Protection of Client Data Stored Within the SaaS Solution Sample Clauses

Protection of Client Data Stored Within the SaaS Solution. The Port’s confidential information, sensitive data and/or personally identifiable information may be stored within the SaaS Software. The Port requires that the Vendor understand that (1) the Port owns its own data, (2) the Vendor will provide protection against the release or transfer of that data, (3) the Vendor is required to notify the Port within two (2) hours of any breach and will provide the Port with the specific steps that will be taken if a security breach occurs or is suspected.
AutoNDA by SimpleDocs

Related to Protection of Client Data Stored Within the SaaS Solution

  • Software Ownership If Contractor develops or pays to have developed computer software exclusively with funds or proceeds from the Contract to perform its obligations under the Contract, or to perform computerized tasks that it was not previously performing to meet its obligations under the Contract, the computer software shall be exclusively owned by or licensed to the Department. If Contractor develops or pays to have developed computer software which is an addition to existing software owned by or licensed exclusively with funds or proceeds from the Contract, or to modify software to perform computerized tasks in a manner different than previously performed, to meet its obligations under the Contract, the addition shall be exclusively owned by or licensed to the Department. In the case of software owned by the Department, the Department grants to Contractor a nontransferable, nonexclusive license to use the software in the performance of the Contract. In the case of software licensed to the Department, the Department grants to Contractor permission to use the software in the performance of the Contract. This license or permission, as the case may be, terminates when Contractor has completed its work under the Contract. If Contractor uses computer software licensed to it which it does not modify or program to handle the specific tasks required by the Contract, then to the extent allowed by the license agreement between Contractor and the owner of the software, Contractor grants to the Department a continuing, nonexclusive license for either the Department or a different contractor to use the software in order to perform work substantially identical to the work performed by Contractor under the Contract. If Contractor cannot grant the license as required by this section, then Contractor shall reveal the input screens, report formats, data structures, linkages, and relations used in performing its obligations under the contract in such a manner to allow the Department or another contractor to continue the work performed by contractor under the Contract.

  • Procedures for Providing NP Through Full NXX Code Migration Where a Party has activated an entire NXX for a single Customer, or activated at least eighty percent (80%) of an NXX for a single Customer, with the remaining numbers in that NXX either reserved for future use by that Customer or otherwise unused, if such Customer chooses to receive Telephone Exchange Service from the other Party, the first Party shall cooperate with the second Party to have the entire NXX reassigned in the LERG (and associated industry databases, routing tables, etc.) to an End Office operated by the second Party. Such transfer will be accomplished with appropriate coordination between the Parties and subject to appropriate industry lead times for movements of NXXs from one switch to another. Neither Party shall charge the other in connection with this coordinated transfer.

  • Information Technology Enterprise Architecture Requirements If this Contract involves information technology-related products or services, the Contractor agrees that all such products or services are compatible with any of the technology standards found at xxxxx://xxx.xx.xxx/iot/2394.htm that are applicable, including the assistive technology standard. The State may terminate this Contract for default if the terms of this paragraph are breached.

  • Data Storage Where required by applicable law, Student Data shall be stored within the United States. Upon request of the LEA, Provider will provide a list of the locations where Student Data is stored.

  • Customer Ownership Customer owns and has sole responsibility for the accuracy, quality, integrity, and appropriateness of all original data, content and information provided to Xxxxxx Xxxxxxx in conjunction with the Services, and, when paid for, Customer will own all modified content and information as specified under the SOW (collectively the “Content,” which, together with the Customer’s trademarks or logos, are referred to as the “Customer Material).”

