Information Deletion/Data Masking and Data Leakage Prevention a Sample Clauses

Information Deletion/Data Masking and Data Leakage Prevention a. Configure internal systems to delete data and information in accordance with retention policy. b. Maintain specialized deletion utility applications, verifiable deletion specialists and third party service providers. c. Implement data masking techniques that reveal the minimum amount of data to anyone that uses it. d. Maintain policies that protect Personal Data and safeguard the identity of the individuals about whom it holds data. e. Classify data in line with recognized industry standards in order to assign varying levels of risk levels across the board. f. Monitor information that is accessed, transferred or extracted by unauthorized internal and external personnel and systems, or malicious sources. g. Implement Data leakage prevention tools in accordance with regulatory requirements and legislation that deals with user privacy. EXHIBIT C
AutoNDA by SimpleDocs

Related to Information Deletion/Data Masking and Data Leakage Prevention a

  • Data Storage Where required by applicable law, Student Data shall be stored within the United States. Upon request of the LEA, Provider will provide a list of the locations where Student Data is stored.

  • Unauthorized Access Notification XXX shall notify Provider promptly of any known unauthorized access. XXX will assist Provider in any efforts by Provider to investigate and respond to any unauthorized access.

  • Customer Support and Closing A. Agent shall provide support to Referred Client in their evaluation and negotiation for the purchase or sale of real estate in addition to the following duties:

  • Provide Data in Compliance with Applicable Laws LEA shall provide Student Data for the purposes of obtaining the Services in compliance with all applicable federal, state, and local privacy laws, rules, and regulations, all as may be amended from time to time.

  • SERVICE REQUIREMENTS FOR REFERRED CLIENTS A. Agent agrees to respond to any communications from a Referred Client within two (2) hours after receipt if such communication is received between 9:00am to 5:00pm local time. For communications received outside of these hours, Agent agrees to respond by 10:00am the next day.

  • Deliverables Upon satisfactory completion of the work authorization, the Engineer shall submit the deliverables as specified in the executed work authorization to the State for review and acceptance.

  • Data Breach In the event of an unauthorized release, disclosure or acquisition of Student Data that compromises the security, confidentiality or integrity of the Student Data maintained by the Provider the Provider shall provide notification to LEA within seventy-two (72) hours of confirmation of the incident, unless notification within this time limit would disrupt investigation of the incident by law enforcement. In such an event, notification shall be made within a reasonable time after the incident. Provider shall follow the following process:

  • Subprocessors Provider shall enter into written agreements with all Subprocessors performing functions for the Provider in order for the Provider to provide the Services pursuant to the Service Agreement, whereby the Subprocessors agree to protect Student Data in a manner no less stringent than the terms of this DPA.

  • Student Data Property of LEA All Student Data transmitted to the Provider pursuant to the Service Agreement is and will continue to be the property of and under the control of the LEA. The Provider further acknowledges and agrees that all copies of such Student Data transmitted to the Provider, including any modifications or additions or any portion thereof from any source, are subject to the provisions of this DPA in the same manner as the original Student Data. The Parties agree that as between them, all rights, including all intellectual property rights in and to Student Data contemplated per the Service Agreement, shall remain the exclusive property of the LEA. For the purposes of FERPA, the Provider shall be considered a School Official, under the control and direction of the LEA as it pertains to the use of Student Data, notwithstanding the above.

  • De-Identified Data Provider agrees not to attempt to re-identify de-identified Student Data. De-Identified Data may be used by the Provider for those purposes allowed under FERPA and the following purposes:

Time is Money Join Law Insider Premium to draft better contracts faster.