INFORMATION SECURITY & DATA PROTECTION Sample Clauses

INFORMATION SECURITY & DATA PROTECTION. CSC has approved a security policy and also follows security best practices. For CSC's customers, providers and staff there are detailed security guidelines. Many items in our security policies and guidelines refer to external compliance requirements. CSC has also procedures for risk and security management. For more information, please refer to the following page: xxxxx://xxx.xxx.xx/security
AutoNDA by SimpleDocs
INFORMATION SECURITY & DATA PROTECTION. Data Security requirements are described in section 7, Exhibit C, Special Contract Conditions. The following are policies of the Contractor:
INFORMATION SECURITY & DATA PROTECTION. In addition to the rules defined in the Data Processing Agreement signed between the Service Provider and the Customer, the following rules for information security and data protection apply for all services covered by this agreement. In accordance to local law, all secrecy and privacy rules defined remain valid after termination of this agreement. The Service Provider agrees: ● it is committed to the eduTEAMS Privacy Policy [1] ● it is committed to the Data protection Code of Conduct [2] The Service Provider is only responsible for data protection of service components within the bounds of the Support Characteristics described in this OLA.
INFORMATION SECURITY & DATA PROTECTION. The ePouta Virtual Private Cloud service is a closed environment that meets elevated information security level regulations. CSC has approved a security policy and also follows security best practices. For CSC's customers, partners and staff there are detailed security guidelines. Many items in our security policies and guidelines refer to external compliance requirements. CSC also has procedures for risk and security management. For more information, please refer to the following pages: • xxxxx://xxx.xxx.xx/security • xxxxx://xxx.xxx.xx/web/research/pouta-security
INFORMATION SECURITY & DATA PROTECTION. (a) OTA Insight shall, during the course of the provision of the Product and Service access and/or handle Hyatt Data (including any information not necessarily considered as Data).
INFORMATION SECURITY & DATA PROTECTION. The management processes for maintaining Puhti have been certified by the ISO 27001 standard. CSC has approved a security policy and also follows security best practices. For CSC's customers, providers and staff there are detailed security guidelines. Many items in our security policies and guidelines refer to external compliance requirements. CSC has also procedures for risk and security management. For more information, please refer to the following page: xxxxx://xxx.xxx.xx/security
INFORMATION SECURITY & DATA PROTECTION 
AutoNDA by SimpleDocs

Related to INFORMATION SECURITY & DATA PROTECTION

  • Cybersecurity; Data Protection To the Company’s knowledge, the Company and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (collectively, the “Personal Data”)) used in connection with their businesses, and there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same, except in each case as would not reasonably be expected to have a Material Adverse Effect. The Company and its subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification.

  • Privacy and Data Protection 8.1 The Receiving Party undertakes to comply with South Africa’s general privacy protection in terms Section 14 of the Xxxx of Rights in connection with this Bid and shall procure that its personnel shall observe the provisions of such Act [as applicable] or any amendments and re-enactments thereof and any regulations made pursuant thereto.

  • Data Protection All personal data contained in the agreement shall be processed in accordance with Regulation (EC) No 45/2001 of the European Parliament and of the Council on the protection of individuals with regard to the processing of personal data by the EU institutions and bodies and on the free movement of such data. Such data shall be processed solely in connection with the implementation and follow-up of the agreement by the sending institution, the National Agency and the European Commission, without prejudice to the possibility of passing the data to the bodies responsible for inspection and audit in accordance with EU legislation (Court of Auditors or European Antifraud Office (XXXX)). The participant may, on written request, gain access to his personal data and correct any information that is inaccurate or incomplete. He/she should address any questions regarding the processing of his/her personal data to the sending institution and/or the National Agency. The participant may lodge a complaint against the processing of his personal data with the [national supervising body for data protection] with regard to the use of these data by the sending institution, the National Agency, or to the European Data Protection Supervisor with regard to the use of the data by the European Commission.

Time is Money Join Law Insider Premium to draft better contracts faster.