Protection of Data at Rest Sample Clauses

Protection of Data at Rest. Provider shall use and employ a high standard of data protection mechanisms as is customary in the industry to protect Recipient Production Data.
AutoNDA by SimpleDocs
Protection of Data at Rest. Xxxxx.xxx will use and employ industry best practice data protection mechanisms to protect ADT Data.

Related to Protection of Data at Rest

  • Cybersecurity; Data Protection To the Company’s knowledge, the Company and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (collectively, the “Personal Data”)) used in connection with their businesses, and there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same, except in each case as would not reasonably be expected to have a Material Adverse Effect. The Company and its subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification.

  • Protection of PFPC PFPC shall be indemnified by the Fund and without liability for any action PFPC takes or does not take in reliance upon directions or advice or Oral Instructions or Written Instructions PFPC receives from or on behalf of the Fund or from counsel and which PFPC believes, in good faith, to be consistent with those directions or advice and Oral Instructions or Written Instructions. Nothing in this section shall be construed so as to impose an obligation upon PFPC (i) to seek such directions or advice or Oral Instructions or Written Instructions, or (ii) to act in accordance with such directions or advice or Oral Instructions or Written Instructions.

  • Privacy and Data Protection 8.1 The Receiving Party undertakes to comply with South Africa’s general privacy protection in terms Section 14 of the Xxxx of Rights in connection with this Bid and shall procure that its personnel shall observe the provisions of such Act [as applicable] or any amendments and re-enactments thereof and any regulations made pursuant thereto.

  • OWNERSHIP AND PROTECTION OF INFORMATION; COPYRIGHTS 6.1 All information, ideas, concepts, improvements, discoveries, and inventions, whether patentable or not, which are conceived, made, developed or acquired by Employee, individually or in conjunction with others, during Employee's employment by Employer (whether during business hours or otherwise and whether on Employer's premises or otherwise) which relate to Employer's business, products or services (including, without limitation, all such information relating to corporate opportunities, research, financial and sales data, pricing and trading terms, evaluations, opinions, interpretations, acquisition prospects, the identity of customers or their requirements, the identity of key contacts within the customer's organizations or within the organization of acquisition prospects, or marketing and merchandising techniques, prospective names, and marks) shall be disclosed to Employer and are and shall be the sole and exclusive property of Employer. Moreover, all drawings, memoranda, notes, records, files, correspondence, drawings, manuals, models, specifications, computer programs, maps and all other writings or materials of any type embodying any of such information, ideas, concepts, improvements, discoveries, and inventions are and shall be the sole and exclusive property of Employer.

  • Protection of Proprietary Rights 4.1 Right to Use Licensed Products Licensee acknowledges that no right, title, or interest, other than the right to use the Licensed Products, is transferred or granted by this Agreement. Licensee is prohibited from selling, renting, leasing, making available to third parties, and sublicensing the Licensed Products.

  • Protection of Rights Licensee shall not copy, translate, disassemble, decompile, nor reverse engineer the Software or other SAP Materials. Licensee shall not create or attempt to create the source code from the object code of the Software or other SAP Materials. Licensee is permitted to back up data in accordance with good information technology practice and for this purpose to create the necessary backup copies of the Software. Backup copies on transportable discs or other data media must be marked as backup copies and bear the same copyright and authorship notice as the original discs or other data media, unless technically infeasible. Licensee must not change or remove SAP’s copyright and authorship notices.

  • Protection of Documents All documents, records and files, in any media of whatever kind and description, relating to the business, present or otherwise, of the Company or any of its Affiliates, and any copies, in whole or in part, thereof (the “Documents”), whether or not prepared by you shall be the sole and exclusive property of the Company. You agree to safeguard all Documents and to surrender to the Company, at the time your employment terminates or at such earlier time or times as the Committee or its designee may specify, all Documents then in your possession or control.

  • Cybersecurity and Data Protection The Company and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are reasonably believed by the Company to be adequate in all material respects for, and operate and perform as required in connection with, the operation of the business of the Company and its Subsidiaries as currently conducted and, to the Company’s knowledge, are free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants, except as would not individually or in the aggregate reasonably be expected to result in a Material Adverse Effect. The Company and its Subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (“Personal Data”)) used in connection with the business of the Company and its Subsidiaries as currently conducted, and, to the knowledge of the Company, there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same, except for such failures as would not individually or in the aggregate reasonably be expected to result in a Material Adverse Effect. The Company and its Subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification, except for such failures as would not individually or in the aggregate reasonably be expected to result in a Material Adverse Effect.

  • Confidentiality/Protection of Customer Information The Company shall keep confidential and shall not divulge to any party, without the Purchaser's prior written consent, the price paid by the Purchaser for the Mortgage Loans, except to the extent that it is reasonable and necessary for the Company to do so in working with legal counsel, auditors, taxing authorities or other governmental agencies. Each party agrees that it shall comply with all applicable laws and regulations regarding the privacy or security of Customer Information and shall maintain appropriate administrative, technical and physical safeguards to protect the security, confidentiality and integrity of Customer Information, including maintaining security measures designed to meet the objectives of the Interagency Guidelines Establishing Standards for Safeguarding Customer Information, 66 Fed. Reg. 8616 (the "Interagency Guidelines"). For purposes of this Section, the term "Customer Information" shall have the meaning assigned to it in the Interagency Guidelines.

  • Protection of Developments The Contractor does hereby agree that, both before and after the termination of this Agreement, the Contractor shall perform such further acts and execute and deliver such further instruments, writings, documents and assurances (including, without limitation, specific assignments and other documentation which may be required anywhere in the world to register evidence of ownership of the rights assigned pursuant hereto) as the Company shall reasonably require in order to give full effect to the true intent and purpose of the assignment made under Section 5.3 hereof. If the Company is for any reason unable, after reasonable effort, to secure execution by the Contractor on documents needed to effect any registration or to apply for or prosecute any right or protection relating to the Developments, the Contractor hereby designates and appoints the Company and its duly authorized officers and agents as the Contractor’s agent and attorney to act for and in the Contractor’s behalf and stead to execute and file any such document and do all other lawfully permitted acts necessary or advisable in the opinion of the Company to effect such registration or to apply for or prosecute such right or protection, with the same legal force and effect as if executed by the Contractor.

Time is Money Join Law Insider Premium to draft better contracts faster.