Information Security and Data Processing Sample Clauses

Information Security and Data Processing a) At all times during the term of this Agreement, we will implement and maintain appropriate administrative, physical, technical and organizational safeguards and security measures designed to protect against anticipated threats to the security, confidentiality or integrity of Customer Content. We will, at a minimum, maintain the security of Customer Content in accordance with the Jamf Information Security Schedule that is available at xxxxx://xxx.xxxx.xxx/trust-center/legal. We may amend the Jamf Information Security Schedule with written notice to you, provided that we will not modify it in a way that materially degrades or lessens the security measures we take.
AutoNDA by SimpleDocs
Information Security and Data Processing. Vendor will implement and maintain industry standard administrative, physical, and technical safeguards to prevent any collection, use or disclosure of, or access to Confidential Information (including customers’ Personal Data, as defined in the Data Processing Agreement incorporated into this Agreement) other than access expressly authorized under this Agreement. Vendor will comply with the Data Processing Agreement incorporated into this Agreement.
Information Security and Data Processing. 4.1 Security. DocuSign will use commercially reasonable technical and organizational measures designed to prevent unlawful or unauthorized access, use, alteration, or disclosure of Customer Data in accordance with the provisions of DocuSign’s Security Attachment for DocuSign Signature attachedhereto. attached.
Information Security and Data Processing. At all times during the term of this Agreement, Jamf shall implement and maintain appropriate administrative, physical, technical and organizational safeguards and security measures designed to protect against anticipated threats to the security, confidentiality or integrity of Customer Content. Jamf shall only process Personal Information on behalf of and in accordance with Customer’s instructions and applicable law, including Data Protection Laws. Jamf self-certifies and complies with the EU-US Privacy Shield Framework, as administered by the United States Department of Commerce and will maintain its self-certification. To the extent necessary, the Parties shall enter into an appropriate and mutually agreed upon written agreement to satisfy cross-border transfer obligations relating to Personal Information that complies with Data Protection Laws. The Parties agree that Jamf does not require (or request that) Customer provide Jamf any Personal Information to use the Software or to receive the benefit of the Services, and that it is Customer’s choice alone to enter any Personal Information into the Software for the purpose of managing its Devices. Customer also has and is encouraged to use alternative methods to identify Devices managed with the Software, including by providing anonymous identifiers (e.g. Apple Mac serial no. xxx-xxx) that do not include or constitute Personal Information. In no event will Customer provide to Jamf any special categories of Personal Information as defined by GDPR.
Information Security and Data Processing. SpiderOak will use, at a minimum, industry- standard technical and administrative security measures to transfer, store, and process Customer Data. These measures are designed to protect the integrity of Customer Data and guard against the unauthorized or unlawful access to, use, and processing of Customer Data. Customer agrees that SpiderOak may transfer, store, and process Customer Data in the United States and locations other than Customer’s country. To the extent that Customer Data is subject to European Union data protection laws and is processed by SpiderOak as a data processor acting on Customer’s behalf (as a data controller), SpiderOak will use and process such Customer Data as Customer instructs in order to provide the Services and fulfill SpiderOak’s obligations under the Agreement. “Stored Data” means files and other data submitted to the Services by Customer or End Users. “Account Data” means account and contact information submitted to the Services by Customer or End Users. “Customer Data” means Stored Data and Account Data.

Related to Information Security and Data Processing

  • Information Security IET information security management practices, policies and regulatory compliance requirements are aimed at assuring the confidentiality, integrity and availability of Customer information. The UC Xxxxx Cyber-safety Policy, UC Xxxxx Security Standards Policy (PPM Section 310-22), is adopted by the campus and IET to define the responsibilities and key practices for assuring the security of UC Xxxxx computing systems and electronic data.

  • System Security and Data Safeguards When SAP is given access to Licensee’s systems and data, SAP shall comply with Licensee’s reasonable administrative, technical, and physical safeguards to protect such data and guard against unauthorized access. In connection with such access, Licensee shall be responsible for providing Consultants with user authorizations and passwords to access its systems and revoking such authorizations and terminating such access, as Licensee deems appropriate from time to time. Licensee shall not grant SAP access to Licensee systems or personal information (of Licensee or any third party) unless such access is essential for the performance of Services under the Agreement. The parties agree that no breach of this provision shall be deemed to have occurred in the event of SAP non-conformance with the aforementioned safeguard but where no personal information has been compromised.

