IT Systems; Data Security and Privacy Sample Clauses

IT Systems; Data Security and Privacy. (a) Except as would not constitute a Material Adverse Effect, (i) since June 30, 2016, a failure or lack of capacity of the IT Systems has not prevented the Company or any of its Affiliates from conducting their respective businesses in the ordinary course, and (ii) to the Knowledge of the Company, the IT Systems do not contain any Malware that would reasonably be expected to disrupt the ability of the Company and its Subsidiaries to conduct their businesses or present a risk of unauthorized access, disclosure, use, corruption, destruction or loss of any Personal Information or other non-public information. (b) Except as would not constitute a Material Adverse Effect, the Company, and its Subsidiaries have implemented, maintain, and comply with written information security (including cybersecurity), business continuity and backup and disaster recovery plans and procedures that are consistent with generally accepted industry standards and applicable Laws, writs, injunctions, directives, judgments, decrees and orders. Except as would not constitute a Material Adverse Effect since June 30, 2016, to the Knowledge of the Company, there has been no unauthorized disclosure, use of or access to (i) any Personal Information or other non-public information held by or on behalf of the Company or its Affiliates or (ii) the IT Systems. (c) Except as would not constitute a Material Adverse Effect, since June 30, 2016, the Company and its Subsidiaries have implemented, maintain and comply with internal privacy policies and procedures and comply with any and all applicable regulatory guidelines, contractual requirements, terms of use and industry standards applicable to the collection, retention, storage, protection, security, use, disclosure, distribution, transmission, maintenance and disposal of Personal Information.
AutoNDA by SimpleDocs
IT Systems; Data Security and Privacy. (a) The IT Systems (i) are in good repair and operating condition and are suitable (including with respect to working condition, performance and capacity) for the purposes for which they are being currently used and (ii) to the Knowledge of the Company, do not contain any Malware that would reasonably be expected to interfere with the ability of the Company and its Subsidiaries to conduct business or present a material risk of unauthorized access, disclosure, use, corruption, destruction or loss of any Personal Information or other non-public information. (b) The Company and its Subsidiaries have, in accordance with applicable Data Security Requirements, implemented, maintained, and complied with commercially reasonable written information security, business continuity, back-up and disaster recovery plans and procedures. Since April 29, 2017, (i) to the Knowledge of the Company, there has been no security breach or unauthorized access or use, affecting any of the IT Systems and (ii) neither the Company nor any of its Subsidiaries have been notified by any third party (including pursuant to an audit by such third party) of, nor does the Company have any knowledge of, any data or information security breach with respect to the IT Systems, in each case of clauses (i) and (ii), that has caused any material disruption to the conduct of the business or presented a material risk of unauthorized access, disclosure, use, corruption, destruction or loss of any Personal Information. (c) Since April 29, 2017, the Company has been in material compliance (i) with applicable Data Security Requirements and other Laws, specifically in relation to the collection, storage, protection, security, use, disclosure, distribution, transmission, maintenance, disposal and processing of Personal Information and (ii) its posted privacy policies and other internal policies and procedures with respect to Personal Information. (d) Since April 29, 2017, neither the Company nor any of its Subsidiaries, nor, to the Knowledge of the Company, any third party engaged in the processing of Personal Information on behalf of the Company, has received any written claims alleging that the Company or any of its Subsidiaries violated any applicable Data Security Requirement. To the Knowledge of the Company, neither this Agreement nor the transactions contemplated by this Agreement will violate any applicable Data Security Requirement in any material respect. (e) The Company and its Subsidiaries have c...
