Information Security and Data Protection Sample Clauses

Information Security and Data Protection. Computershare shall comply with the provisions of Schedules 9 and 10 of the Side Agreement.
AutoNDA by SimpleDocs
Information Security and Data Protection. Each Party shall perform its obligations under this Agreement utilising security technologies and techniques in accordance with Applicable Laws and Good Industry Practice, including those relating to the prevention and detection of inappropriate use or access of Infrastructure or information including Personal Information and Confidential Information.
Information Security and Data Protection. 3.1 Each Party shall perform its obligations under this Agreement utilising security technologies and techniques in accordance with Applicable Laws and Good Industry Practice, including those relating to the prevention and detection of inappropriate use or access of Infrastructure or information including Personal Information and Confidential Information. 3.2 Without limiting the generality of the foregoing, each Party shall implement and/or use network management and maintenance applications and tools and appropriate intrusion prevention, intrusion detection, identity management, and encryption technologies where reasonable and appropriate to do so. 3.3 Each Party acknowledges the sensitive nature of the Personal Information to be exchanged under this Agreement and that where applicable some of the Personal Information may constitute Special Personal Information). Each Party shall ensure that its Staff shall not — 3.3.1 Process the Personal Information in any manner or for any purpose other than to the extent strictly necessary to perform its obligations under this Agreement; and/or 3.3.2 cause another Party to breach or contravene any applicable Data Protection Legislation or other Applicable Law. 3.4 Each Party must notify the other Party immediately in the event of non-compliance or breach of any applicable Data Protection Legislation, who will in turn notify any affected Parties affected, in accordance with internal procedures. 3.5 The Parties specifically record that all the Personal Information disclosed by a Party shall constitute Confidential Information of such Party. 3.6 Each Party warrants and undertakes in favour of each of the other Parties that it shall at all times strictly comply with all Data Protection Legislation which may be in force from time to time. 3.7 Without derogating from or limiting its further obligations in this Agreement, each Party further warrants that it shall ensure that all Infrastructure which it uses to provide, exchange or access any Personal Information, including all Infrastructure on which the Personal Information is Processed shall at all times be of a minimum standard required by Applicable Laws and Good Industry Practice. 3.8 Neither Party shall transfer or Process any Personal Information of the other Party across the border of South Africa without the prior written consent of the Party and Data Subject who disclosed such Personal Information. 3.9 Each Party shall take all reasonable and appropriate precautio...
Information Security and Data Protection. The following rules for information security and data protection related to the Service apply. • Assertion of absolute security in IT systems is impossible. The Provider is making every effort to maximize security level of users’ data and minimalize possible harm in the event of an incident. • The Provider will define and abide by an information security and data protection policy related to the service being provided. • The parties of the Agreement will meet all requirements of any relevant policy or procedure of the Provider10 and will comply with the applicable national legislations.
Information Security and Data Protection. The Parties are responsible for safeguarding all information in accordance with all applicable federal and state laws and regulations, including but not limited to the following, Family Code § 17212, Welfare & Institutions Code § 11478.1, 26 USC section § 6103, 42 USC section § 654(26), Title 22 CFR section §§ 111430 – LCSA and Courts POC 2019-2021 111440, and IRS Publication 1075.
Information Security and Data Protection. The following rules for information security and data protection apply: ● The RC must make every effort to maximize the security level of users’ data and minimise possible harm in the event of an incident. Incidents must be immediately reported to the EGI CSIRT according to the SEC0113 procedure. ● In the context of the GDPR regulations, the RC is having the role of the Data Controller and should take into account all the related requirements. ● The RC must define and abide by an information security and data protection policy related to the service being provided. The templates provided by the AARC Policy Development Kit (PDK)14 can be used as a basis. ● The RC must enforce the EGI WISE Acceptable Usage Policies15. ● The RC shall comply with all principles set out by the GÉANT Data Protection Code of Conduct16 version 1.0, which will be made available to the RC by EGI Foundation upon request. ● This Information Security and Data Protection policy must meet all requirements of any relevant EGI policies or procedures17 and also must be compliant with the relevant national legislation. Regarding the EGI requirements, please refer to the following reference documentation: o EGI-doc-3015: e-Infrastructure Security Policy o EGI-doc-3601: Service Operations Security Policy o EGI-doc-2732: Policy on the Processing of Personal Data o EGI-doc-3600: Acceptable Use Policy and Conditions of Use o EGI-doc-2934: Security Traceability and Logging Policy o EGI-doc-2935: Security Incident Response Policy 13 xxxxx://xxxx.xxx.xx/wiki/SEC01 14 xxxxx://xxxx-xxxxxxx.xx/policies/policy-development-kit/ 15 xxxxx://xxxxxxxxx.xxx.xx/public/ShowDocument?docid=3600 16 xxxxx://xxxx.xxxxxx.xxx/display/CODE/Data+Protection+Code+of+Conduct+Home 17 xxxxx://xxx.xxx.xx/about/policy/policies_procedures.html 8.1 Of the RC 8.2 Of the RP
