Safeguarding of Ascension Health Data Sample Clauses

Safeguarding of Ascension Health Data. (i) Supplier and Subcontractors to whom Ascension Health Data is provided shall maintain a comprehensive data security program, which shall include reasonable and appropriate technical, organizational and security measures against the destruction, loss, unauthorized access or alteration of Ascension Health Data in the possession of Supplier or such Subcontractors, and which shall be (1) no less rigorous than those maintained by Ascension Health or any other Eligible Recipient as of the Commencement Date (or implemented by Ascension Health or another Eligible Recipient in the future to the extent deemed necessary by Ascension Health) and, subject to Supplier’s Transition obligations, of which Supplier has been given prior written notice or has actual notice, (2) no less rigorous than those maintained by Supplier for its own information of a similar nature, (3) adequate to meet the requirements of Ascension Health’s and the Eligible Recipient’s privacy, security and records retention policies as each may be modified and replaced from time to time; and (4) no less rigorous than required by applicable Laws. The data security program and associated technical, organizational and security measures shall comply in all material respects with the Information Security Management System (ISMS) family of standards as published by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC), also known as the ISO/IEC 27000 series, as each may be modified or replaced from time to time. The content and implementation of the data security program and associated technical, organizational and security measures shall be fully documented in writing by Supplier. Supplier shall permit Ascension Health to review such documentation and/or to inspect Supplier’s compliance with such program in accordance with Section 9.10. Supplier shall not use Ascension Health Data in contravention of the Ethical and Religious Directives. Supplier shall segregate Ascension Health Data from all of Supplier’s other client data during all phases of data processing, including within Supplier’s tools (e.g., AHtoCharge). Supplier shall keep Ascension Health Data physically and logically separated from Supplier’s other clients’ data. Supplier will certify annually that it is using Ascension Health Data, including Ascension Health Data that has been De-identified (as defined in Section 13.2(f) below), only as expressly permitted by this Agreement by comp...
AutoNDA by SimpleDocs

Related to Safeguarding of Ascension Health Data

  • Security Against Unauthorized Use of Funds’ Recordkeeping Systems Financial Intermediary agrees to provide such security as is necessary to prevent any unauthorized use of the Funds’ recordkeeping system, accessed via (a) the world wide web or any URL maintained by the Funds or JPMDS, (b) a networking/data access arrangement or (c) computer hardware or software provided to Financial Intermediary by JPMDS.

  • Third-Party Information; Privacy or Data Protection Laws Each Party acknowledges that it and members of its Group may presently have and, following the Effective Time, may gain access to or possession of confidential or proprietary information of, or personal information relating to, Third Parties (i) that was received under confidentiality or non-disclosure agreements entered into between such Third Parties, on the one hand, and the other Party or members of such Party’s Group, on the other hand, prior to the Effective Time; or (ii) that, as between the two Parties, was originally collected by the other Party or members of such Party’s Group and that may be subject to and protected by privacy, data protection or other applicable Laws. Each Party agrees that it shall hold, protect and use, and shall cause the members of its Group and its and their respective Representatives to hold, protect and use, in strict confidence the confidential and proprietary information of, or personal information relating to, Third Parties in accordance with privacy, data protection or other applicable Laws and the terms of any agreements that were either entered into before the Effective Time or affirmative commitments or representations that were made before the Effective Time by, between or among the other Party or members of the other Party’s Group, on the one hand, and such Third Parties, on the other hand.

  • Information Technology The Company’s and the Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) operate and perform in all material respects as required in connection with the operation of the business of the Company and the Subsidiaries as currently conducted. The Company, and the Subsidiaries maintain commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and all personal, personally identifiable, sensitive, confidential or regulated data (“Personal Data”) processed and stored thereon, and to the knowledge of the Company, there have been no breaches, incidents, violations, outages, compromises or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same. The Company and the Subsidiaries are presently in compliance in all material respects with all applicable laws or statutes and all applicable judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification, except for any such noncompliance that would not have a Material Adverse Effect.

  • Security and Safeguarding Information (a) Confidential Information that contains Non-Public Personal Information about customers is subject to the protections created by the Xxxxx-Xxxxx-Xxxxxx Act of 1999 (the “Act”) and under the standards for safeguarding Confidential Information, 16 CFR Part 314 (2002) adopted by Federal Trade Commission (“FTC”) (the “Safeguards Rule”). Additionally, state specific laws may regulate how certain confidential or personal information is safeguarded. The parties agree with respect to the Non-Public Personal Information to take all appropriate measures in accordance with the Act, and any state specific laws, as are necessary to protect the security of the Non-Public Personal Information and to specifically assure there is no disclosure of the Non-Public Personal Information other than as authorized under the Act, and any state specific laws, and this Agreement. With respect to Confidential Information, including Non-Public Personal Information and Personally Identifiable Financial Information as applicable, each of the parties agrees that:

  • Confidentiality/Protection of Customer Information The Company shall keep confidential and shall not divulge to any party, without the Purchaser's prior written consent, the price paid by the Purchaser for the Mortgage Loans, except to the extent that it is reasonable and necessary for the Company to do so in working with legal counsel, auditors, taxing authorities or other governmental agencies. Each party agrees that it shall comply with all applicable laws and regulations regarding the privacy or security of Customer Information and shall maintain appropriate administrative, technical and physical safeguards to protect the security, confidentiality and integrity of Customer Information, including maintaining security measures designed to meet the objectives of the Interagency Guidelines Establishing Standards for Safeguarding Customer Information, 66 Fed. Reg. 8616 (the "Interagency Guidelines"). For purposes of this Section, the term "Customer Information" shall have the meaning assigned to it in the Interagency Guidelines.

