Personal Data; Data Security Sample Clauses

Personal Data; Data Security. You will not transfer to us or provide us any access to any Protected Data in connection with the Agreement, except for Protected Data related to your contact persons or uploaded or transferred to the MCE Service. We have implemented appropriate technical, organizational, and security measures designed to safeguard and protect Protected Data provided by you to us and we may access, use and transfer such Protected Data to our Affiliates and third parties (including those located outside of the European Economic Area) only for the purposes of fulfilling our obligations and exercising our rights, providing information to you and complying with our legal and auditing requirements. If you upload or transfer Protected Data to the MCE Service, you will enable encryption of report caches and intelligent cubes which are saved to disk. e. 個人資料與資料安全。除與您的連絡人有關的或者上傳或傳輸到 MCE 服務的受保護資料外,您不得將與本協定有關的任何受保護資料轉移給我們或向我們提供存取權限。我們已經採取旨在保障和保護您向我們提供的受保護資料的適當的技術、組織和安全措施,並且我們僅可為履行我們的義務、行使我們的權利、向您提供資訊以及遵守我們的法律和查核要求而存取、使用以及向我們的關係企業和協力廠商(包括位於歐洲經濟區以外的協力廠商)轉移該等受保護資料。如果您將受保護資料上傳或轉移至 MCE 服務,您將啟用儲存于磁碟之報告緩存和智能多維數據集的加密。
AutoNDA by SimpleDocs
Personal Data; Data Security. 6.1. Vendor shall not (a) sell Personal Data received or collected in connection with the Agreement, (b) retain, use, or disclose Personal Data for any purpose other than for the specific business purpose of the provision of the Service, Content, Vendor Technology, Support, Maintenance, or Professional Services in connection with the Agreement, or (c) retain, use or disclose Personal Data outside of the direct business relationship between Vendor and Customer. Vendor shall comply with the restrictions and obligations under Privacy Laws, including the restrictions and obligations in the previous sentence. In addition, Vendor shall comply with any amendments of Privacy Laws or future Laws promulgated under the Privacy Laws as necessary for Vendor to qualify as a service provider under such Privacy Laws.
Personal Data; Data Security. You will not transfer to us or provide us any access to any Protected Data in connection with the Agreement, except for Protected Data related to your contact persons or uploaded or transferred to the MCE Service. We have implemented appropriate technical, organizational, and security measures designed to safeguard and protect Protected Data provided by you to us and we may access, use and transfer such Protected Data to our Affiliates and third parties (including those located outside of the European Economic Area) only for the purposes of fulfilling our obligations and exercising our rights, providing information to you and complying with our legal and auditing requirements. If you upload or transfer Protected Data to the MCE Service, you will enable encryption of report caches and intelligent cubes which are saved to disk.
Personal Data; Data Security. (a) The Company has complied and is in compliance with, and caused its operations and activities to be in compliance with all (i) Privacy Policies, (ii) applicable Laws and (iii) Contracts to which the Company is a party or which otherwise bind the Company in the case of (ii) and (iii) relating to (A) the data protection data privacy or data security or (B) the collection, storage, use, transfer and any other processing of any Personal Data collected, stored, processed or used by or on behalf of the Company in any manner or stored or maintained by third parties on behalf of the Company. The Company has obtained all requisite Consents of Governmental Authorities or other Governmental Authorizations and all requisite Consents from each Person subject of the Personal Data (including in each case any required notices to such Persons) to the extent required under applicable Law or the data protection policies and contractual and fiduciary obligations of the Company. The execution, delivery and performance of this Agreement, including the transfer of data or databases or the change of data controller and data processor related thereto, complies with applicable Law and with the applicable notices and policies of the Company relating to data protection, data privacy and Personal Data. There have been no complaints, claims or warnings made or concerns raised by any Person (including any Governmental Authority) in respect of the Company’s compliance with the same.
Personal Data; Data Security. Sellers and Acquired Entities have taken reasonable steps (including implementing, and monitoring compliance with, adequate measures with respect to technical and physical security) to protect the information technology systems used in connection with the Business and to ensure that all Personal Data is protected against loss and against unauthorized access, use, modification, disclosure or other misuse, as set forth in applicable Law (and where applicable Law does not determine such measures, pursuant to industry standard), including implementing reasonable disaster recovery and security plans and procedures. To the Knowledge of Sellers, there have been no actual or potential unauthorized intrusions or breaches of the security of the information technology systems used in connection with the operation of the Business nor any loss, theft, or unauthorized access to or misuse of Personal Data. Sellers, Acquired Entities and the conduct and operation of the Business as currently conducted is in material compliance with Sellers’ and Acquired Entities’ rules, policies, and procedures regarding Personal Data and any Material Contracts by which Sellers or Acquired Entities are bound regarding Personal Data.
Personal Data; Data Security 

