Information Security and Data Protection Sample Clauses

Information Security and Data Protection. Computershare shall comply with the provisions of Schedules 9 and 10 of the Side Agreement.
AutoNDA by SimpleDocs
Information Security and Data Protection. Each Party shall perform its obligations under this Agreement utilising security technologies and techniques in accordance with Applicable Laws and Good Industry Practice, including those relating to the prevention and detection of inappropriate use or access of Infrastructure or information including Personal Information and Confidential Information.
Information Security and Data Protection. 3.1 Each Party shall perform its obligations under this Agreement utilising security technologies and techniques in accordance with Applicable Laws and Good Industry Practice, including those relating to the prevention and detection of inappropriate use or access of Infrastructure or information including Personal Information and Confidential Information. 3.2 Without limiting the generality of the foregoing, each Party shall implement and/or use network management and maintenance applications and tools and appropriate intrusion prevention, intrusion detection, identity management, and encryption technologies where reasonable and appropriate to do so. 3.3 Each Party acknowledges the sensitive nature of the Personal Information to be exchanged under this Agreement and that where applicable some of the Personal Information may constitute Special Personal Information). Each Party shall ensure that its Staff shall not — 3.3.1 Process the Personal Information in any manner or for any purpose other than to the extent strictly necessary to perform its obligations under this Agreement; and/or 3.3.2 cause another Party to breach or contravene any applicable Data Protection Legislation or other Applicable Law. 3.4 Each Party must notify the other Party immediately in the event of non-compliance or breach of any applicable Data Protection Legislation, who will in turn notify any affected Parties affected, in accordance with internal procedures. 3.5 The Parties specifically record that all the Personal Information disclosed by a Party shall constitute Confidential Information of such Party. 3.6 Each Party warrants and undertakes in favour of each of the other Parties that it shall at all times strictly comply with all Data Protection Legislation which may be in force from time to time. 3.7 Without derogating from or limiting its further obligations in this Agreement, each Party further warrants that it shall ensure that all Infrastructure which it uses to provide, exchange or access any Personal Information, including all Infrastructure on which the Personal Information is Processed shall at all times be of a minimum standard required by Applicable Laws and Good Industry Practice. 3.8 Neither Party shall transfer or Process any Personal Information of the other Party across the border of South Africa without the prior written consent of the Party and Data Subject who disclosed such Personal Information. 3.9 Each Party shall take all reasonable and appropriate precautio...
Information Security and Data Protection. The following rules for information security and data protection related to the Service apply. • Assertion of absolute security in IT systems is impossible. The Provider is making every effort to maximize security level of users’ data and minimalize possible harm in the event of an incident. • The Provider will define and abide by an information security and data protection policy related to the service being provided. • The parties of the Agreement will meet all requirements of any relevant policy or procedure of the Provider10 and will comply with the applicable national legislations.
Information Security and Data Protection. The Parties are responsible for safeguarding all information in accordance with all applicable federal and state laws and regulations, including but not limited to the following, Family Code § 17212, Welfare & Institutions Code § 11478.1, 26 USC § 6103, 42 USC § 654(26), Title 22 CFR §§ 111430 – 111440, and IRS Publication 1075.
