Privacy and Security Measures Sample Clauses

Privacy and Security Measures. Contractor represents and warrants it has established and will maintain privacy and security measures that meet or exceed the standards set in laws, rules, and regulations applicable to the safeguarding, security, and privacy of Agency Data. Contractor shall monitor, periodically assess, and update its physical, technical, and logical security controls and risk to ensure continued effectiveness of those controls.
AutoNDA by SimpleDocs
Privacy and Security Measures. County represents and warrants it has established and will maintain privacy and security measures that meet or exceed the standards set in laws, rules, and regulations applicable to the safeguarding, security and privacy of Data, including Client Records, all Information Assets, regardless of the media, and all Network and Information Systems. County shall monitor, periodically assess, and update its security controls and risk to ensure continued effectiveness of those controls.
Privacy and Security Measures. The Member Information and Payment Information may be stored for internal purposes and The Factory reserves the right to access, monitor and retrieve information for compliance with this agreement. The Factory will not disclose any Member Information or Payment Information, except as described in this agreement and The Factory privacy policy accessible at xxx.xxxxxxxxxxxxx.xx/xxxxxxx-xxxxxx. The Factory will continue to keep in place of security measures in the effort to protect all Member Information and Payment Information held by The Factory from unauthorized use, access, disclosure, distribution, loss or alteration. The Factory employees physical, administrative, contractual and technological safeguards to protect member information and payment information. Access to Member Information and Payment Information will be restricted to authorized personnel who require the information in order to perform their duties and carry out this Agreement.
Privacy and Security Measures. You are responsiblefortaking all reasonable measures to safeguard Personal Information and for ensuring the security of any devices used to access CareConnect and all codes or passwords that enable access to CareConnect by Supervised Persons. In particular, You will:
Privacy and Security Measures. Geecko must collect certain information in order to operate this Website and to fulfill your requests or enable participation in certain online activities. But Geecko respects the privacy of its visitors, and is especially mindful of protecting the privacy of young children visiting our sites. Please visit our website xxxxx://xxxxxxxxx.xxxxxxxx.xxx/ to review our Privacy Policy. We have adopted reasonable security measures to protect against the loss, misuse, and alteration of the personal information under our control.
Privacy and Security Measures. 11.1. The Parties undertake to take all necessary measures for the security and protection of information and documents. 11.2. The User undertakes to take appropriate measures to preserve confidentiality, prevent unauthorized use and protect data from unauthorized access by third parties, as well as to ensure the safety of his\her mobile device and is personally responsible in case of access to his\her mobile device by third parties. 11.3. The User's personal data is confidential. The Bank guarantees the inadmissibility of disclosure of personal data by the User and their dissemination without a reason. 11.4. The Bank has the right to disclose information about the User when: a. such information is publicly available; b. disclosed at the request or with the permission of the User; c. subject to provision to the Bank's counterparties in the amount necessary for the Bank to fulfill the terms of this Agreement; d. requires disclosure on the grounds provided for by law, and in other cases provided for by this Agreement and other agreements between the User and the Bank. 11.5. The Bank guarantees and improves the protection of the User's information and funds by monitoring threats coming from third parties or malicious programs and applications. In turn, the User undertakes to take precautions to ensure the safety of information, means of use and operations from third parties when using the “OFB Mobile” application. 11.6. the User is inactive for 5 (five) minutes, for security purposes the Bank will automatically end the session of using the system. The user needs to re- authenticate in the system. 11.7. In order to effectively prevent direct or indirect penetration into the bank of persons from the List provided by the Department for Combating Economic Crimes, as well as to prevent fraudulent transactions by users of the mobile application who have been identified, it is allowed to attach bank plastic cards in the mobile application belonging only to the users of the mobile application themselves. 11.8. The User, after installing the mobile application on his\her mobile phone (a personal phone that only the User has access) and during the entire period of using the mobile application, undertakes to take the following security measures: 11.8.1. Set the screen lock of the mobile device using a password (digital, graphic key, if the phone supports – Touch-ID and Face-ID, etc.) to access the mobile application. At the same time, the password must exclude the possi...
Privacy and Security Measures. GOV2 represents and warrants it has established and will maintain privacy and security measures that meet or exceed the standards set in laws, rules, and regulations applicable to the safeguarding, security and privacy of all Information Assets, including Client Records, regardless of the media, and all Network and Information Systems. GOV2 shall monitor, periodically assess, and update its security controls and risk to ensure continued effectiveness of those controls.
AutoNDA by SimpleDocs
Privacy and Security Measures. In this Agreement, you have agreed to take steps to protect your User Name, Password, personal health information including downloaded information. Once you have viewed information, it is your responsibility to protect it. Here are the recommended steps you should take to protect your information or, if you are a Proxy, the information of the individual who has granted you access to his or her personal health information (you may choose to take other steps as well):  Keep your User Name and Password confidential.  Sign out of your account every time when you are finished using the Portal (before closing the Internet browser window or computer you are using).Change your Password immediately if you believe that someone else knows your Password. If asked to “save your Password”, you should answer “no”. Passwords saved on a local computer or other device increase the risk of someone else accessing your Account.  Ensure that no one is “shoulder-surfing” or watching you when you are viewing your information. Choose a private space (like your home) in preference to a public space (e.g., on public transportation) to access the Portal. Avoid using free or untrusted wireless Internet (‘Wi-Fi’) to access the Portal. Free Wi-Fi is easily compromised.  Protect your health information (e.g., clinic notes and appointments) and general health information (like a pamphlet about a health condition) that you download or print.  Do not download documents to a public or shared computer. Store it in a safe location (like a locked cabinet or on a personal electronic device that is encrypted).
Privacy and Security Measures. ProTechnology must collect certain information in order to operate this Website and to fulfill your requests or enable participation in certain online activities. But ProTechnology respects the privacy of its visitors, and is especially mindful of protecting the privacy of people visiting our sites. Please click here to review our Privacy Policy.
Privacy and Security Measures. Subrecipient represents and warrants it has established and will maintain privacy and security measures that meet or exceed the standards set in laws, rules, and regulations applicable to the safeguarding, security and privacy of Data, including Client Records, all Information Assets, regardless of the media, and all Network and Information Systems. Subrecipient shall monitor, periodically assess, and update its security controls and risk to ensure continued effectiveness of those controls.
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!