Information and Data Security. Operator shall comply with Amazon’s information security policy, as updated from time to time and notified to the Operator in advance (the "InfoSec Policy", and together with the Code of Conduct and the Supplier Code, the "Amazon Policies"). Amazon’s current InfoSec Policy is attached hereto as Exhibit C.
Information and Data Security. As may be applicable, Vendor will maintain and enforce reasonable industry standard information security and physical security procedures in compliance with federal and state laws and regulation to protect the privacy and security of OHI’s personal information, including OHI customer’s personal information and PHI, should such information be accessible by or to Vendor via the Products. In the event the Products contains software, (i) Vendor will monitor its software and systems that contain OHI’s information for vulnerabilities, risks and threats and implement software updates and patches within thirty (30) days of the update or patch’s release, and (ii) Vendor hereby grants to OHI an irrevocable, perpetual, paid-up, worldwide, nonexclusive license to use the Software for such purposes. In addition, Vendor will take all reasonable precautions to prevent the transmission of any computer virus, malware, or other malicious code to OHI’s resources or system. To the extent that Vendor personnel is provided (a) a login ID, password or other authentication credential; or (b) OHI identification cards or other physical security access (collectively, “Credentials”), Vendor acknowledges that any Credentials issued to it are OHI’s personal information, and Vendor will not share, disclose or use the Credentials in any unauthorized manner. Vendor agrees that it is responsible for the actions of any personnel using the Credentials issued. Vendor will promptly return any Credentials to OHI upon request or when network or physical access is no longer required.
Information and Data Security. (a) Xxxxxxx takes what it considers to be reasonable steps to prevent unauthorized access to the Client Portal, and to the Client’s data stored on its Client Portal. In particular, Xxxxxxx takes appropriate steps to protect all Personal Data that is stored on its Client Portal. These steps include ensuring that the Client Portal is securely configured, that vulnerabilities are dealt with as identified, that updates and patches are applied when they are released, that passwords are encrypted, and that access rights are appropriately managed.
Information and Data Security. As may be applicable, Vendor will maintain and enforce reasonable industry standard information security and physical security procedures in compliance with federal and state laws and regulation to protect the privacy and security of OHI’s personal information, including OHI customer’s personal information and PHI, should such information be accessible by or to Vendor via the Product. In the event the Product contains software, Vendor will monitor its software and systems that contain OHI’s information for vulnerabilities, risks and threats and implement software updates and patches within thirty (30) days of the update or patch’s release. In addition, Vendor will take all reasonable precautions to prevent the transmission of any computer virus, malware, or other malicious code to OHI’s resources or system. To the extent that Vendor personnel is provided
Information and Data Security. Paradise controls data security within the scope of an Information Security Management System, and this is enforced to ensure security against intrusion or loss. A statement of applicability is available on request. Paradise will make reasonable endeavours to ensure that its employees and representatives are aware of the risks associated with information and data security issues. All Paradise staff formally agree to adhere to the published security procedures and the internal Acceptable IT Usage policy as a part of their normal recurring review process.
Information and Data Security. Standards Subrecipient shall comply with all terms specified in the GLO Information Security Appendix for Subrecipients, incorporated herein for all purposes as Attachment G.
Information and Data Security. The Receiving Party shall preserve the confidentiality, integrity and accessibility of the Disclosing Party’s information and data, in electronic and any other format, whether or not considered to be Confidential Information as defined herein (the “Data”) with administrative, technical, and physical measures that conform to all applicable laws, rules, and regulations and generally recognized industry standards and best practices that the Receiving Party then applies to its own information and data. The Receiving Party shall also protect all of the Disclosing Party’s Data from unauthorized access, disclosure, and misuse. The Receiving Party shall: (a) maintain adequate physical controls and password protections for any server, database, or system on which any information and Data may reside;
Information and Data Security. There are no pre-existing, existing, or pending incidents that to Seller’s knowledge may constitute a compromise of the administrative, technical or physical security of the Branch Offices, the Assets, or the Assumed Liabilities, whether maintained by in-house information technology or third-party service provider(s).
Information and Data Security. We will employ security procedures and enforce administrative, technical, and physical safeguards to reasonably protect the Platform, including the Hosted Services and any of Customer Data stored thereon, consistent with the level of protection provided by generally accepted industry standards and commercial best practices in the cloud security industry.
Information and Data Security. Xxxxxxxx’s information security policy is reviewed by all new employees and available to all employees via Xxxxxxxx’s internal communications system; • Xxxxxxxx maintains a Risk Committee comprised of senior executives that meets monthly to monitor, track, and remediate identified risks across all areas of the business; • Employees are made aware of information security policy updates and other security-related process updates relevant to their functions; • All employees receive regular (at least annual) security training, and role-based training is performed when appropriate (e.g., upon promotion to new roles); • Dashlane’s network, application(s), and other services are continuously monitored and subject to regular penetration testing; • A private bug bounty service is used to identify vulnerabilities within Dashlane’s systems; • Dashlane’s network and AWS instances are continuously monitored for malicious and unauthorized behavior; • All code is developed internally and subject to QA prior to releaae; • Xxxxxxxx’s Services architecture incorporates privacy by design principles that prevent anyone other than the user (including Dashlane) from being able to access user data stored on the Services, as further described here; • User Data is encrypted at all times when in transit to and from and when on Dashlane servers.