Safeguarding of TxDOT Data Sample Clauses

Safeguarding of TxDOT Data. (i) Service Provider shall maintain a comprehensive data security program, which shall include reasonable and appropriate technical, organizational and security measures against the destruction, loss, unauthorized access or alteration of TxDOT Data in the possession of Service Provider, and which shall be (A) no less rigorous than those maintained (or required to be maintained) by TxDOT as of the Commencement Date (or required or implemented by TxDOT in the future to the extent deemed necessary by TxDOT and communicated to Service Provider in accordance with Section 6.3(a)), (B) no less rigorous than those maintained by Service Provider for its own information of a similar nature (subject, however, to Section 11.5 and implementation through Change Control upon approval by TxDOT , as applicable, but without limiting Service Provider's obligations respecting Technology Evolution), (C) no less rigorous than accepted security standards in the industry (subject, however, to Section 11.5 and implementation through Change Control upon approval by TxDOT , as applicable, but without limiting Service Provider's obligations respecting Technology Evolution), and (D) (without limiting the Parties' obligations under Section 15.11) compliant with all applicable TxDOT Rules and TxDOT Standards, including the requirements of TxDOT's then-current privacy, security and records retention policies (such as Internal Revenue Service guidelines contained within IRS Publication 1075 (found at xxxx://xxx.xxx.xxx/pub/irs-pdf/p1075.pdf) and the rules pertaining to information technology security standards found at 1 Texas Administrative Code, Chapter 202). The content and implementation of such data security program and associated technical, organizational and security measures shall be fully documented by Service Provider in the Service Management Manual. Service Provider shall permit TxDOT Auditors to review such documentation and/or to inspect Service Provider's compliance with these provisions in accordance with Section 9.9. TxDOT acknowledges that elements of Service Provider's data security program involve customized services offerings regarding the specific means and levels of security protection selected by a customer (regarding, for example, desired levels of host and network intrusion detection services, methods for monitoring and limiting access to data, extent of desired encryption, etc.), and TxDOT agrees that the specific services selected by TxDOT pursuant to this Agre...
AutoNDA by SimpleDocs

Related to Safeguarding of TxDOT Data

  • Safeguarding 2.10. The Local Authority has overarching responsibility for safeguarding and promoting the welfare of all children and young people in their area. They have a number of statutory functions under the 1989 and 2004 Children Acts which make this clear, and the ‘Working Together to Safeguard Children’ 2015 guidance1 sets these out in detail.

  • Safeguarding of Information 8(1) Where a Crown Servant or Government Contractor, by virtue of his position as such, has in his possession or under his control any document or other article which it would be an offence under any of the foregoing provisions of this Act for him to disclose without lawful authority he is guilty of an offence if –

  • Safeguarding Information Not to use or disclose any information concerning a recipient of services under this contract for any purpose not in conformity with state and federal law except upon written consent of the recipient, or the responsible parent or guardian when authorized by law.

  • CONFIDENTIALITY/SAFEGUARDING OF INFORMATION The CONTRACTOR shall not use or disclose any information concerning the AGENCY, or information that may be classified as confidential, for any purpose not directly connected with the administration of this contract, except with prior written consent of the AGENCY, or as may be required by law.

  • Personal Data, Confidentiality, Recording of Telephone Calls and Records 22.1. The Company may collect client information directly from the Client (in his completed Account Opening Application Form or otherwise) or from other persons including, for example, the credit reference agencies, fraud prevention agencies, banks, other financial institutions, third authentication service providers and the providers of public registers.

  • Processing of Customer Personal Data 3.1 UKG will:

  • Information Safeguards Business Associate will develop, document, implement, maintain and use appropriate administrative, technical and physical safeguards to preserve the integrity and confidentiality of and to prevent non-permitted use or disclosure of PHI created for or received from Recipient or its Subsidiaries. These safeguards must be appropriate to the size and complexity of Business Associate’s operations and the nature and scope of its activities. Business Associate agrees that these safeguards will meet any applicable requirements set forth by the U.S. Department of Health and Human Services, including (as of the effective date or as of the compliance date, whichever is applicable) any requirements set forth in the final HIPAA security regulations. Business Associate agrees to mitigate, to the extent practicable, any harmful effect that is known to Business Associate resulting from a use or disclosure of PHI by Business Associate in violation of the requirements of this Addendum.

  • SAFEGUARDING CHILDREN AND VULNERABLE ADULTS 8.1 The Service Provider will have ultimate responsibility for the management and control of any Regulated Activity provided under this agreement and for the purposes of the Safeguarding Vulnerable Groups Xxx 0000.

  • Confidentiality and Safeguarding Information 1. Each Party may have access to confidential information made available by the other. The provisions of the Florida Public Records Act, Chapter 119, F.S., and other applicable state and federal laws will govern disclosure of any confidential information received by the State of Florida.

  • Customer Information CPNI of a Customer and any other non-public, individually identifiable information about a Customer or the purchase by a Customer of the services or products of a Party.

Time is Money Join Law Insider Premium to draft better contracts faster.