IT Systems; Data Security and Privacy. (a) All Information Technology Systems (i) operate and perform in accordance with their documentation and functional specifications in all material respects and otherwise as required by the Companies, (ii) have not materially malfunctioned or failed within the past two (2) years, and (iii) are free of (A) any critical defects, including any critical error or critical omission in the processing of any transactions and (B) any virus, trojan horse, worm, xxxxxx xxxx, back door, time bomb, drop dead device or other software routines or hardware components designed to permit unauthorized access, to disable, erase or otherwise harm software, hardware or data, or to disable a computer program automatically with the passage of time or under the positive control of a Person other than the user of the program (“Malicious Code”). The Companies (other than the JV LLC) take and have taken commercially reasonable steps intended to ensure that the Information Technology Systems are free from Malicious Code. The Companies (other than the JV LLC) have disaster recovery plans and procedures consistent with industry standards, and take and have taken steps to safeguard and back-up the Information Technology Systems. During the three (3) year period prior to the date of this Agreement, to the Knowledge of the Companies, there has not been an unauthorized breach or disclosure of data stored or contained in the Information Technology Systems. (b) Sellers and their Affiliates (including the Company Group), with respect to the Business, (i) have implemented, maintained, and monitored for compliance with commercially reasonable written information security policies and procedures that contain administrative, technical and physical safeguards consistent with industry standards designed to protect the confidentiality, security, availability or integrity of the Information Technology Systems and Personal Information, data or non-public information stored on such Information Technology Systems from misuse or unauthorized use, access, disclosure or modification and (ii) none of the Sellers or their Affiliates (including the Company Group) with respect to the Business have been notified in writing by any Person (including pursuant to an audit of the Business by such Person) of any material data security, information security or other technological deficiency with respect to the Information Technology Systems.
IT Systems; Data Security and Privacy. The IT Systems (a) are in good repair and operating condition and are adequate for the business of the Acquired Companies and (b) do not contain any Malicious Code that would reasonably be expected to interfere with the conduct of the business of the Acquired Companies or present a material risk of unauthorized access, disclosure, use, corruption, destruction or loss of any Personal Data or other non-public information. The Acquired Companies (a) have implemented, maintained, and complied in all material respects with an Information Security Program and (b) have taken commercially reasonable steps to assess and test such plans and procedures on no less than an annual basis, remediated all critical, high and medium risks and vulnerabilities with respect thereto and such Information Security Programs have been proven effective upon such testing. The Acquired Companies, and with respect to Company Data, their Data Processors, comply, in all material respects, with applicable Privacy Requirements. All Company Data will continue to be available for Processing by, the Acquired Companies following the Closing on substantially the same terms and conditions as existed immediately before the Closing. Except as would not, individually or in the aggregate, reasonably be expected to be material to the Acquired Companies, taken as a whole, and, to the Knowledge of the Seller, to the extent required by applicable Privacy Requirements, (a) Personal Data is Processed by the Acquired Companies and its Data Processors in an encrypted manner, and (b) Personal Data is deleted or destroyed by the Acquired Companies and their Data Processors. The Acquired Companies have not sold (as defined by the California Consumer Privacy Act of 2018), and does not sell, any Personal Data to Persons or other third parties. Neither the execution, delivery or performance of this Agreement nor any of the other agreements contemplated by this Agreement, nor the consummation of any of the transactions contemplated by this Agreement or any such other agreements violate in any material respect any Privacy Requirements or Company Privacy Policies. Where the Acquired Companies use a Data Processor to Process Personal Data, the Acquired Companies have used commercially reasonable efforts to obligate such Data Processors to Process such Personal Data in compliance with the Privacy Requirements. Since December 31, 2019, (a) the Acquired Companies and their Data Processors have not suffered a material Sec...
