Safeguarding of Data Sample Clauses

Safeguarding of Data. Service Provider shall maintain appropriate safeguards, consistent with prevailing industry standards, against the destruction, inappropriate disclosure, wrongful access or use, loss or alteration of Novation's or either Alliance's Confidential Information in the possession of Service Provider. In any event, Service Provider shall maintain safeguards that are no less rigorous than those maintained by Service Provider for its own information of a similar nature and, in no event, less than a reasonable level of safeguards. Novation and each Alliance shall maintain appropriate safeguards, consistent with prevailing industry standards, against the destruction, inappropriate disclosure, wrongful access or use, loss or alteration of Service Provider's Confidential Information in the possession of Novation or such Alliance, as the case may be. In any event, Novation and the Alliances shall maintain safeguards that are no less rigorous than those maintained by Novation and the Alliance for their own information of a similar nature and, in no event, less than a reasonable level of safeguards.
AutoNDA by SimpleDocs
Safeguarding of Data. Neoforma shall maintain appropriate safeguards, consistent with prevailing industry standards, against the destruction, inappropriate disclosure, wrongful access or use, loss or alteration of the Novation Data in the possession of Neoforma. In any event, Neoforma shall maintain safeguards that are no less rigorous than those maintained by Neoforma for its own information of a similar nature and, in no event, less than a reasonable level of safeguards.
Safeguarding of Data. Orbis shall maintain appropriate safeguards, consistent with prevailing industry standards, against the destruction, inappropriate disclosure (including display of the Transaction Data on a non-secure browser), wrongful access or use, loss or alteration of the Transaction Data in its possession, but in no event less than reasonable safeguards.
Safeguarding of Data a GENERALLY. As between Merchant on the one hand, and Provider on the other hand, information relating to Customers, whether or not marked "confidential" and whether disclosed in tangible or in intangible (e.g., oral or visual) form, including, without limitation, all Transaction Data, is Confidential Information of Provider. Subject to the provisions of Section 9, Merchant shall have access to and may make use of Transaction Data to the extent reasonably necessary to verify payment and provide service to its Customers and as the Customer otherwise may expressly authorize and not for any other purpose. Upon expiration or termination of this Agreement for any reason, or upon Provider's request, Merchant shall promptly return to Provider all of the Transaction Data in Merchant's possession, including backup and archival copies (and shall destroy any electronic copies of the Transaction Data that it may have, in whatever form), except to the extent that Merchant is lawfully required to maintain such information.
Safeguarding of Data. 12 ARTICLE VII WAIVER ...................................................... 12
Safeguarding of Data. EDS will establish and maintain mutually acceptable, reasonable safeguards against the destruction or loss of Data in the possession of EDS. Customer will be responsible for establishment of instructions for data retention and archival including maintenance of duplicate records, and EDS will be responsible for following such instructions. Customer will duplicate critical archive files and will identify such files to EDS for permanent retention and off-site storage. If any Data are lost, damaged, or destroyed while in the sole possession or under the exclusive control of EDS because EDS has not exercised reasonable care. EDS will, at its expense, reconstruct such Data, and will reimburse Customer for amounts paid by Customer to its employees as overtime, as a result of the loss or destruction of such Data.
Safeguarding of Data. TCS shall, subject to Xxxxxxx’x approval, establish and maintain environmental, safety and facility procedures, data security procedures and other safeguards against the destruction, loss, unauthorized access or alteration of Nielsen Data in the possession of TCS which are consistent with the obligations and standards provided at Section 5.6 and as are adequate to meet the requirements of Xxxxxxx’x record retention policy and applicable Laws.
AutoNDA by SimpleDocs
Safeguarding of Data 

Related to Safeguarding of Data

  • Safeguarding Customer Information The Servicer has implemented and will maintain security measures designed to meet the objectives of the Interagency Guidelines Establishing Standards for Safeguarding Customer Information published in final form on February 1, 2001, 66 Fed. Reg. 8616 and the rules promulgated thereunder, as amended from time to time (the “Guidelines”). The Servicer shall promptly provide the Master Servicer, the Trustee and the NIMS Insurer information reasonably available to it regarding such security measures upon the reasonable request of the Master Servicer, the Trustee and the NIMS Insurer which information shall include, but not be limited to, any Statement on Auditing Standards (SAS) No. 70 report covering the Servicer’s operations, and any other audit reports, summaries of test results or equivalent measures taken by the Servicer with respect to its security measures to the extent reasonably necessary in order for the Seller to satisfy its obligations under the Guidelines.