Information Security and Data Protection. The following rules for information security and data protection apply: ● The RP agrees to make every effort to maximise the security level of users’ data and minimise possible harm in the event of an incident. ● In the context of the GDPR regulations, the RP is having the role of the Data Controller and should take into account all the related requirements. ● The RP must define and abide by an Information Security and Data Protection policy related to the service being provided. The templates provided by the AARC Policy Development Kit (PDK)14 can be used as a basis. 12 xxxxx://xxxx.xxx.xx/wiki/Performance#Resource_infrastructure_Provider_performance 13 xxxxx://xxx.xxx.xx/ 14 xxxxx://xxxx-xxxxxxx.xx/policies/policy-development-kit/ ● The RP must enforce the EGI WISE Acceptable Usage Policies15. ● The RP shall comply with all principles set out by the GÉANT Data Protection Code of Conduct16 in its most current version, which will be made available to the RP by EGI Foundation upon request. ● This Information Security and Data Protection policy must meet all requirements of any relevant EGI policies or procedures17 and also must be compliant with the relevant national legislation. Regarding the EGI requirements, please refer to the following reference documentation: o EGI-doc-3015: e-Infrastructure Security Policy o EGI-doc-3601: Service Operations Security Policy o EGI-doc-2732: Policy on the Processing of Personal Data o EGI-doc-3600: Acceptable Use Policy and Conditions of Use o EGI-doc-2934: Security Traceability and Logging Policy o EGI-doc-2935: Security Incident Response Policy o EGI-doc-710: Security Incident Handling Procedure 8.1 Of the RP 8.2 Of EGI Foundation
Information Security and Data Protection. 17.1. The Partners shall ensure that personal and/or sensitive data is properly protected and shall implement appropriate arrangements which ensure that Personal Data of employees and any third parties is processed and protected in accordance with current statutory requirements. 17.2. The Partners shall at all times comply with and maintain Personal Data in accordance with Data Protection Legislation in relation to the Agreed Activity and this Agreement. 17.3. Each Partner shall comply with the terms and conditions of the Data Protection Schedule attached at Schedule 3 to this Agreement and any amendments to the same which the HLO notifies the Partners of in writing. The Data Protection Schedule is to be interpreted in accordance with the Definitions and Interpretations contained within it unless the context requires otherwise. 17.4. In the event that the any Partner is a “Controller” or Joint Controller (as defined in the DPA 2018) the Partner shall at all times be responsible to third parties for any Personal Data held, including the individuals to whom the Personal Data relates and the Partner shall at all times during the Agreement have appropriate data protection and information security policies in place which demonstrate how the Partner will meet its responsibilities under the Data Protection Legislation and any other relevant legislation, code of practice, and guidance issued from time to time. 17.5. Each Partner accepts that in the event that they are a “Controller” or Joint Controller they are legally liable for any unauthorised loss or disclosure of any shared Personal Data provided by the HLO to that Partner that occurs once the information has been transferred by the HLO to that Partner under the terms of this Agreement, and in respect of any shared Personal Data which is processed by the Partner in the course of providing the Agreed Activity. 17.6. The Partners agree that, when recording Personal Data, in whatever format, each piece of information must contain the date created or recorded and whether it comprises fact, opinion, hypotheses or a mixture of these together with the identity of the person recording the information. 17.7. Each Partner acknowledges and agrees that the HLO shall be entitled to share any Personal Data supplied by that Partner to the HLO under the Agreement where it has a lawful and legitimate reason for doing so. 17.8. In delivering the Agreement, the Partners shall only share Personal Data supplied by the HLO to the ...
AutoNDA by SimpleDocs
Information Security and Data Protection. Humanity will implement and maintain reasonable administrative, physical and technical Information Security protocols and policies that are designed to prevent any unauthorized use, access, processing, destruction, loss, alteration, or disclosure of any of Customer’s data, including any employee-specific data supplied by Customer (“Customer Data”) as may be held or accessed by Humanity in its software. Humanity agrees that it will not sell, disclose, transfer, share or rent any Customer Data under any circumstances except, in each case, to an Affiliate of Humanity, as required,in connection with the Services. Additional information about Company security practices can be found at xxx.xxxxxxxx.xxx/xxxxxxxx.
Information Security and Data Protection. The following rules for information security and data protection apply: • Assertion of absolute security in IT systems is impossible. The RC is making every effort to maximize security level of users’ data and minimalize possible harm in the event of an incident. • The RC must define and abide by an information security and data protection policy related to the service being provided. • This must meet all requirements of any relevant EGI policies or procedures13 and also must be compliant with the relevant national legislation.
Information Security and Data Protection. 16 7.2.1 Duty to enter into data processing agreements 16 7.2.2 Other obligations related to the processing of personal data 17 7.2.3 Compensation resulting from GDPR violations 17
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!