IT Systems; Data Security and Privacy. (a) Sellers, with respect to the conduct of the White Oak Business, including with respect to the Processing of Personal Information are in material compliance with, and have for the last six (6) years been in compliance with, all applicable Privacy and Security Requirements. Sellers have in place and have at all times complied in all material respects with Sellers’ privacy policies published or made available to data subjects from which each Seller collects Personal Information or other data, and such privacy policies are in material compliance with applicable Privacy and Security Requirements. Sellers have obtained, and have complied in all material respects with the terms of, any consents, authorizations, waiver of authorization or other permission pursuant to which any Seller accesses, uses, discloses or has accessed, used or disclosed Personal Information (collectively, “Privacy Consents”). Sellers have the right pursuant to applicable authorizations, Privacy Consents, and their privacy policies to engage in the Processing of such data or information for the purpose such data or information is and has been collected, used or disclosed. Sellers have not supplied or provided access to Personal Information for which Processing was conducted by them to a third party for remuneration or other consideration. (b) None of the execution, delivery or performance of this Agreement, nor the consummation of any of the Transactions will result in any violation of Sellers’ privacy policies, the Privacy Consents, or applicable Privacy and Security Laws. (c) During the six (6) years prior to the Execution Date, Sellers have not received any written, or to the Sellers’ Knowledge, oral communication, information request or notice from any Governmental Authority relating to, or alleging that Sellers are not in compliance, with applicable Privacy and Security Laws or had an occurrence or event that required Sellers to provide notification to any Governmental Authority under applicable Privacy and Security Laws. (d) All Information Technology Systems (i) reasonably operate and perform in accordance with their documentation and functional specifications in all material respects and otherwise as required by Sellers; (ii) are sufficient for Sellers’ conduct of the White Oak Business as currently conducted; (iii) have not materially malfunctioned or failed in the prior three (3) years; and (iv) to Sellers’ Knowledge, are free of (A) any material defects including any material ...

Related to IT Systems; Data Security and Privacy

  • Data Security and Privacy (a) Each Group Member is, and at all times, has been, in compliance in all material respects with (i) all applicable Data Protection Laws, including, to the extent applicable, but not limited to the GDPR and those relating to cross-border transfers; (ii) all applicable contractual obligations of each Loan Party and its Subsidiaries concerning data privacy and security relating to Personal Data in the possession or control of any Group Member or maintained by third parties on behalf of such Group Member and having access to such information under contracts (or portions thereof) to which a Group Member is a party; and (iii) all applicable data transfer agreements and data processing agreements, including the EU standard contractual clauses, to which a Group Member is a party (collectively, “Privacy Agreements”): (b) Each Group Member is, and has been, in compliance in all material respects with all applicable prior and current written internal and public-facing privacy policies and notices of the Group Members regarding the collection, retention, use, processing, disclosure and distribution of Personal Data by the Group Members or their respective agents (collectively, the “Privacy Policies”), and the Privacy Policies have been maintained to be consistent in all material respects with the actual practices of each Group Member. The Privacy Policies contemplate the Group Members’ current uses of the Personal Data, and to the extent required under applicable Data Protection Laws, each Group Member has sought and obtained the appropriate consent from the applicable data subject for such uses. The Privacy Policies have made all material disclosures to users, customers, employees, or other individuals required by Data Protection Laws. (c) Each Group Member has implemented and maintains a commercially reasonable security program (“Security Program”) that (i) complies in all material respects with all applicable Data Protection Laws, applicable Privacy Policies, and applicable Privacy Agreements, and (ii) includes commercially reasonable administrative, technical, organization, and physical security procedures and measures designed to preserve the security and integrity of all Personal Data and any other sensitive or confidential information or data related to each Group Member (collectively, “Company Sensitive Information”) in such Group Member’s possession or control and to protect such Company Sensitive Information against unauthorized or unlawful processing, access, acquisition, use, theft, interruption, modification, disclosure, loss, destruction or damage. (d) Except as disclosed on Schedule 4.23(d), there has been (i) no actual, suspected or alleged (in writing) incidents of unauthorized access, use, intrusion, disclosure or breach of the security of any information technology systems owned or controlled by a Group Member or any of their contractors and used by such contractors on behalf of a Group Member, and (ii) no actual, suspected or alleged (in writing) incidents of unauthorized acquisition, destruction, damage, disclosure, loss, corruption, alteration, or use of any Company Sensitive Information, in each case that could reasonably be expected to cause a Material Adverse Effect. (e) Each Group Member has a valid and legal right (whether contractually, by applicable law or otherwise) to access or use all Personal Data that is accessed and used by or on behalf of a Group Member in connection with the sale, use and/or operation of their products, services and businesses. (f) Except as would not reasonably be expected to have a Material Adverse Effect, there is no pending or to the knowledge of any Loan Party, threatened in writing, complaints, claims, demands, inquiries, proceedings, or other notices, including any notices of any investigation or other legal proceedings, regarding a Group Member, initiated by (i) any Governmental Authority, including the United States Federal Trade Commission, a state attorney general, data protection authority or similar state official, or a supervisory authority; (ii) any counterparty to, or subject of, a Privacy Agreement; or (iii) any self-regulatory authority or entity, alleging that any activity of a Group Member: (1) is in violation of any applicable Data Protection Laws, (2) is in violation of any Privacy Agreements, (3) is in violation of any Privacy Policies or (4) is otherwise in violation of any person’s privacy, personal or confidentiality rights.