Information Security and Data Protection. 17.1. The Partners shall ensure that personal and/or sensitive data is properly protected and shall implement appropriate arrangements which ensure that Personal Data of employees and any third parties is processed and protected in accordance with current statutory requirements. 17.2. The Partners shall at all times comply with and maintain Personal Data in accordance with Data Protection Legislation in relation to the Agreed Activity and this Agreement. 17.3. Each Partner shall comply with the terms and conditions of the Data Protection Schedule attached at Schedule 3 to this Agreement and any amendments to the same which the HLO notifies the Partners of in writing. The Data Protection Schedule is to be interpreted in accordance with the Definitions and Interpretations contained within it unless the context requires otherwise. 17.4. In the event that the any Partner is a “Controller” or Joint Controller (as defined in the DPA 2018) the Partner shall at all times be responsible to third parties for any Personal Data held, including the individuals to whom the Personal Data relates and the Partner shall at all times during the Agreement have appropriate data protection and information security policies in place which demonstrate how the Partner will meet its responsibilities under the Data Protection Legislation and any other relevant legislation, code of practice, and guidance issued from time to time. 17.5. Each Partner accepts that in the event that they are a “Controller” or Joint Controller they are legally liable for any unauthorised loss or disclosure of any shared Personal Data provided by the HLO to that Partner that occurs once the information has been transferred by the HLO to that Partner under the terms of this Agreement, and in respect of any shared Personal Data which is processed by the Partner in the course of providing the Agreed Activity. 17.6. The Partners agree that, when recording Personal Data, in whatever format, each piece of information must contain the date created or recorded and whether it comprises fact, opinion, hypotheses or a mixture of these together with the identity of the person recording the information. 17.7. Each Partner acknowledges and agrees that the HLO shall be entitled to share any Personal Data supplied by that Partner to the HLO under the Agreement where it has a lawful and legitimate reason for doing so. 17.8. In delivering the Agreement, the Partners shall only share Personal Data supplied by the HLO to the ...
AutoNDA by SimpleDocs
Information Security and Data Protection. Humanity will implement and maintain reasonable administrative, physical and technical Information Security protocols and policies that are designed to prevent any unauthorized use, access, processing, destruction, loss, alteration, or disclosure of any of Customer’s data, including any employee-specific data supplied by Customer (“Customer Data”) as may be held or accessed by Humanity in its software. Humanity agrees that it will not sell, disclose, transfer, share or rent any Customer Data under any circumstances except, in each case, to an Affiliate of Humanity, as required,in connection with the Services. Additional information about Company security practices can be found at xxx.xxxxxxxx.xxx/xxxxxxxx.
Information Security and Data Protection. The following rules for information security and data protection apply: • Assertion of absolute security in IT systems is impossible. The RC is making every effort to maximize security level of users’ data and minimalize possible harm in the event of an incident. • The RC must define and abide by an information security and data protection policy related to the service being provided. • This must meet all requirements of any relevant EGI policies or procedures13 and also must be compliant with the relevant national legislation.
Information Security and Data Protection. MONI is responsible for the information security of and data protection in the Services as well as of the processing of personal data and other information pertaining to the User in accordance with the terms and conditions of this Agreement, the Privacy Policy and applicable laws. The processing of your data is governed by these Terms as well as our Privacy Policy. MONI reserves the right to allow access to personal data about you as well as activity in your Account to law enforcement institutions, state authorities and financial institutions, if such is necessary to comply with relevant legislation, and in order to identify whether these Terms and relevant legislation have not been violated. When you use the services provided by MONI we may collect precise location data about Transactions performed in MONI application or MONI Website. If you permit the MONI Application to access location services through the permission system used by your mobile operating system, we may also collect the precise location of your device when the app is running the foreground or background. We may also make use of your IP address. You may opt out of providing location data through the MONI Application, unless you opt out of providing location data, you consent to the collection, use, sharing and onward transfer of location data, as further set forth in the Privacy Policy. In order for us to review, develop and improve our products and services, you agree that we can use your Information in connection with your MONI application and MONI website. This may involve providing your Information to our partners, affiliates, agents, distributors and suppliers to process MONI transactions and for their statistical research and analytical purposes. We may also disclose your Information as required by law, regulation or any competent authority or agency to investigate possible fraudulent, unlawful or unauthorised activity. You understand and agree that we may collect information about how you and other MONI Users interact with MONI Services. We may access the address book on your device and store names and contact information to facilitate social interactions through MONI Services and for other purposes. We collect transaction details related to your use of MONI Services, including the type of service requested, date and time the service was provided, amount charged and other related transaction details. We may collect information about your mobile device, including for example, the har...
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!