  • CERTIFICATION REGARDING BOYCOTTING CERTAIN ENERGY COMPANIES (Texas law as of September 1, 2021) By submitting a proposal to this Solicitation, you certify that you agree, when it is applicable, to the following required by Texas law as of September 1, 2021: If (a) company is not a sole proprietorship; (b) company has ten (10) or more full-time employees; and (c) this contract has a value of $100,000 or more that is to be paid wholly or partly from public funds, the following certification shall apply; otherwise, this certification is not required. Pursuant to Tex. Gov’t Code Ch. 2274 of SB 13 (87th session), the company hereby certifies and verifies that the company, or any wholly owned subsidiary, majority-owned subsidiary, parent company, or affiliate of these entities or business associations, if any, does not boycott energy companies and will not boycott energy companies during the term of the contract. For purposes of this contract, the term “company” shall mean an organization, association, corporation, partnership, joint venture, limited partnership, limited liability partnership, or limited liability company, that exists to make a profit. The term “boycott energy company” shall mean “without an ordinary business purpose, refusing to deal with, terminating business activities with, or otherwise taking any action intended to penalize, inflict economic harm on, or limit commercial relations with a company because the company (a) engages in the exploration, production, utilization, transportation, sale, or manufacturing of fossil fuel-based energy and does not commit or pledge to meet environmental standards beyond applicable federal and state law, or (b) does business with a company described by paragraph (a).” See Tex. Gov’t Code § 809.001(1).

  • Business Continuity Planning Supplier shall prepare and maintain at no additional cost to Buyer a Business Continuity Plan (“BCP”). Upon written request of Buyer, Supplier shall provide a copy of Supplier’s BCP. The BCP shall be designed to ensure that Supplier can continue to provide the goods and/or services in accordance with this Order in the event of a disaster or other BCP-triggering event (as such events are defined in the applicable BCP). Supplier’s BCP shall, at a minimum, provide for: (a) the retention and retrieval of data and files; (b) obtaining resources necessary for recovery, (c) appropriate continuity plans to maintain adequate levels of staffing required to provide the goods and services during a disruptive event; (d) procedures to activate an immediate, orderly response to emergency situations; (e) procedures to address potential disruptions to Supplier’s supply chain; (f) a defined escalation process for notification of Buyer, within two (2) business days, in the event of a BCP-triggering event; and (g) training for key Supplier Personnel who are responsible for monitoring and maintaining Supplier’s continuity plans and records. Supplier shall maintain the BCP and test it at least annually or whenever there are material changes in Supplier’s operations, risks or business practices. Upon Xxxxx’s written and reasonable request, Supplier shall provide Buyer an executive summary of test results and a report of corrective actions (including the timing for implementation) to be taken to remedy any deficiencies identified by such testing. Upon Xxxxx’s request and with reasonable advance notice and conducted in such a manner as not to unduly interfere with Supplier’s operations, Supplier shall give Buyer and its designated agents access to Supplier’s designated representative(s) with detailed functional knowledge of Supplier’s BCP and relevant subject matter.

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes. 11.2 We may (i) compile statistical and other information related to the performance, operation and use of the Services, and (ii) use data from the Services in aggregated form for security and operations management, to create statistical analyses, and for research and development purposes (clauses i and ii are collectively referred to as “Service Analyses”). We may make Service Analyses publicly available; however, Service Analyses will not incorporate Your Content, Personal Data or Confidential Information in a form that could serve to identify You or any individual. We retain all intellectual property rights in Service Analyses. 11.3 We may provide You with the ability to obtain certain Oracle Software (as defined below) for use with the Services. If we provide Oracle Software to You and do not specify separate terms for such software, then such Oracle Software is provided as part of the Services and You have the non-exclusive, worldwide, limited right to use such Oracle Software, subject to the terms of this Agreement and Your order (except for separately licensed elements of the Oracle Software, which separately licensed elements are governed by the applicable separate terms), solely to facilitate Your use of the Services. You may allow Your Users to use the Oracle Software for this purpose, and You are responsible for their compliance with the license terms. Your right to use any Oracle Software will terminate upon the earlier of our notice (by web posting or otherwise) or the end of the Services associated with the Oracle Software. Notwithstanding the foregoing, if Oracle Software is licensed to You under separate terms, then Your use of such software is governed by the separate terms. Your right to use any part of the Oracle Software that is licensed under the separate terms is not restricted in any way by this Agreement.

  • WASHINGTON’S ELECTRONIC BUSINESS SOLUTION (WEBS). Contractor represents and warrants that it is registered in Washington’s Electronic Business Solution (WEBS), Washington’s contract registration system and that, all of its information therein is current and accurate and that throughout the term of this Master Contract, Contractor shall maintain an accurate profile in WEBS.

  • Data Input Control It will be possible to retrospectively examine and establish whether and by whom Personal Data have been entered, modified or removed from SAP data processing systems.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!