  • Data Security and Privacy Plan As more fully described herein, throughout the term of the Subscription Agreement, Vendor will have a Data Security and Privacy Plan in place to protect the confidentiality, privacy and security of the Protected Data it receives from the District. Vendor’s Plan for protecting the District’s Protected Data includes, but is not limited to, its agreement to comply with the terms of the District’s Bill of Rights for Data Security and Privacy, a copy of which is set forth below and has been signed by the Vendor. Additional components of Vendor’s Data Security and Privacy Plan for protection of the District’s Protected Data throughout the term of the Subscription Agreement are as follows: (a) Vendor will implement all state, federal, and local data security and privacy requirements including those contained within the Subscription Agreement and this Data Sharing and Confidentiality Agreement, consistent with the District’s data security and privacy policy. (b) Vendor will have specific administrative, operational and technical safeguards and practices in place to protect Protected Data that it receives from the District under the Subscription Agreement. (c) Vendor will comply with all obligations contained within the section set forth in this Exhibit below entitled “Supplemental Information about a Subscription Agreement between [Xxxxx-Fultonville Central School District] and [Vendor Name].” Vendor’s obligations described within this section include, but are not limited to: (i) its obligation to require subcontractors or other authorized persons or entities to whom it may disclose Protected Data (if any) to execute written agreements acknowledging that the data protection obligations imposed on Vendor by state and federal law and the Subscription Agreement shall apply to the subcontractor, and (ii) its obligation to follow certain procedures for the return, transition, deletion and/or destruction of Protected Data upon termination, expiration or assignment (to the extent authorized) of the Subscription Agreement. (d) Vendor has provided or will provide training on the federal and state laws governing confidentiality of Protected Data for any of its officers or employees (or officers or employees of any of its subcontractors or assignees) who will have access to Protected Data, prior to their receiving access. (e) Vendor will manage data security and privacy incidents that implicate Protected Data and will develop and implement plans to identify breaches and unauthorized disclosures. Vendor will provide prompt notification to the District of any breaches or unauthorized disclosures of Protected Data in accordance with the provisions of Section 5 of this Data Sharing and Confidentiality Agreement.

  • Security and Privacy Security and privacy policies for the Genesys Cloud Service addressing use of Customer Data, which are incorporated by reference and may be updated from time to time in accordance with Section 10.12 of the Agreement, are located at xxxxx://xxxx.xxxxxxxxxxx.xxx/articles/purecloud-security-compliance/.

  • Data Privacy and Security Laws The Company is, and at all prior times was, in material compliance with all applicable state and federal data privacy and security laws and regulations in the United States, including, without limitation, the Health Insurance Portability and Accountability Act of 1996 (“HIPAA”) as amended by the Health Information Technology for Economic and Clinical Health Act, and all applicable provincial and federal data privacy and security laws and regulations in Canada, including without limitation the Personal Information Protection and Electronic Documents Act (S.C. 2000, c. 5) (“PIPEDA”); and the Company has taken commercially reasonable actions to prepare to comply with, and have been and currently are in compliance with, the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679) (collectively, the “Privacy Laws”). To ensure compliance with the Privacy Laws, the Company has in place, comply with, and take appropriate steps reasonably designed to ensure compliance in all material respects with their policies and procedures relating to data privacy and security and the collection, storage, use, disclosure, handling, and analysis of Personal Data (the “Policies”). “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) Protected Health Information as defined by HIPAA; (iv) “personal information”, “personal health information”. and “business contact information” as defined by PIPEDA; (v) “personal data” as defined by GDPR; and (vi) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. The Company has at all times made all disclosures to users or customers required by applicable laws and regulatory rules or requirements, and none of such disclosures made or contained in any Policy have, to the knowledge of the Company, been inaccurate or in violation of any applicable laws and regulatory rules or requirements in any material respect. The Company further certifies: (i) it has not received notice of any actual or potential liability under or relating to, or actual or potential violation of, any of the Privacy Laws, and has no knowledge of any event or condition that would reasonably be expected to result in any such notice; (ii) is currently conducting or paying for, in whole or in part, any investigation, remediation, or other corrective action pursuant to any Privacy Law; or (iii) is a party to any order, decree, or agreement that imposes any obligation or liability under any Privacy Law.

