Reconex’s license to use Verizon OSS Information shall expire upon the earliest of: (a) the time when the Verizon OSS Information is no longer needed by Reconex to provide Telecommunications Services to Reconex Customers; (b) termination of the license in accordance with this Section 8; or (c) expiration or termination of the Agreement. 8.5.2.7 All Verizon OSS Information received by Reconex shall be destroyed or returned by Reconex to Verizon, upon expiration, suspension or termination of the license to use such Verizon OSS Information. 8.5.3 Unless sooner terminated or suspended in accordance with the Agreement or this Section 8 (including, but not limited to, Section 2.2 of the Agreement and Section 8.6.1 below), Reconex’s access to Verizon OSS Information through Verizon OSS Services shall terminate upon the expiration or termination of the Agreement. 8.5.3.1 Verizon shall have the right (but not the obligation) to audit Reconex to ascertain whether Reconex is complying with the requirements of Applicable Law and this Agreement with regard to Reconex’s access to, and use and disclosure of, Verizon OSS Information. 8.5.3.2 Without in any way limiting any other rights Verizon may have under the Agreement or Applicable Law, Verizon shall have the right (but not the obligation) to monitor Reconex’s access to and use of Verizon OSS Information which is made available by Verizon to Reconex pursuant to this Agreement, to ascertain whether Reconex is complying with the requirements of Applicable Law and this Agreement, with regard to Reconex’s access to, and use and disclosure of, such Verizon OSS Information. The foregoing right shall include, but not be limited to, the right (but not the obligation) to electronically monitor Reconex’s access to and use of Verizon OSS Information which is made available by Verizon to Reconex through Verizon OSS Facilities. 8.5.3.3 Information obtained by Verizon pursuant to this Section 8.5.3.3 shall be treated by Verizon as Confidential Information of Reconex pursuant to Section 10 of the Agreement; provided that, Verizon shall have the right (but not the obligation) to use and disclose information obtained by Verizon pursuant to this Section 8.5.3.3 to enforce Verizon’s rights under the Agreement or Applicable Law.

  • OTHER PERTINENT INFORMATION Applicant owns the upland adjoining the lease premises.

  • Malicious Use of Orphan Glue Records Registry Operator shall take action to remove orphan glue records (as defined at xxxx://xxx.xxxxx.xxx/en/committees/security/sac048.pdf) when provided with evidence in written form that such records are present in connection with malicious conduct.

  • DISCLOSURE OF TBS ACCESS CODE TO THIRD PARTY (a) The Account Holder must exercise all care to ensure that the TBS Access Code is not disclosed to any person and shall take all steps to prevent forgery or fraud in connection with the use of his TBS Access Code and/or the operation of the TBS. If the TBS Access Code is disclosed to any person, the Account Holder must forthwith give the Bank written notice thereof, thereupon the Account Holder shall immediately cease to use the TBS Access Code. (b) Unless and until the Bank receives such written notice of disclosure, the Account Holder shall be fully liable and be bound by all transactions effected by the use of such TBS, with or without his consent or knowledge.

  • Access; Information (a) Each of the Company and the Acquiror agrees that upon reasonable notice and subject to applicable laws relating to the exchange of information, it shall afford the other party and the other party's officers, employees, counsel, accountants and other authorized representatives, such access during normal business hours throughout the period prior to the Effective Time to the books, records (including, without limitation, tax returns and work papers of independent auditors), properties, personnel and to such other information as any party may reasonably request and, during such period, it shall furnish promptly to such other party (i) a copy of each material report, schedule and other document filed by it pursuant to the requirements of federal or state securities or banking laws, and (ii) all other information concerning the business, properties and personnel of it as the other may reasonably request. (b) Each of the Company and the Acquiror agrees that it will not, and will cause its representatives not to, use any information obtained pursuant to this Section 5.05 for any purpose unrelated to the consummation of the transactions contemplated by this Agreement. Subject to the requirements of law, each party will keep confidential, and will cause its representatives to keep confidential, all information and documents obtained pursuant to this Section 6.05 unless such information (i) was already known to such party, (ii) becomes available to such party from other sources not known by such party to be bound by a confidentiality obligation, (iii) is disclosed with the prior written approval of the party to which such information pertains or (iv) is or becomes readily ascertainable from published information or trade sources. In the event that this Agreement is terminated or the transactions contemplated by this Agreement shall otherwise fail to be consummated, each party shall promptly cause all copies of documents or extracts thereof containing information and data as to another party hereto to be returned to the party which furnished the same. No investigation by either party of the business and affairs of the other shall affect or be deemed to modify or waive any representation, warranty, covenant or agreement in this Agreement, or the conditions to either party's obligation to consummate the transactions contemplated by this Agreement.