Related to Personal Data; Data Security

  • Privacy and Data Security (a) The parties will keep confidential any information regarding the Trust, the Variable Accounts, and Contract Owners received in connection with providing services and meeting their respective obligations hereunder, except: (a) as necessary to provide the services or otherwise meet their respective obligations under this Agreement; (b) as necessary to comply with applicable law; and (c) information regarding the Trust or Variable Accounts which is otherwise publicly available. The parties will maintain internal safekeeping procedures to safeguard and protect the confidentiality of the data transmitted to another party or its designees or agents in accordance with Section 248.11 of Regulation S-P (17 CFR 248.1–248.30) (“Reg S-P”) and any other applicable federal or state privacy laws and regulations, including without limitation 201 CFR 17.00 et seq. and applicable security breach notification regulations (collectively “Privacy Laws”). Each party shall use such data solely to effect the services contemplated herein, and none of the parties will directly, or indirectly through an affiliate, disclose any non-public personal information protected under Privacy Laws (“Non-public Personal Information”) received from another party to any person that is not an affiliate, designee, service provider, or agent of the receiving party and provided that any such information disclosed to an affiliate, designee, service provider, or agent will be under the same or substantially similar contractual limitations on use and non-disclosure and will comply with all legal requirements. The Company will not use information, including Non-public Personal Information, directly or indirectly provided to it by Nationwide or its designees or agents pursuant to this Agreement for the purpose of marketing to Contract Owners or any other similar purpose, except as may be agreed by the parties hereto. Except for confidential information consisting of Non-public Personal Information, which will be governed in all respects in accordance with the immediately preceding sentence, confidential information does not include information which (i) was publicly known and/or was in the possession of the party receiving confidential information (“Receiving Party”) from other sources prior to the Receiving Party’s receipt of confidential information from the party disclosing confidential information (“Disclosing Party”), or (ii) is or becomes publicly available other than as a result of a disclosure by the Receiving Party or its representatives, or (iii) is or becomes available to the Receiving Party on a non-confidential basis from a source (other than the Disclosing Party) which, to the best of the Receiving Party’s knowledge, is not prohibited from disclosing such information to the Receiving Party by a legal, contractual, or fiduciary obligation to the Disclosing Party, or (iv) describes the fees payable to Nationwide under this Agreement.

  • Personal Data Registry Operator shall (i) notify each ICANN-­‐accredited registrar that is a party to the registry-­‐registrar agreement for the TLD of the purposes for which data about any identified or identifiable natural person (“Personal Data”) submitted to Registry Operator by such registrar is collected and used under this Agreement or otherwise and the intended recipients (or categories of recipients) of such Personal Data, and (ii) require such registrar to obtain the consent of each registrant in the TLD for such collection and use of Personal Data. Registry Operator shall take reasonable steps to protect Personal Data collected from such registrar from loss, misuse, unauthorized disclosure, alteration or destruction. Registry Operator shall not use or authorize the use of Personal Data in a way that is incompatible with the notice provided to registrars.

  • Data Security The Provider agrees to utilize administrative, physical, and technical safeguards designed to protect Student Data from unauthorized access, disclosure, acquisition, destruction, use, or modification. The Provider shall adhere to any applicable law relating to data security. The provider shall implement an adequate Cybersecurity Framework based on one of the nationally recognized standards set forth set forth in Exhibit “F”. Exclusions, variations, or exemptions to the identified Cybersecurity Framework must be detailed in an attachment to Exhibit “H”. Additionally, Provider may choose to further detail its security programs and measures that augment or are in addition to the Cybersecurity Framework in Exhibit “F”. Provider shall provide, in the Standard Schedule to the DPA, contact information of an employee who XXX may contact if there are any data security concerns or questions.

  • Personal Information 23.1 Subject to any applicable laws, the Licensee authorises XXXXX to:

  • Cybersecurity; Data Protection To the Company’s knowledge, the Company and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (collectively, the “Personal Data”)) used in connection with their businesses, and there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same, except in each case as would not reasonably be expected to have a Material Adverse Effect. The Company and its subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification.

Time is Money Join Law Insider Premium to draft better contracts faster.