  • Data Privacy and Security Bank will implement and maintain a written information security program, in compliance with all federal, state and local laws and regulations (including any similar international laws) applicable to Bank, that contains reasonable and appropriate security measures designed to safeguard the personal information of the Funds' shareholders, employees, trustees and/or officers that Bank or any Subcustodian receives, stores, maintains, processes, transmits or otherwise accesses in connection with the provision of services hereunder. In this regard, Bank will establish and maintain policies, procedures, and technical, physical, and administrative safeguards, designed to (i) ensure the security and confidentiality of all personal information and any other confidential information that Bank receives, stores, maintains, processes or otherwise accesses in connection with the provision of services hereunder, (ii) protect against any reasonably foreseeable threats or hazards to the security or integrity of personal information or other confidential information, (iii) protect against unauthorized access to or use of personal information or other confidential information, (iv) maintain reasonable procedures to detect and respond to any internal or external security breaches, and (v) ensure appropriate disposal of personal information or other confidential information. Bank will monitor and review its information security program and revise it, as necessary and in its sole discretion, to ensure it appropriately addresses any applicable legal and regulatory requirements. Bank shall periodically test and review its information security program. Bank shall respond to Customer's reasonable requests for information concerning Bank's information security program and, upon request, Bank will provide a copy of its applicable policies and procedures, or in Bank's discretion, summaries thereof, to Customer, to the extent Bank is able to do so without divulging information Bank reasonably believes to be proprietary or Bank confidential information. Upon reasonable request, Bank shall discuss with Customer the information security program of Bank. Bank also agrees, upon reasonable request, to complete any security questionnaire provided by Customer to the extent Bank is able to do so without divulging sensitive, proprietary, or Bank confidential information and return it in a commercially reasonable period of time (or provide an alternative response that reasonably addresses the points included in the questionnaire). Customer acknowledges that certain information provided by Bank, including internal policies and procedures, may be proprietary to Bank, and agrees to protect the confidentiality of all such materials it receives from Bank. Bank agrees to resolve promptly any applicable control deficiencies that come to its attention that do not meet the standards established by federal and state privacy and data security laws, rules, regulations, and/or generally accepted industry standards related to Bank's information security program. Bank shall: (i) promptly notify Customer of any confirmed unauthorized access to personal information or other confidential information of Customer ("Breach of Security"); (ii) promptly furnish to Customer appropriate details of such Breach of Security and assist Customer in assessing the Breach of Security to the extent it is not privileged information or part of an investigation; (iii) reasonably cooperate with Customer in any litigation and investigation of third parties reasonably deemed necessary by Customer to protect its proprietary and other rights; (iv) use reasonable precautions to prevent a recurrence of a Breach of Security; and (v) take all reasonable and appropriate action to mitigate any potential harm related to a Breach of Security, including any reasonable steps requested by Customer that are practicable for Bank to implement. Nothing in the immediately preceding sentence shall obligate Bank to provide Customer with information regarding any of Bank's other customers or clients that are affected by a Breach of Security, nor shall the immediately preceding sentence limit Bank's ability to take any actions that Bank believes are appropriate to remediate any Breach of Security unless such actions would prejudice or otherwise limit Customer's ability to bring its own claims or actions against third parties related to the Breach of Security. If Bank discovers or becomes aware of a suspected data or security breach that may involve an improper access, use, disclosure, or alteration of personal information or other confidential information of Customer, Bank shall, except to the extent prohibited by Applicable Law or directed otherwise by a governmental authority not to do so, promptly notify Customer that it is investigating a potential breach and keep Customer informed as reasonably practicable of material developments relating to the investigation until Bank either confirms that such a breach has occurred (in which case the first sentence of this paragraph will apply) or confirms that no data or security breach involving personal information or other confidential information of Customer has occurred. For these purposes, "personal information" shall mean (i) an individual's name (first initial and last name or first name and last name), address or telephone number plus (a) social security number, (b) driver's license number, (c) state identification card number, (d) debit or credit card number, (e) financial account 22 number, (f) passport number, or (g) personal identification number or password that would permit access to a person's account or (ii) any combination of the foregoing that would allow a person to log onto or access an individual's account. This provision will survive termination or expiration of the Agreement for so long as Bank or any Subcustodian continues to possess or have access to personal information related to Customer. Notwithstanding the foregoing "personal information" shall not include information that is lawfully obtained from publicly available information, or from federal, state or local government records lawfully made available to the general public.