  • Access to Protected Information If BA maintains a designated record set on behalf of CE, BA shall make Protected Information maintained by BA or its agents or subcontractors in Designated Record Sets available to CE for inspection and copying within five (5) days of a request by CE to enable CE to fulfill its obligations under state law [Health and Safety Code Section 123110] and the Privacy Rule, including, but not limited to, 45 C.F.R. Section 164.524 [45 C.F.R. Section 164.504(e)(2)(ii)(E)]. If BA maintains Protected Information in electronic format, BA shall provide such information in electronic format as necessary to enable CE to fulfill its obligations under the HITECH Act and HIPAA Regulations, including, but not limited to, 42 U.S.C. Section 17935(e) and 45 C.F.R. Section 164.524.

  • Access to Properties and Records (a) CCE shall, and shall cause TPC to, afford to ETP and ETP’s accountants, counsel and representatives full reasonable access during normal business hours throughout the period prior to the Closing Date (or the earlier termination of this Agreement pursuant to Article VII hereof) to all of the properties, books, contracts, commitments and records (including all environmental studies, reports and other environmental records and all pipeline cost-of-service and rate-related studies, reports and records related to TPC and, during such period, shall furnish to ETP all information concerning the business, properties, Liabilities and personnel related to TPC as ETP may request, provided, however, that no investigation or receipt of information pursuant to this Section 5.2 shall affect any representation or warranty of CCE or the conditions to the obligations of ETP. To the extent not located at the offices or properties of TPC as of the Closing Date, as promptly as practicable thereafter, CCE shall deliver, or cause its appropriate Affiliates to deliver to ETP all of the books of accounts, minute books, record books and other records (including safety, health, environmental, maintenance and engineering records and drawings) pertaining to the business operations of TPC and all financial and accounting records related to TPC. Such delivery shall include all work papers, pleadings, testimony, exhibits, spread sheets, research, drafts, memoranda, correspondence and other documents related to the TPC Rate Case (“TPC Rate Case Work Product”). TPC Rate Case Work Product has been and will be prepared in contemplation of litigation, and the use of TPC Rate Case Work Product has been and will be under the control of TPC’s attorneys. Notwithstanding anything to the contrary contained in this Agreement, CCE shall not be obligated to provide to ETP any documents or records relating to litigation and regulatory matters in which TPC is involved to the extent that CCE reasonably believes such documents or records are subject to the attorney-client or other applicable privilege in circumstances in which TPC is not the sole client unless the parties entitled to such attorney-client or other applicable privilege shall consent thereto and enter into an appropriate joint defense agreement for the purpose of preservation of such attorney-client or other applicable privilege. (b) The information contained herein, in the CCE Disclosure Letter or heretofore or hereafter delivered to ETP or its authorized representatives in connection with the transactions contemplated by this Agreement shall be held in confidence by ETP and its representatives in accordance with the Confidentiality Agreement until the Closing Date with respect to information relating to TPC. Following the Closing Date, CCE shall keep confidential all information related to the business and properties of TPC to the same extent as ETP is obligated to keep such information confidential in accordance with the terms of the Confidentiality Agreement (without regard to the preceding sentence) prior to the Closing Date.

  • Third-Party Information; Privacy or Data Protection Laws Each Party acknowledges that it and its respective Subsidiaries may presently have and, after the Effective Time, may gain access to or possession of confidential or proprietary Information of, or personal Information relating to, Third Parties: (i) that was received under confidentiality or non-disclosure agreements entered into between such Third Parties, on the one hand, and the other Party or the other Party’s Subsidiaries, on the other hand, prior to the Effective Time or (ii) that, as between the two parties, was originally collected by the other Party or the other Party’s Subsidiaries and that may be subject to and protected by privacy, data protection or other applicable Laws. Each Party agrees that it shall hold, protect and use, and shall cause its Subsidiaries and its and their respective Representatives to hold, protect and use, in strict confidence the confidential and proprietary Information of, or personal Information relating to, Third Parties in accordance with privacy, data protection or other applicable Laws and the terms of any agreements that were either entered into before the Effective Time or affirmative commitments or representations that were made before the Effective Time by, between or among the other Party or the other Party’s Subsidiaries, on the one hand, and such Third Parties, on the other hand.

  • Access to Information Systems Access, if any, to DXC’s Information Systems is granted solely to perform the Services under this Order, and is limited to those specific DXC Information Systems, time periods and personnel as are separately agreed to by DXC and Supplier from time to time. DXC may require Supplier’s employees, subcontractors or agents to sign individual agreements prior to access to DXC’s Information Systems. Use of DXC Information Systems during other time periods or by individuals not authorized by DXC is expressly prohibited. Access is subject to DXC business control and information protection policies, standards and guidelines as may be modified from time to time. Use of any other DXC Information Systems is expressly prohibited. This prohibition applies even when an DXC Information System that Supplier is authorized to access, serves as a gateway to other Information Systems outside Supplier’s scope of authorization. Supplier agrees to access Information Systems only from specific locations approved for access by DXC. For access outside of DXC premises, DXC will designate the specific network connections to be used to access Information Systems.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!