Information System Security and Protection of Personal Information Sample Clauses

Information System Security and Protection of Personal Information. 8.1. Definitions The words and phrases listed below, as used in this Section 8, shall each have the following definitions:
AutoNDA by SimpleDocs
Information System Security and Protection of Personal Information. Any breach of this Section may result in termination of the Agreement and the demand for return of all records in connection with this Agreement. The Contractor agrees to indemnify and hold harmless Xxxxxxxx and Xxxxx Counties and the state of Washington for any damages related to the Contractor’s unauthorized use or disclosure of personal information.
Information System Security and Protection of Personal Information. See Section 1, Definitions Specific to Program Agreement in Exhibit D, DDA County Program Agreement, for definitions of the capitalized terms in this section.

Related to Information System Security and Protection of Personal Information

  • Transfer of Personal Information Supplier warrants to DXC that Personal Information provided to Supplier or obtained by Supplier under this Agreement on behalf of DXC (including any SOW) shall not be transferred across national boundaries unless authorized by law or specified within this Agreement or the applicable SOW as authorized for transfer across national boundaries. Supplier agrees that any such transfer will only be made in compliance with applicable Data Privacy Laws. If there is a conflict between this Section ‘Data Protection and Privacy’ and the other provisions of this Agreement, the requirements of this Section shall take precedence.

  • Access to Information Systems Access, if any, to DXC’s Information Systems is granted solely to perform the Services under this Order, and is limited to those specific DXC Information Systems, time periods and personnel as are separately agreed to by DXC and Supplier from time to time. DXC may require Supplier’s employees, subcontractors or agents to sign individual agreements prior to access to DXC’s Information Systems. Use of DXC Information Systems during other time periods or by individuals not authorized by DXC is expressly prohibited. Access is subject to DXC business control and information protection policies, standards and guidelines as may be modified from time to time. Use of any other DXC Information Systems is expressly prohibited. This prohibition applies even when an DXC Information System that Supplier is authorized to access, serves as a gateway to other Information Systems outside Supplier’s scope of authorization. Supplier agrees to access Information Systems only from specific locations approved for access by DXC. For access outside of DXC premises, DXC will designate the specific network connections to be used to access Information Systems.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!