  • Privacy and Data Security (a) In the prior three (3) years, the Company and its Subsidiaries have been in compliance with Privacy Laws, and in all material respects with (i) Contracts (or portions thereof) between the Company or its Subsidiaries and other Persons relating to Personal Data and (ii) applicable written policies, public statements and other public representations relating to the Processing of Personal Data, inclusive of all disclosures required by applicable Privacy Laws (“Privacy and Data Security Policies,” and together with Privacy Laws and such Contracts, “Privacy Commitments”). The execution, delivery and performance by the Company of this Agreement to which the Company is or will be a party, and the consummation of the transactions contemplated hereby or thereby, are not reasonably expected to, directly or indirectly, result in a violation of any Privacy Commitments that would be materially adverse to the Company and its Subsidiaries, taken as a whole. (b) In the prior three (3) years, the Privacy and Data Security Policies have at all times been maintained and made available to individuals in accordance with reasonable industry practices and as required by Privacy Laws, are accurate and complete and are not misleading or deceptive (including by omission). The practices of the Company or its Subsidiaries with respect to the Processing of Personal Data conform in all material respects to the Privacy and Data Security Policies that govern such Personal Data. (c) There is (and in the prior three years there has been) no material Legal Proceeding pending or, to the Company’s knowledge, threatened against or involving the Company or its Subsidiaries initiated by any Person (including (i) the Federal Trade Commission, any state attorney general or similar state official, (ii) any other Governmental authority, foreign or domestic or (iii) any regulatory or self-regulatory entity) alleging that any Processing of Personal Data by or on behalf of the Company or its Subsidiaries is or was in violation of any Privacy Commitments. To the Company’s Knowledge, there are no facts, circumstances or conditions that would reasonably be expected to form the basis for any proceeding for any potential violation of any Privacy Commitments. (d) In the prior three (3) years, (i) there has been no unauthorized access to, or unauthorized use, disclosure, or Processing of Personal Data in the possession or control of the Company or its Subsidiaries or any of its contractors with regard to any Personal Data obtained from or on behalf of the Company or its Subsidiaries (“Security Incident”), (ii) there have been no unauthorized intrusions or breaches of security into any Company IT Systems, and (iii) none of the Company or any of its Subsidiaries has notified or been required to notify any Person of any (A) loss, theft or damage of, or (B) other unauthorized or unlawful access to, or use, disclosure or other Processing of, Personal Data, except, in each case of clauses (i), (ii), and (iii), as would not have a Company Material Adverse Effect. Each of the Company and its Subsidiaries has implemented commercially reasonable administrative, physical and technical safeguards, and ensures that its contractors processing Personal Data take such safeguards to protect the confidentiality, integrity and security of Personal Data against any Security Incident, including taking all reasonable steps to safeguard and back up Personal Data. (e) Each of the Company and its Subsidiaries owns or has a license or other right to use the Company IT Systems as necessary to operate the business of each the Company or its Subsidiaries as currently conducted. All Company IT Systems are (i) free from any defect, bug, virus or programming, design or documentation error and (ii) in sufficiently good working condition to effectively perform all information technology operations necessary for the operation of businesses of the Company and its Subsidiaries (except for ordinary wear and tear), except in each case of clauses (i) and (ii), as is not and would not reasonably be expected to be, individually or in the aggregate, material to the Company and its Subsidiaries, taken as a whole. In the prior three years, there have not been any material failures, breakdowns or continued substandard performance of any Company IT Systems that have caused a material failure or disruption of the Company IT Systems other than routine failures or disruptions that have been remediated in the Ordinary Course of Business. In the past three (3) years, there have been no (except to the extent completely remediated), and to the Company’s Knowledge, there are no material security deficiencies or vulnerabilities in the Company IT Systems.

