Record Security Sample Clauses

Record Security. Contractor shall maintain adequate record security to preserve records from events that can be reasonably anticipated such as fire, theft, and earthquakes. Electronically-maintained data and/or records shall be protected, backed up, and stored at a separate site from the original data.
AutoNDA by SimpleDocs
Record Security. Contractor shall maintain adequate record security to preserve records from events that can be reasonably anticipated such as a fire, theft, and an earthquake. Electronically-maintained data and/or records shall be protected, backed up, and stored at a separate site from the original data. 3578 3579 3580 3581 3582 3583 3584 3585 3586 3587 3588 3589 3590 3591 3592 3593
Record Security. 806 FRANCHISEE shall maintain adequate record security to preserve records from events that can be 807 reasonably anticipated such as fire, theft, and earthquake. Electronically maintained data and records 808 shall be protected and backed-up.
Record Security. CONTRACTOR shall maintain adequate record 1729 security to preserve records from events that can be reasonably anticipated such as a fire, theft, 1730 and an earthquake. Electronically-maintained data and records shall be protected and backed- 1731 up.
Record Security. Franchisee shall maintain adequate record security to preserve records from events that can be reasonably anticipated such as fire, theft, and earthquake. Electronically maintained data and records shall be protected and backed-up.
Record Security. (a) Provider shall not use any information received from the Banking Group or obtained as a result of Services performed for the Banking Group except as necessary in the ordinary course of business to perform Services hereunder. Provider shall implement appropriate administrative, technical, and physical safeguards and other appropriate measures to protect the security, confidentiality and integrity of information received from the Banking Group or in connection with the Services provided on behalf of the Bank. These measures shall be designed to ensure the security and confidentiality of such information, protect against any anticipated threats or hazards to the security or integrity of such information, and protect against unauthorized access to or use of such information that could result in substantial harm or inconvenience to any consumer.
Record Security. (a) Provider shall not use any information received from Bank or obtained as a result of Services performed for Bank except as necessary in the ordinary course of business to perform Services hereunder. Provider shall implement appropriate administrative, technical, and physical safeguards and other appropriate measures to protect the security, confidentiality and integrity of information received from Bank or in connection with the Services provided for Bank. These measures shall be designed to ensure the security and confidentiality of such information, protect against any anticipated threats or hazards to the security or integrity of such information, and protect against unauthorized access to or use of such information that could result in substantial harm or inconvenience to any consumer.
AutoNDA by SimpleDocs

Related to Record Security

  • Cyber Security Insurance for loss to the Owner due to data security and privacy breach, including costs of investigating a potential or actual breach of confidential or private information. (Indicate applicable limits of coverage or other conditions in the fill point below.) « »

  • Security Notwithstanding anything herein to the contrary, except for Section 27, to the extent requested by Indemnitee and approved by the Board, the Company may at any time and from time to time provide security to Indemnitee for the Company’s obligations hereunder through an irrevocable bank line of credit, funded trust or other collateral. Any such security, once provided to Indemnitee, may not be revoked or released without the prior written consent of Indemnitee.

  • Access and Security Customer shall employ all physical, administrative and technical controls, screening and security procedures and other safeguards necessary to: (a) securely administer the distribution and use of all Access Credentials and protect against any unauthorized access to or use of the Hosted Services; and (b) control the content and use of Customer Data, including the uploading or other provision of Customer Data for Processing by the Hosted Services.

  • Physical Security Contractor shall ensure that Medi-Cal PII is used and stored in an area that is physically safe from access by unauthorized persons during working hours and non- working hours. Contractor agrees to safeguard Medi-Cal PII from loss, theft or inadvertent disclosure and, therefore, agrees to:

  • Cybersecurity (i)(x) There has been no security breach or other compromise of or relating to any of the Company’s or any Subsidiary’s information technology and computer systems, networks, hardware, software, data (including the data of its respective customers, employees, suppliers, vendors and any third party data maintained by or on behalf of it), equipment or technology (collectively, “IT Systems and Data”) and (y) the Company and the Subsidiaries have not been notified of, and has no knowledge of any event or condition that would reasonably be expected to result in, any security breach or other compromise to its IT Systems and Data; (ii) the Company and the Subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Data and to the protection of such IT Systems and Data from unauthorized use, access, misappropriation or modification, except as would not, individually or in the aggregate, have a Material Adverse Effect; (iii) the Company and the Subsidiaries have implemented and maintained commercially reasonable safeguards to maintain and protect its material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and Data; and (iv) the Company and the Subsidiaries have implemented backup and disaster recovery technology consistent with industry standards and practices.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!