Safeguarding Client Data Sample Clauses
The Safeguarding Client Data clause establishes the obligation of a party, typically a service provider, to protect the confidentiality, integrity, and security of any client data it handles. This clause often requires the implementation of technical and organizational measures such as encryption, access controls, and regular security audits to prevent unauthorized access, disclosure, or loss of client information. Its core practical function is to ensure that sensitive client data is adequately protected, thereby reducing the risk of data breaches and maintaining trust between the parties.
POPULAR SAMPLE Copied 1 times
Safeguarding Client Data. Supplier shall develop security policies and procedures as provided in Sections 10.3 (Safety Procedures), 10.4 (Security Procedures), and 11 (Data Backup and Disaster Plan) and as required pursuant to Section 2 (Security) of Exhibit A.2 (Cross Functional Services) designed to protect Gap against the destruction, loss, or alteration of Gap Data which shall be no less rigorous than those maintained by Supplier for its own data and shall incorporate Gap’s existing policies. Notwithstanding anything in this Agreement to the contrary, provided Supplier has performed its back-up responsibilities for Gap Data as described in Section 11.1 (Data Backup), Supplier’s sole obligation shall be to restore such data or information to the most recently available electronic back-up copy.
Safeguarding Client Data. Unisys will maintain reasonable safeguards against the destruction, loss or alteration of Client's data and data files in the possession of Unisys. Such safeguards shall be no less rigorous than those Unisys observes in safeguarding its own data of a similar type. Notwithstanding anything to the contrary contained herein, it is understood and agreed by Unisys and Client that Unisys is not providing disaster recovery services to Client hereunder unless such disaster recovery services are specifically described in the SOW.
Safeguarding Client Data. AC will establish and maintain safeguards against the destruction, loss or alteration of the data of Client in the possession of AC that are consistent with commercially reasonable standards as customarily used by AC and at least comparable to Client's current standards. In the event that additional safeguards for such data are reasonably requested by Client, AC shall provide such additional safeguards, and Client shall reimburse AC for AC's costs in providing such additional safeguards.
Safeguarding Client Data. Supplier shall develop security policies and procedures as provided in the applicable Statements of Work that are designed to protect Gap against the destruction, loss, or alteration of Gap Data which shall be no less rigorous than those maintained by Supplier for its own data and shall incorporate Gap’s existing policies. Notwithstanding anything in this Agreement to the contrary, provided Supplier has performed its back-up responsibilities for Gap Data as described in Section 11.1 (Data Backup), Supplier’s sole obligation shall be to restore such data or information to the most recently available electronic back-up copy.
Safeguarding Client Data. (a) ▇▇▇▇▇ Systems will establish and maintain commercially reasonable procedures and physical security measures to protect against the unauthorized alteration, loss, or destruction of Client's Data in ▇▇▇▇▇ Systems' possession. Except as approved by Client, such procedures and physical security measures will be no less rigorous than those in effect at the Client Facilities prior to the Effective Date. Except as allowed in Section 9.2, Client personnel will not enter any computer operations area or other restricted access area in which Services are performed without ▇▇▇▇▇ Systems' prior consent, which consent will not be unreasonably withheld.
(b) At Client's request and expense in accordance with Section 8.2, ▇▇▇▇▇ Systems will establish and maintain additional procedures and physical security measures to protect such data and information.
Safeguarding Client Data. (a) Supplier shall establish and maintain environmental, safety and facility procedures, data security procedures and other safeguards against the destruction, loss or alteration of Client Data in the possession of Supplier which are (i) no less rigorous than those that are commercially reasonable, documented and enforced by Client as of the Effective Date, which Client will provide to Supplier, and (ii) no less rigorous than those maintained by Supplier for its own information of a similar nature. At Client’s expense, Client shall have the right to establish backup security for Client Data and to keep backup copies of the Client Data in Client’s possession. No media on which Client Data is stored may be used simultaneously to store data of any other customer of Supplier.
(b) As part of the Services, Supplier shall be responsible for developing and maintaining procedures for recovering back-up copies of Client Data.
Safeguarding Client Data. ▇▇▇▇▇ Systems will prepare and deliver ------------------------ to Client, for Client's review and approval, the Disaster Recovery and Security Plan which will be a component to the Operating Procedures Manual that sets forth the procedures and physical security measures to be maintained, after Client's approval of such procedures and physical security measures, by ▇▇▇▇▇ Systems to protect against the unauthorized alteration, loss, or destruction of Client's data and information in ▇▇▇▇▇ Systems' possession or under ▇▇▇▇▇ Systems' control.
Safeguarding Client Data. IBM shall develop security policies and procedures as provided in Sections 7.3, 7.4 and 8 and Schedule A designed to protect VMU against the destruction, loss, or alteration of VMU Data. A “Security Breach” includes any actual, attempted, potential or threatened (i) breach of physical security at any IBM Service Location or any systems maintained by IBM or IBM Personnel in connection with the Services; or (ii) unauthorized acquisition of computerized data that compromises the confidentiality, integrity or availability of any such systems, VMU Data, VMU Software, or any VMU Confidential or Proprietary Information maintained, processed or transmitted by IBM.