  • DATA PROTECTION AND PRIVACY 14.1 In addition to Supplier’s obligations under Sections 6, 9, 10, and 15, Supplier will comply with this Section 14 when processing Accenture Personal Data. "Accenture Personal Data" means personal data owned, licensed, or otherwise controlled or processed by Accenture including personal data processed by Accenture on behalf of its clients. “Accenture Data” means all information, data and intellectual property of Accenture or its clients or other suppliers, collected, stored, hosted, processed, received and/or generated by Supplier in connection with providing the Deliverables to Accenture, including Accenture Personal Data.

  • PERSONAL INFORMATION PRIVACY AND SECURITY CONTRACT 11 Any reference to statutory, regulatory, or contractual language herein shall be to such language as in 12 effect or as amended. 13 A. DEFINITIONS

  • Data Security and Unauthorized Data Release The Requester and Approved Users, including the Requester’s IT Director, acknowledge NIH’s expectation that they have reviewed and agree to manage the requested controlled-access dataset(s) and any Data Derivatives of controlled-access datasets according to NIH’s expectations set forth in the current NIH Security Best Practices for Controlled-Access Data Subject to the GDS Policy and the Requester’s IT security requirements and policies. The Requester, including the Requester’s IT Director, agree that the Requester’s IT security requirements and policies are sufficient to protect the confidentiality and integrity of the NIH controlled-access data entrusted to the Requester. If approved by NIH to use cloud computing for the proposed research project, as outlined in the Research and Cloud Computing Use Statements of the Data Access Request, the Requester acknowledges that the IT Director has reviewed and understands the cloud computing guidelines in the NIH Security Best Practices for Controlled-Access Data Subject to the NIH GDS Policy. The Requester and PI agree to notify the appropriate DAC(s) of any unauthorized data sharing, breaches of data security, or inadvertent data releases that may compromise data confidentiality within 24 hours of when the incident is identified. As permitted by law, notifications should include any known information regarding the incident and a general description of the activities or process in place to define and remediate the situation fully. Within 3 business days of the DAC notification, the Requester agrees to submit to the DAC(s) a detailed written report including the date and nature of the event, actions taken or to be taken to remediate the issue(s), and plans or processes developed to prevent further problems, including specific information on timelines anticipated for action. The Requester agrees to provide documentation verifying that the remediation plans have been implemented. Repeated violations or unresponsiveness to NIH requests may result in further compliance measures affecting the Requester. NIH, or another entity designated by NIH may, as permitted by law, also investigate any data security incident or policy violation. Approved Users and their associates agree to support such investigations and provide information, within the limits of applicable local, state, tribal, and federal laws and regulations. In addition, Requester and Approved Users agree to work with the NIH to assure that plans and procedures that are developed to address identified problems are mutually acceptable and consistent with applicable law.

  • Bill of Rights for Data Privacy and Security As required by Education Law Section 2-d, the Parents Bill of Rights for Data Privacy and Security and the supplemental information for the Service Agreement are included as Exhibit A and Exhibit B, respectively, and incorporated into this DPA. Contractor shall complete and sign Exhibit B and append it to this DPA. Pursuant to Education Law Section 2-d, the EA is required to post the completed Exhibit B on its website.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!