How ConstructSecure Stores and Protects Your Information Sample Clauses

How ConstructSecure Stores and Protects Your Information. Implementing an ISO 27001 compliant Information Security Management System (ISMS) is not only best practice, but it is also integral to demonstrating data protection compliance to clients and third parties. In addition, by implementing ISO 27001, ConstructSecure has created a strong framework to ensure compliance with the European Union General Data Protection Regulation (GDPR) that went into effect on 5/25/2018. ConstructSecure’s ISMS is managed internally by our Chief Technology Officer, who acts as our Chief Information Security Officer (CISO) as defined in ISO 27001 and as our Data Protection Officer as defined in Article 37 of the GDPR. As clients use our services and systems, the Chief Technology Officer sets clear parameters on how data is used and the ways in which a user’s privacy is protected. Although you understand and agree that no service that utilizes the Internet can be completely secure, in order to protect your data and the Assessments, ConstructSecure takes specific precautions described in the CS Privacy Policy, including but not limited to:  ConstructSecure processes data solely for the purposes defined in the Client Contract Agreement and/or the Subcontractor Participation Agreement and utilizes Amazon Web Services for all of our cloud computing as detailed in the CS Privacy Policy;  ConstructSecure guarantees the confidentiality of personal data processed as defined in the contract agreements and within this document;  ConstructSecure does not share data with any third parties and does not use any third party advertising providers;  ConstructSecure ensures that its employees are fully vetted and receive the appropriate personal data protection training as defined in the CS Administrative Manual and the CS Employee Handbook;  Any data transfer or download happens via the SSL protocol;  To access data, the user must login with a username/password as fully defined in the CS Password Policy;  During uploading of data, files are encrypted and stored as fully defined in the CS Encryption Policy, including the requirement that each encrypted file has its own key;  Stored backups and logs are encrypted as fully defined in the CS Data Backup Policy, including the requirement that ConstructSecure does not use any temporary storage; and,  ConstructSecure retains end user data only for as long as we have an ongoing legitimate need to do so and are working under a client contract agreement. Upon termination of a client contract agreement...
AutoNDA by SimpleDocs
How ConstructSecure Stores and Protects Your Information. In order to verify the accuracy of its Assessments, ConstructSecure retains copies of all information submitted by you. Although you understand and agree that no service that utilizes the Internet can be completely secure, in order to protect your data and the Assessments, ConstructSecure takes the following precautions: • Any data transfer or download happens via the SSL protocol. • To access or download any data, the user must login with username/password. Our tests indicate that without such login, data cannot be changed. • During uploading of data, files are encrypted and stored in the database in encrypted form. • Any stored backups are encrypted. • Any stored logs are encrypted. • Each encrypted data file has its own unique key. • During processing of data, ConstructSecure does not use any temporary storage where the data would be stored in an unencrypted form. The data is processed in an isolated place.

Related to How ConstructSecure Stores and Protects Your Information

  • CENTURYLINK OSS INFORMATION 57.1 Subject to the provisions of this Agreement and Applicable Law, CLEC shall have a limited, revocable, non-transferable, non-exclusive right to use CenturyLink OSS Information during the term of this Agreement, for CLEC’s internal use for the provision of Telecommunications Services to CLEC End Users in the State.

  • Contractor Information The Contractor will provide up to date information for each of the following in the form and manner specified by OGS:

  • Verizon OSS Information 8.5.1 Subject to the provisions of this Section 8, in accordance with, but only to the extent required by, Applicable Law, Verizon grants to CBB a non-exclusive license to use Verizon OSS Information.

  • OTHER PERTINENT INFORMATION 1. Applicant owns the upland adjoining the lease premises.

  • Malicious Use of Orphan Glue Records Registry Operator shall take action to remove orphan glue records (as defined at xxxx://xxx.xxxxx.xxx/en/committees/security/sac048.pdf) when provided with evidence in written form that such records are present in connection with malicious conduct.

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes.

  • Access to Protected Information If BA maintains a designated record set on behalf of CE, BA shall make Protected Information maintained by BA or its agents or subcontractors in Designated Record Sets available to CE for inspection and copying within five (5) days of a request by CE to enable CE to fulfill its obligations under state law [Health and Safety Code Section 123110] and the Privacy Rule, including, but not limited to, 45 C.F.R. Section 164.524 [45 C.F.R. Section 164.504(e)(2)(ii)(E)]. If BA maintains Protected Information in electronic format, BA shall provide such information in electronic format as necessary to enable CE to fulfill its obligations under the HITECH Act and HIPAA Regulations, including, but not limited to, 42 U.S.C. Section 17935(e) and 45 C.F.R. Section 164.524.

  • BUILDER’S RISK FOR NEW CONSTRUCTION PROJECTS If the project is NEW CONSTRUCTION, then the following provisions apply:

  • Exception Where Databases Contain Sufficient Information A Reporting Financial Institution is not required to perform the paper record search described in subparagraph D.2. of this section if the Reporting Financial Institution’s electronically searchable information includes the following:

  • Access to Information Systems Access, if any, to DXC’s Information Systems is granted solely to perform the Services under this Order, and is limited to those specific DXC Information Systems, time periods and personnel as are separately agreed to by DXC and Supplier from time to time. DXC may require Supplier’s employees, subcontractors or agents to sign individual agreements prior to access to DXC’s Information Systems. Use of DXC Information Systems during other time periods or by individuals not authorized by DXC is expressly prohibited. Access is subject to DXC business control and information protection policies, standards and guidelines as may be modified from time to time. Use of any other DXC Information Systems is expressly prohibited. This prohibition applies even when an DXC Information System that Supplier is authorized to access, serves as a gateway to other Information Systems outside Supplier’s scope of authorization. Supplier agrees to access Information Systems only from specific locations approved for access by DXC. For access outside of DXC premises, DXC will designate the specific network connections to be used to access Information Systems.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!