  • Information Security Program (1) DTI shall implement and maintain a comprehensive written information security program applicable to the Personal Information ("Information Security Program") which shall include commercially reasonable measures, including, as appropriate, policies and procedures and technical, physical, and administrative safeguards that are consistent with industry standards, providing for (i) the security and confidentiality of the Personal Information, (ii) protection of the Personal Information against reasonably foreseeable threats or hazards to the security or integrity of the Personal Information, (iii) protection against unauthorized access to or use of or loss or theft of the Personal Information, and (iv) appropriate disposal of the Personal Information. Without limiting the generality of the foregoing, the Information Security Program shall provide for (i) continual assessment and re-assessment of the risks to the security of Personal Information acquired or maintained by DTI and its agents, contractors and subcontractors in connection with the Services, including but not limited to (A) identification of internal and external threats that could result in unauthorized disclosure, alteration or destruction of Personal Information and systems used by DTI and its agents, contractors and subcontractors, (B) assessment of the likelihood and potential damage of such threats, taking into account the sensitivity of such Personal Information, and (C) assessment of the sufficiency of policies, procedures, information systems of DTI and its agents, contractors and subcontractors, and other arrangements in place, to control risks; and (ii) appropriate protection against such risks.

  • Security and Data Privacy Each party will comply with applicable data privacy laws governing the protection of personal data in relation to their respective obligations under this Agreement. Where Siemens acts as Customer’s processor of personal data provided by Customer, the Data Privacy Terms available at xxxxx://xxx.xxxxxxx.xxx/dpt/sw, including the technical and organizational measures described therein, apply to the use of the relevant Learning Services and are incorporated herein by reference.

  • Personal Information security breach Supplier/Service Provider’s Obligations

  • Information Security Requirements In cases where the State is not permitted to manage/modify the automation equipment (server/computer/other) that controls testing or monitoring devices, the Contractor agrees to update and provide patches for the automation equipment and any installed operating systems or applications on a quarterly basis (at minimum). The Contractor will submit a report to the State of updates installed within 30 days of the installation as well as a Plan of Actions and Milestones (POA&M) to remediate any vulnerabilities ranging from Critical to Low. The contractor will provide an upgrade path or compensatory security controls for any operating systems and applications listed as beyond “end-of-life” or EOL, within 90 days of the EOL and complete the EOL system’s upgrade within 90 days of the approved plan.

  • Security and Data Transfers Party shall comply with all applicable State and Agency of Human Services' policies and standards, especially those related to privacy and security. The State will advise the Party of any new policies, procedures, or protocols developed during the term of this agreement as they are issued and will work with the Party to implement any required. Party will ensure the physical and data security associated with computer equipment, including desktops, notebooks, and other portable devices, used in connection with this Agreement. Party will also assure that any media or mechanism used to store or transfer data to or from the State includes industry standard security mechanisms such as continually up-to-date malware protection and encryption. Party will make every reasonable effort to ensure media or data files transferred to the State are virus and spyware free. At the conclusion of this agreement and after successful delivery of the data to the State, Party shall securely delete data (including archival backups) from Party’s equipment that contains individually identifiable records, in accordance with standards adopted by the Agency of Human Services. Party, in the event of a data breach, shall comply with the terms of Section 7 above.

  • Information Integrity and Security Contractor shall immediately notify County of any known or suspected breach of personal, sensitive and confidential information related to Contractor’s work under this Agreement.

  • UNION SECURITY AND CHECKOFF 5:01 It shall be a condition of continued employment for all employees including probationary employees, as defined in Article 2, to become members and maintain membership in good standing in the Union.

  • Confidentiality and Data Security (a) The Custodian agrees to keep confidential, and to cause its employees and agents to keep confidential, all records of the Funds and information relating to the Funds, including without limitation information as to their respective shareholders and their respective portfolio holdings, unless the release of such records or information is made (i) in connection with the services provided under this Agreement, (ii) at the written direction of the applicable Fund or otherwise consented to, in writing, by the respective Funds, (iii) in response to a request of a governmental, regulatory or self-regulatory authority or agency or pursuant to a subpoena, court order or other legal process, in each case with respect to which the Custodian has determined, on the advice of counsel, that it is required to comply, or (iv) where the Custodian has determined, on the advice of counsel, that the failure to release such information would expose the Custodian to civil or criminal contempt proceedings; provided in the case of clause (iii) or (iv) the Custodian provides the applicable Fund written notice of such requirement to release such records or information, to the extent such notice is permitted. The foregoing shall not be applicable to any information that is publicly available when provided and shall cease to be applicable to any information that thereafter becomes publicly available, other than through a breach of this Section 10(a), or that is independently derived by any party hereto without the use of any information derived in connection with the services provided under this Agreement. Notwithstanding the foregoing but subject to Section 10(d), (1) the Custodian may use information regarding the Funds in connection with certain functions performed on a centralized basis by the Custodian, its affiliates or its or their service providers (including audit, accounting, risk, legal, compliance, sales, administration, product communication, relationship management, compilation and analysis of customer-related data and storage) and disclose such information to its affiliates and to its or their service providers who are subject to the confidentiality obligations hereunder with respect to such information, but only for the purpose of servicing the Funds in connection with the relationship contemplated by this Agreement or providing additional services to the Funds, and (2) the Custodian may aggregate Fund or Portfolio data with similar data of other customers of the Custodian (“Aggregated Data”) and may use Aggregated Data so long as such Aggregated Data represents such a sufficiently large sample that no Fund or Portfolio data can be identified either directly or by inference or implication.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!