  • Compliance with Safeguarding Customer Information Requirements The Servicer has implemented and will maintain security measures designed to meet the objectives of the Interagency Guidelines Establishing Standards for Safeguarding Customer Information published in final form on February 1, 2001, 66 Fed. Reg. 8616, and the rules promulgated thereunder, as amended from time to time (the “Guidelines”). The Servicer shall promptly provide the Seller information regarding the implementation of such security measures upon the reasonable request of the Seller.

  • Safeguarding Customer Information The Servicer has implemented and will maintain security measures designed to meet the objectives of the Interagency Guidelines Establishing Standards for Safeguarding Customer Information published in final form on February 1, 2001, 66 Fed. Reg. 8616 and the rules promulgated thereunder, as amended from time to time (the “Guidelines”). The Servicer shall promptly provide the Master Servicer, the Trustee and the NIMS Insurer information reasonably available to it regarding such security measures upon the reasonable request of the Master Servicer, the Trustee and the NIMS Insurer which information shall include, but not be limited to, any Statement on Auditing Standards (SAS) No. 70 report covering the Servicer’s operations, and any other audit reports, summaries of test results or equivalent measures taken by the Servicer with respect to its security measures to the extent reasonably necessary in order for the Seller to satisfy its obligations under the Guidelines.

  • Customer Information The Dealer Manager will use commercially reasonable efforts to provide the Company with any and all subscriber information that the Company requests in order for the Company to comply with the requirements under Section 5(l) above.

  • Authorization to Release and Transfer Necessary Personal Information The Grantee hereby explicitly and unambiguously consents to the collection, use and transfer, in electronic or other form, of the Grantee’s personal data by and among, as applicable, the Company and its Subsidiaries for the exclusive purpose of implementing, administering and managing the Grantee’s participation in the Plan. The Grantee understands that the Company may hold certain personal information about the Grantee, including, but not limited to, the Grantee’s name, home address and telephone number, date of birth, social security number (or any other social or national identification number), salary, nationality, job title, number of Award Units and/or shares of Common Stock held and the details of all Award Units or any other entitlement to shares of Common Stock awarded, cancelled, vested, unvested or outstanding for the purpose of implementing, administering and managing the Grantee’s participation in the Plan (the “Data”). The Grantee understands that the Data may be transferred to the Company or to any third parties assisting in the implementation, administration and management of the Plan, that these recipients may be located in the Grantee’s country or elsewhere, and that any recipient’s country (e.g., the United States) may have different data privacy laws and protections than the Grantee’s country. The Grantee understands that he or she may request a list with the names and addresses of any potential recipients of the Data by contacting his or her local human resources representative or the Company’s stock plan administrator. The Grantee authorizes the recipients to receive, possess, use, retain and transfer the Data, in electronic or other form, for the sole purpose of implementing, administering and managing the Grantee’s participation in the Plan, including any requisite transfer of such Data to a broker or other third party assisting with the administration of Award Units under the Plan or with whom shares of Common Stock acquired pursuant to the vesting of the Award Units or cash from the sale of such shares may be deposited. Furthermore, the Grantee acknowledges and understands that the transfer of the Data to the Company or to any third parties is necessary for the Grantee’s participation in the Plan. The Grantee understands that the Grantee may, at any time, view the Data, request additional information about the storage and processing of the Data, require any necessary amendments to the Data or refuse or withdraw the consents herein by contacting the Grantee’s local human resources representative or the Company’s stock plan administrator in writing. The Grantee further acknowledges that withdrawal of consent may affect his or her ability to vest in or realize benefits from the Award Units, and the Grantee’s ability to participate in the Plan. For more information on the consequences of refusal to consent or withdrawal of consent, the Grantee understands that he or she may contact his or her local human resources representative or the Company’s stock plan administrator.

  • MANUAL PROCESSING PROCEDURES The purchase, redemption and settlement of Shares of a Fund will normally follow the Fund/SERV-Defined Contribution Clearance and Settlement Service (“DCCS”) Processing Procedures below and the rules and procedures of the SCC Division of the National Securities Clearing Corporation (“NSCC”) shall govern the purchase, redemption and settlement of Shares of the Funds through NSCC by the Dealer. In the event of equipment failure or technical malfunctions or the parties’ inability to otherwise perform transactions pursuant to the FUND/SERV Processing Procedures, or the parties’ mutual consent to use manual processing, the Manual Processing Procedures below will apply. It is understood and agreed that, in the context of Section 22 of the 1940 Act and the rules and public interpretations thereunder by the staff of the Securities and Exchange Commission (SEC Staff), receipt by the Dealer of any Instructions from the Client-shareholder prior to the Close of Trade on any Business Day shall be deemed to be receipt by the Funds of such Instructions solely for pricing purposes and shall cause purchases and sales to be deemed to occur at the Share Price for such Business Day, except as provided in 4(c) of the Manual Processing Procedures. Each Instruction shall be deemed to be accompanied by a representation by the Dealer that it has received proper authorization from each Client-shareholder whose purchase, redemption, account transfer or exchange transaction is effected as a result of such Instruction.

Time is Money Join Law Insider Premium to draft better contracts faster.