  • Marking of Data Pursuant to Paragraph A above, any Data delivered under this Agreement shall be marked with the following legend: Use, duplication, or disclosure is subject to the restrictions as stated in Agreement HR0011-XX-9-XXXX between the Government and the Performer.

  • CONFIDENTIALITY/SAFEGUARDING OF INFORMATION The CONTRACTOR shall not use or disclose any information concerning the AGENCY, or information that may be classified as confidential, for any purpose not directly connected with the administration of this contract, except with prior written consent of the AGENCY, or as may be required by law.

  • Safeguarding The Local Authority has overarching responsibility for safeguarding and promoting the welfare of all children and young people in their area. They have a number of statutory functions under the 1989 and 2004 Children Acts which make this clear, and the ‘Working Together to Safeguard Children’ 2015 guidance1 sets these out in detail.

  • Sharing of Data (a) Sellers shall have the right for a period of not more than seven (7) years following the Closing Date to have reasonable access to such books, records and accounts, including financial, Tax and accounting records, correspondence, production records, employment records and other records that are transferred to Buyer pursuant to the terms of this Agreement for the limited purposes of concluding Sellers’ involvement with respect to the Acquired Assets and Assumed Liabilities prior to the Closing and for complying with their obligations under applicable Law. Buyer shall have the right for a period of not more than seven (7) years following the Closing Date to have reasonable access to those books, records and accounts, including financial, Tax and accounting records (including the work papers of Sellers’ independent accountants), correspondence, production records, employment records and other records that are retained by Sellers pursuant to the terms of this Agreement to the extent that any of the foregoing is needed by Buyer with respect to the Acquired Assets or Assumed Liabilities after the Closing and complying with its obligations under applicable Law. Neither Buyer, nor any Seller shall destroy, or otherwise cease to retain, any such books, records or accounts retained by it without first providing the other Parties with thirty (30) days prior written notice and the opportunity to obtain or copy such books, records, or accounts during such thirty (30)-day period at such other Party’s expense. Sellers shall, at their sole expense, undertake any and all measures required by applicable Law in connection with the delivery to Buyer of data pursuant to this paragraph, including measures relating to the use, disclosure and processing of personally identifiable information. (b) Promptly upon request by Buyer made at any time following the Closing Date, each Seller shall authorize the release to Buyer of all files pertaining to the Acquired Assets or Assumed Liabilities held by any federal, state, county or local authorities, agencies or instrumentalities.

  • Customer Information CPNI of a Customer and any other non-public, individually identifiable information about a Customer or the purchase by a Customer of the services or products of a Party.

  • Privacy of Customer Information Company Customer Information in the possession of the Agent, other than information independently obtained by the Agent and not derived in any manner from or using information obtained under or in connection with this Agreement, is and shall remain confidential and proprietary information of the Companies. Except in accordance with this Section 10.10, the Agent shall not use any Company Customer Information for any purpose, including the marketing of products or services to, or the solicitation of business from, Customers, or disclose any Company Customer Information to any Person, including any of the Agent’s employees, agents or contractors or any third party not affiliated with the Agent. The Agent may use or disclose Company Customer Information only to the extent necessary (i) for examination and audit of the Agent’s activities, books and records by the Agent’s regulatory authorities, (ii) to protect or exercise the Agent’s, the Custodian’s and the Lenders’ rights and privileges or (iii) to carry out the Agent’s, the Custodian’s and the Lenders’ express obligations under this Agreement and the other Facilities Papers (including providing Company Customer Information to Approved Investors), and for no other purpose; provided that the Agent may also use and disclose the Company Customer Information as expressly permitted by the relevant Company in writing, to the extent that such express permission is in accordance with the Privacy Requirements. The Agent shall take commercially reasonable steps to ensure that each Person to which the Agent intends to disclose Company Customer Information, before any such disclosure of information, agrees to keep confidential any such Company Customer Information and to use or disclose such Company Customer Information only to the extent necessary to protect or exercise the Agent’s, the Custodian’s and the Lenders’ rights and privileges, or to carry out the Agent’s, the Custodian’s and the Lenders’ express obligations, under this Agreement and the other Facilities Papers (including providing Company Customer Information to Approved Investors). The Agent agrees to maintain an Information Security Program and to assess, manage and control risks relating to the security and confidentiality of Company Customer Information pursuant to such program in the same manner as the Agent does so in respect of their own customers’ information, and shall implement the standards relating to such risks in the manner set forth in the Interagency Guidelines Establishing Standards for Safeguarding Company Customer Information set forth in 12 CFR Parts 30, 208, 211, 225, 263, 308, 364, 568 and 570. Without limiting the scope of the foregoing sentence, the Agent shall use at least the same physical and other security measures to protect all Company Customer Information in the Agent’s possession or control as the Agent uses for their own customers’ confidential and proprietary information.

