System Security and Data Safeguards When SAP is given access to Licensee’s systems and data, SAP shall comply with Licensee’s reasonable administrative, technical, and physical safeguards to protect such data and guard against unauthorized access. In connection with such access, Licensee shall be responsible for providing Consultants with user authorizations and passwords to access its systems and revoking such authorizations and terminating such access, as Licensee deems appropriate from time to time. Licensee shall not grant SAP access to Licensee systems or personal information (of Licensee or any third party) unless such access is essential for the performance of Services under the Agreement. The parties agree that no breach of this provision shall be deemed to have occurred in the event of SAP non-conformance with the aforementioned safeguard but where no personal information has been compromised.
Enterprise Information Management Standards Grantee shall conform to HHS standards for data management as described by the policies of the HHS Office of Data, Analytics, and Performance. These include, but are not limited to, standards for documentation and communication of data models, metadata, and other data definition methods that are required by HHS for ongoing data governance, strategic portfolio analysis, interoperability planning, and valuation of HHS System data assets.
Information Technologies Cooperation 1. The aims of cooperation in Information Technologies sectors, carried out in the mutual interest of the Parties and in compliance with their policies, will be: (a) to focus on cooperative activities towards information technology areas where mutual and complementary interests exists; and (b) to build on existing agreements and arrangements already in place between the Parties. 2. Information Technologies cooperation may include, but not be limited to: (a) scientific and technical cooperation for the Software Industry of the Parties and encouraging cooperation in software development for populations with specific needs; (b) facilitate the cooperation on academic, industrial and entrepreneurial networks in the area of Information Technology; (c) encouraging exchange of experience on management and research and development for Information Technology Parks; (d) research and development on Information Technology products and services, integrating television, multimedia, and cellular telephones; and (e) encouraging exchange of experience for research and development in networks and telecommunications.
Information Technology Enterprise Architecture Requirements If this Contract involves information technology-related products or services, the Contractor agrees that all such products or services are compatible with any of the technology standards found at xxxxx://xxx.xx.xxx/iot/2394.htm that are applicable, including the assistive technology standard. The State may terminate this Contract for default if the terms of this paragraph are breached.
Economic Cooperation 1. The Parties will encourage the utilization of cooperation instruments and mechanisms with a view to strengthen the processes of economic integration and commercial exchange. 2. The objectives of economic cooperation will be: (a) to build on existing agreements or arrangements already in place for trade and economic cooperation; and (b) to advance and strengthen trade and economic relations between the Parties. 3. The Parties will encourage and facilitate, as appropriate, the following activities, including, but not limited to: (a) dialogue about policies and regular exchanges of information and views on ways to promote and expand trade in goods and services between the Parties; (b) joint elaboration of studies and technical projects of economic interest according to the economic development needs identified by the Parties; (c) keeping each other informed of important economic and trade issues, and any impediments to furthering their economic cooperation; (d) providing assistance and facilities to business persons and trade missions that visit the other Party with the knowledge and support of the relevant agencies; (e) supporting dialogue and exchanges of experience among the respective business communities of the Parties; (f) establishing and developing mechanisms for providing information and identifying opportunities for business cooperation, trade in goods and services, investment, and government procurement; and (g) stimulating and facilitating actions of public and/or private sectors in areas of economic interest.
Safety and Security Procedures Contractor shall maintain and enforce, at the Contractor Work Locations, industry-standard safety and physical security policies and procedures. While at each Court Work Location, Contractor shall comply with the safety and security policies and procedures in effect at such Court Work Location.
Security Safeguards (1) Each party acknowledges that it is solely responsible for determining and communicating to the other the appropriate technological, physical, and organizational security measures required to protect Personal Data.
INFORMATION ASSURANCE (a) Information provided by LOCKHEED XXXXXX to SELLER remains the property of LOCKHEED XXXXXX. SELLER shall comply with the terms of any proprietary information agreement with LOCKHEED XXXXXX and comply with all proprietary information markings and restrictive legends applied by LOCKHEED XXXXXX to anything provided hereunder to SELLER. SELLER shall not use any LOCKHEED XXXXXX provided information for any purpose except to perform this Contract and shall not disclose such information to third parties without the prior written consent of LOCKHEED XXXXXX. SELLER shall maintain data protection processes and systems sufficient to adequately protect LOCKHEED XXXXXX provided information and comply with any law or regulation applicable to such information.
Information Safeguards Business Associate will develop, document, implement, maintain and use appropriate administrative, technical and physical safeguards to preserve the integrity and confidentiality of and to prevent non-permitted use or disclosure of PHI created for or received from Recipient or its Subsidiaries. These safeguards must be appropriate to the size and complexity of Business Associate’s operations and the nature and scope of its activities. Business Associate agrees that these safeguards will meet any applicable requirements set forth by the U.S. Department of Health and Human Services, including (as of the effective date or as of the compliance date, whichever is applicable) any requirements set forth in the final HIPAA security regulations. Business Associate agrees to mitigate, to the extent practicable, any harmful effect that is known to Business Associate resulting from a use or disclosure of PHI by Business Associate in violation of the requirements of this Addendum.
Internal Investigations (A) The parties recognize that Florida Highway Patrol personnel occupy a special place in American society. Therefore, it is understood that the state has the right to expect that a professional standard of conduct be adhered to by all Florida Highway Patrol personnel regardless of rank or assignment. Since internal investigations may be undertaken to inquire into complaints of Florida Highway Patrol misconduct, the state reserves the right to conduct such investigations to uncover the facts in each case, but expressly agrees to carefully guard and protect the rights and dignity of accused personnel. In the course of an internal investigation, the investigative methods employed will be consistent with the law (including but not limited to section 112.532, Florida Statutes) and this agreement; nothing in this agreement, however, shall be deemed to diminish the rights of employees under applicable law.