SECURITY AND CUSTOMER DATA Sample Clauses

SECURITY AND CUSTOMER DATA. 7.1. Xxxxxx will use commercially reasonable efforts to maintain administrative, physical, and technical safeguards to protect the Customer’s Data. Safeguards will include, but are not limited to, measures preventing physical or remote access to the Server, monitoring of remote access attempts, firewalls and appropriate software for the purposes or providing security, all of which are to be made in Xxxxxx’s sole discretion. 7.2. Athena will use industry standard encryption techniques for any data transmissions by the Server. These techniques include, but are not limited to, secure socket layer (SSL), transport layer security (TLS) and secure shell (SSH). Use of this service by the Customer will be over HTTPS protocol and Athena will provide the Customer with the required third-party verified SSL certificate. 7.3. The Software includes certain optional interfaces with third-party applications or use of external communications such as email or SMS that either does not use any encryption or the data encryption is defined by the third-party interface. Use of these features is at sole discretion and risk of the Customer. 7.4. Athena will, at all times, physically store the Customer Data and any Backups in a designated country. At no point will Athena transfer, electronically or physically, the Customer Data or any Backups to another country. Athena cannot warrant in which countries any data is routed through over the internet in the normal course of carrying out the obligations under this Agreement. Athena may, at any time, without consent and without notice, move the Customer Data to a new location provided that the new location is either within the same country of the Customer or the same designated country. The country in which the Customer Data will reside is as follows: Where Customer is located Location of physical Storage of Customer Data (including any copies of) 7.5. Xxxxxx will ensure Customer Data is backed up each day. Each Backup will be stored, and subject to paragraph 7.4 above, in at least two separate hosting facilities to ensure redundancy. The backup will occur only once each day (or for no more than a 36 hour period). Xxxxxx will retain no less than seven Backups at any one time which will be for the last 7 previous days of the Customer Data. Xxxxxx does not provide any warranty on the time of day for when the backup will occur and Customer accepts all risks associated therewith.
AutoNDA by SimpleDocs
SECURITY AND CUSTOMER DATA. 13.1 Consistent with Applicable Law, Sycous will maintain and enforce administrative, technical and physical safeguards to provide protection against unlawful loss of and unauthorised access to the Customer Data. 13.2 The Customer will ensure that: 13.2.1 all account details, including logins, passwords and any associated security information are kept secure and confidential; 13.2.2 nobody accesses any element of the Services using such details unless expressly authorised by the Customer. 13.3 Sycous’s Compliance with ISO/IEC 27001:2013 is the only security provided by Sycous for the Services. The Customer is solely responsible for: 13.3.1 determining whether that security is sufficient for its purposes; and 13.3.2 implementing any other security measures it deems necessary and/or appropriate. 13.4 Sycous reserves the right to monitor use of the Services to ensure that the Customer is complying with the terms and conditions of the Agreement.
SECURITY AND CUSTOMER DATA. 9.1. Athena will use commercially reasonable efforts to maintain administrative, physical, and technical safeguards to protect Customer Data. Safeguards will include, but are not limited to, measures preventing physical or remote access to the Server, monitoring of remote access attempts, firewalls and appropriate software for the purposes or providing security, all of which are to be made in Athena’s sole discretion. 9.2. Athena will use industry standard encryption techniques for any data transmissions by the Server. These techniques include, but are not limited to, secure socket layer (SSL), transport layer security (TLS) and secure shell (SSH). Use of this Software service by Customer will be over HTTPS protocol and Athena will provide Customer with the required third party verified SSL certificate. 9.3. The Software includes certain optional interfaces with third party applications or use of external communications such as email or SMS that either does not use any encryption or the data encryption is defined by the third party interface. Use of these features is at sole discretion and risk of Customer. 9.4. In the event that Athena becomes aware of a successful unauthorized incident resulting in access, use, disclosure, modification, or destruction of Customer Data, Athena shall notify Customer’s Security Contact as soon as practicable, but within no more than 72 hours following discovery. This notification will include (i) the identification of the records that have been or are reasonably believed to have been accessed in the incident, (ii) the date of discovery, and (iii) a general description of the nature of the incident. An incident will be considered discovered by Athena as of the first day on which such incident is known to Athena or, by exercising commercially reasonable diligence, would have been known to Athena. (a) Where required by law in certain jurisdictions, Athena will also notify the designated regulatory body, adhering to regulations as they pertain to notification timing and content. 9.5. Athena shall routinely conduct an authorized simulated attack on the Software service for the purposes of evaluating the Athena’s security measures (herein “Penetration Test”). Any Penetration Test will be performed by a reputable third party organization with capable skill and expertise to perform such test and shall occur no less than once per year or when substantial changes have occurred to the Software’s security that Xxxxxx xxxxx a Penetratio...
