Information and Data Security Sample Clauses

Information and Data Security. (a) Xxxxxxx takes what it considers to be reasonable steps to prevent unauthorized access to the Client Portal, and to the Client’s data stored on its Client Portal. In particular, Xxxxxxx takes appropriate steps to protect all Personal Data that is stored on its Client Portal. These steps include ensuring that the Client Portal is securely configured, that vulnerabilities are dealt with as identified, that updates and patches are applied when they are released, that passwords are encrypted, and that access rights are appropriately managed. (b) In its capacity as Data Processor, Xxxxxxx shall process Personal Data only to the extent, and in such a manner, as is necessary for the purposes of providing Services to the Client as described in this Agreement. (c) Xxxxxxx shall not disclose any Personal Data to any person or entity located outside the US, without obtaining the prior written consent of the Client, and that the transfer is done in compliance with applicable data protection laws, such as the GDPR. (d) Xxxxxxx shall implement appropriate technical measures to protect Personal Data against any unlawful processing and against accidental loss, destruction, damage, alteration or disclosure. These measures shall be appropriate to the harm which might result from any unauthorized or unlawful processing, accidental loss, destruction or damage to Personal Data having regard to its nature. (e) The Client agrees that it will ensure that its users are instructed in the use of the Client Portal and the Validation Platform, and the Xxxxxxx reserves the right to delete or otherwise block access to the Client Portal by any of the Client’s users who are, or that Xxxxxxx reasonably suspects may be, engaged in any activity that might breach international or UK-GDPR law or which may in any way affect the performance of the Client Portal or its continued use by the Client’s users. (f) Xxxxxxx will not make available Personal Data for Sale.
AutoNDA by SimpleDocs
Information and Data Security. Operator shall comply with Amazon’s information security policy, as updated from time to time and notified to the Operator in advance (the "InfoSec Policy", and together with the Code of Conduct and the Supplier Code, the "Amazon Policies"). Amazon’s current InfoSec Policy is attached hereto as Exhibit C.
Information and Data Security. As may be applicable, Vendor will maintain and enforce reasonable industry standard information security and physical security procedures in compliance with federal and state laws and regulation to protect the privacy and security of OHI’s personal information, including OHI customer’s personal information and PHI, should such information be accessible by or to Vendor via the Products. In the event the Products contains software, (i) Vendor will monitor its software and systems that contain OHI’s information for vulnerabilities, risks and threats and implement software updates and patches within thirty (30) days of the update or patch’s release, and (ii) Vendor hereby grants to OHI an irrevocable, perpetual, paid-up, worldwide, nonexclusive license to use the Software for such purposes. In addition, Vendor will take all reasonable precautions to prevent the transmission of any computer virus, malware, or other malicious code to OHI’s resources or system. To the extent that Vendor personnel is provided (a) a login ID, password or other authentication credential; or (b) OHI identification cards or other physical security access (collectively, “Credentials”), Vendor acknowledges that any Credentials issued to it are OHI’s personal information, and Vendor will not share, disclose or use the Credentials in any unauthorized manner. Vendor agrees that it is responsible for the actions of any personnel using the Credentials issued. Vendor will promptly return any Credentials to OHI upon request or when network or physical access is no longer required.
Information and Data Security. Xxxxxxxx’s information security policy is reviewed by all new employees and available to all employees via Xxxxxxxx’s internal communications system; • Xxxxxxxx maintains a standing Risk Committee comprised of senior executives that meets monthly to monitor, track, and remediate identified risks across all areas of the business; • Employees are made aware of any information security policy updates and other security-related process updates relevant to their functions; • Dashlane’s network, application(s), and other services are continuously monitored and subject to regular penetration testing; • A private bug bounty service is used to identify vulnerabilities within Dashlane’s systems; • Dashlane’s network and AWS instances are continuously monitored for malicious and unauthorized behavior; • Xxxxxxxx’s Services architecture incorporates privacy by design principles that prevent anyone other than the user (including Dashlane) from being able to access user data stored on the Services, as further described here.
Information and Data Security. We will employ security procedures and enforce administrative, technical, and physical safeguards to reasonably protect the Platform, including the Hosted Services and any of Customer Data stored thereon, consistent with the level of protection provided by generally accepted industry standards and commercial best practices in the cloud security industry.
Information and Data Security. As may be applicable, Vendor will maintain and enforce reasonable industry standard information security and physical security procedures in compliance with federal and state laws and regulation to protect the privacy and security of OHI’s personal information, including OHI customer’s personal information and PHI, should such information be accessible by or to Vendor via the Product. In the event the Product contains software, Vendor will monitor its software and systems that contain OHI’s information for vulnerabilities, risks and threats and implement software updates and patches within thirty (30) days of the update or patch’s release. In addition, Vendor will take all reasonable precautions to prevent the transmission of any computer virus, malware, or other malicious code to OHI’s resources or system. To the extent that Vendor personnel is provided (a) a login ID, password or other authentication credential; or (b) OHI identification cards or other physical security access (collectively, “Credentials”), Vendor acknowledges that any Credentials issued to it are OHI’s personal information, and Vendor will not share, disclose or use the Credentials in any unauthorized manner. Vendor agrees that it is responsible for the actions of any personnel using the Credentials issued. Vendor will promptly return any Credentials to OHI upon request or when network or physical access is no longer required.
Information and Data Security. Paradise controls data security within the scope of an Information Security Management System, and this is enforced to ensure security against intrusion or loss. A statement of applicability is available on request. Paradise will make reasonable endeavours to ensure that its employees and representatives are aware of the risks associated with information and data security issues. All Paradise staff formally agree to adhere to the published security procedures and the internal Acceptable IT Usage policy as a part of their normal recurring review process.
AutoNDA by SimpleDocs
Information and Data Security. Xxxxxxxx’s information security policy is reviewed by all new employees and available to all employees via Xxxxxxxx’s internal communications system; • Xxxxxxxx maintains a Risk Committee comprised of senior executives that meets monthly to monitor, track, and remediate identified risks across all areas of the business; • Employees are made aware of information security policy updates and other security-related process updates relevant to their functions; • All employees receive regular (at least annual) security training, and role-based training is performed when appropriate (e.g., upon promotion to new roles); • Dashlane’s network, application(s), and other services are continuously monitored and subject to regular penetration testing; • A private bug bounty service is used to identify vulnerabilities within Dashlane’s systems; • Dashlane’s network and AWS instances are continuously monitored for malicious and unauthorized behavior; • All code is developed internally and subject to QA prior to releaae; • Xxxxxxxx’s Services architecture incorporates privacy by design principles that prevent anyone other than the user (including Dashlane) from being able to access user data stored on the Services, as further described here; • User Data is encrypted at all times when in transit to and from and when on Dashlane servers.
Information and Data Security. There are no pre-existing, existing, or pending incidents that to Seller’s knowledge may constitute a compromise of the administrative, technical or physical security of the Branch Offices, the Assets, or the Assumed Liabilities, whether maintained by in-house information technology or third-party service provider(s).
Information and Data Security. The Receiving Party shall preserve the confidentiality, integrity and accessibility of the Disclosing Party’s information and data, in electronic and any other format, whether or not considered to be Confidential Information as defined herein (the “Data”) with administrative, technical, and physical measures that conform to all applicable laws, rules, and regulations and generally recognized industry standards and best practices that the Receiving Party then applies to its own information and data. The Receiving Party shall also protect all of the Disclosing Party’s Data from unauthorized access, disclosure, and misuse. The Receiving Party shall: (a) maintain adequate physical controls and password protections for any server, database, or system on which any information and Data may reside;
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!