Security and Audit. 5.1. Sage shall implement and maintain appropriate technical and organisational security measures appropriate to the risks presented by the relevant Processing activity to protect the Personal Data against unauthorised or unlawful Processing and against accidental loss, destruction, damage or disclosure. Such measures include, without limitation, the security measures set out in clause 5.3.
Security and Audit. 5.1. We shall implement and maintain appropriate technical and organisational security measures appropriate to the risks presented by the relevant Processing activity to protect the Personal Data against unauthorised or unlawful Processing and against accidental loss, destruction, damage or disclosure. Such measures include, without limitation, the security measures set out in clause 5.3 below.
Security and Audit. Licensor reserves the right to: - Embed security mechanisms within the Software Product to monitor, store and transmit information concerning usage in order to verify compliance with this License, being pointed out that such security mechanism: o Only reacts in case of non-compliance (use of an illegal copy). o Cannot access to proprietary data created by the Licensee through use of the Software Product (access to proprietary data that are created or modified or to result of creation or modification is impossible). - Use a hardware lock device, License administration software, or a License authorization key to control access to the Software Product. The Licensee may not take any steps to avoid, bypass or defeat the purpose of any such security measures. Use of the Software Product without the required lock device or without the authorization key provided by Licensor is prohibited. Licensor shall be entitled to audit the Licensee or have an audit performed on its behalf, during business hours, in order to verify that all conditions of the present License are respected. Licensor shall give prior notice at least three business days before said audit.
Security and Audit. 5.1 Heap may update the security measures set out in Schedule 2, including (where applicable) following any review by Heap of such measures, provided that such variation does not reduce the level of protection afforded to the Customer Personal Data by Heap under this DPA.
Security and Audit. 3.1 The Processor shall implement appropriate technical and organisational security measures to protect the Personal Data in accordance with Data Protection Law. The Processor shall particularly observe relevant codes of conduct, industry practice, and guidelines issued or approved by supervisory authorities.
Security and Audit. Customer will, at all times, have security provisions in place to protect the DMF from being visible, searchable, harvestable, or in any way discoverable on the World Wide Web, in compliance with this Agreement. Customer understands that any successful attempt by any person to gain unauthorized access to or use of the DMF provided by UDT may result in immediate termination of Customer’s access. In addition, any successful attempt by any person to gain unauthorized access may under certain circumstances result in penalties as prescribed in 15 CFR § 1110.200 levied on Customer and the person attempting such access. Customer will take appropriate action to ensure that all persons accessing the Limited Access DMF obtained from UDT are aware of their potential liability for misuse or attempting to gain unauthorized access. Any such access or attempted access is a breach, or attempted breach, of security and Customer must immediate- ly report the same to NTIS at xxxxxxx@xxxx.xxx; and to UDT by written notification to UDT Group, LLC, 0000-X Xxxxxx Xxxxx, Tallahassee, FL 32301, and by email (xxxxxxxxxxxxxxx@xxxxxxxxxx.xxx) and by phone (0-000-000-0000). Customer agrees to be subject to audit by UDT and/or NTIS to determine Customer’s compli- ance with the requirements of this Addendum, the Agreement, and CFR. Customer agrees to retain a list of all employees, contractors, and subcontractors to which it provides DMF and to make that list available to NTIS and/or UDT as part of any audits conducted hereunder. Customer will not resell or otherwise redistribute DMF.
Security and Audit. 16.5.1 CAW shall implement and maintain appropriate technical and organisational security measures appropriate to the risks presented by the relevant Processing activity to protect the Customer Data against unauthorised or unlawful Processing and against accidental loss, destruction, damage, or disclosure. Such measures include, without limitation, the security measures set out in Annex 1.
Security and Audit. 4.1 The Supplier shall implement and maintain appropriate technical and organisational security measures protect the ECITB Personal Data against unauthorised or unlawful Processing and against accidental loss, destruction, damage or disclosure. Such measures include, without limitation, the security measures set out in Appendix 2
Security and Audit. 4.1 Worldline shall provide the Products and Services in accordance with the services levels set forth in Schedule 6: Service Levels.
Security and Audit. 4.1. Processor shall implement appropriate technical and organizational measures for the security of the processing of Personal Data, in order to protect the Personal Data against unauthorised or unlawful processing and against accidental loss, destruction or damage. Taking into account the state of the art and the cost of their implementation, such measures shall ensure a level of security appropriate to the risks represented by the processing and the nature of the Personal Data. An overview of these technical and organisational measures shall be attached to this DPA as Exhibit 2.