  • Compliance with Safeguarding Customer Information Requirements The Servicer has implemented and will maintain security measures designed to meet the objectives of the Interagency Guidelines Establishing Standards for Safeguarding Customer Information published in final form on February 1, 2001, 66 Fed. Reg. 8616, and the rules promulgated thereunder, as amended from time to time (the “Guidelines”). The Servicer shall promptly provide the Seller information regarding the implementation of such security measures upon the reasonable request of the Seller.

  • Safeguarding requirements and procedures (1) The Contractor shall apply the following basic safeguarding requirements and procedures to protect covered contractor information systems. Requirements and procedures for basic safeguarding of covered contractor information systems shall include, at a minimum, the following security controls: (i) Limit information system access to authorized users, processes acting on behalf of authorized users, or devices (including other information systems). (ii) Limit information system access to the types of transactions and functions that authorized users are permitted to execute. (iii) Verify and control/limit connections to and use of external information systems. (iv) Control information posted or processed on publicly accessible information systems. (v) Identify information system users, processes acting on behalf of users, or devices. (vi) Authenticate (or verify) the identities of those users, processes, or devices, as a prerequisite to allowing access to organizational information systems. (vii) Sanitize or destroy information system media containing Federal Contract Information before disposal or release for reuse. (viii) Limit physical access to organizational information systems, equipment, and the respective operating environments to authorized individuals. (ix) Escort visitors and monitor visitor activity; maintain audit logs of physical access; and control and manage physical access devices. (x) Monitor, control, and protect organizational communications (i.e., information transmitted or received by organizational information systems) at the external boundaries and key internal boundaries of the information systems. (xi) Implement subnetworks for publicly accessible system components that are physically or logically separated from internal networks. (xii) Identify, report, and correct information and information system flaws in a timely manner. (xiii) Provide protection from malicious code at appropriate locations within organizational information systems. (xiv) Update malicious code protection mechanisms when new releases are available. (xv) Perform periodic scans of the information system and real-time scans of files from external sources as files are downloaded, opened, or executed.

  • Third-Party Information; Privacy or Data Protection Laws Each Party acknowledges that it and its respective Subsidiaries may presently have and, after the Effective Time, may gain access to or possession of confidential or proprietary Information of, or personal Information relating to, Third Parties: (i) that was received under confidentiality or non-disclosure agreements entered into between such Third Parties, on the one hand, and the other Party or the other Party’s Subsidiaries, on the other hand, prior to the Effective Time or (ii) that, as between the two parties, was originally collected by the other Party or the other Party’s Subsidiaries and that may be subject to and protected by privacy, data protection or other applicable Laws. Each Party agrees that it shall hold, protect and use, and shall cause its Subsidiaries and its and their respective Representatives to hold, protect and use, in strict confidence the confidential and proprietary Information of, or personal Information relating to, Third Parties in accordance with privacy, data protection or other applicable Laws and the terms of any agreements that were either entered into before the Effective Time or affirmative commitments or representations that were made before the Effective Time by, between or among the other Party or the other Party’s Subsidiaries, on the one hand, and such Third Parties, on the other hand.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!