SECURITY AND CUSTOMER DATA. 4.1 Security. DocuSign will use commercially reasonable industry standard security technologies in providing the DocuSign Services. DocuSign has implemented and will maintain appropriate technical and organizational measures, including information security 4.2 Customer Data. Customer is responsible for Customer Data (including Customer personal data) as entered into, supplied or used by Customer and its Authorized Users in the DocuSign Services. Further, Customer is solely responsible for determining the suitability of the DocuSign Services for Customer's business and complying with any applicable data privacy and protection regulations, laws or conventions applicable to Customer Data and Customer’s use of the DocuSign Services. Customer grants to DocuSign the non-exclusive right to process Customer Data (including personal data) in accordance with the Data Protection Act 2018 for the sole purpose of and only to the extent necessary for DocuSign: (a) to provide the DocuSign Services; (b) to verify Customer’s compliance with the restrictions set forth in Section 2.2 (Restrictions) if DocuSign has a reasonable belief of Customer’s non-compliance; and (c) as otherwise set forth in the Agreement.
SECURITY AND CUSTOMER DATA. 4.1 Security. DocuSign will use commercially reasonable industry standard security technologies in providing the DocuSign Services. DocuSign has implemented and will maintain appropriate technical and organizational measures, including information security policies and safeguards, designed to preserve the security, integrity, and confidentiality of Customer Data and Customer personal data and to protect against unauthorized or unlawful disclosure or corruption of or access to such data in accordance 4.2 Customer Data. Customer is responsible for Customer Data (including Customer personal data) as entered into, supplied or used by Customer and its Authorized Users in the DocuSign Services. Further, Customer is solely responsible for determining the suitability of the DocuSign Services for Customer's business and complying with any applicable data privacy and protection regulations, laws or conventions applicable to Customer Data and Customer’s use of the DocuSign Services. Customer grants to DocuSign the non-exclusive right to process Customer Data (including personal data) in accordance with the Data Protection Attachment for DocuSign Services found at: xxxxx://xxx.xxxxxxxx.xxx/company/terms-and-conditions/data-protection-attachment, for the sole purpose of and only to the extent necessary for DocuSign: (a) to provide the DocuSign Services; (b) to verify Customer’s compliance with the restrictions set forth in Section 2.2 (Restrictions) if DocuSign has a reasonable belief of Customer’s non-compliance; and (c) as otherwise set forth in the Agreement.
SECURITY AND CUSTOMER DATA. Customer Data is owned exclusively by Customer. Company will make commercially reasonable efforts to ensure the privacy and security of Customer Data by utilizing industry standard practices, including data encryption and password protection, and by making regular scheduled data backups. Customer shall employ all physical, administrative and technical controls, screening and security procedures and other safeguards necessary to: (a) securely administer the distribution and use of all Access Credentials and protect against any unauthorized access to or use of Company Cloud Hosting; and (b) control the content and use of Customer Data, including the uploading or other provision of Customer Data. NOTWITHSTANDING ANYTHING HEREIN APPARENTLY TO THE CONTRARY, COMPANY HAS NO OBLIGATION OR LIABILITY FOR ANY LOSS, ALTERATION, DESTRUCTION, DAMAGE, CORRUPTION OR RECOVERY OF CUSTOMER DATA.
SECURITY AND CUSTOMER DATA. GDPR (EU) & HIPAA (USA). Each Party will use commercially reasonable measures to maintain and enforce physical and logical security procedures to prevent unauthorized access to and/or use of the Subscription Services and the Customer Data. Materialise shall not be responsible or liable for the disclosure of or unauthorized access to Customer Data caused by Customer, its Authorized Users, Customer’s affiliates, or the employees, agents or contractors of any of the foregoing. Customer shall have the sole responsibility for and shall maintain and verify the accuracy, quality, integrity, legality, reliability, appropriateness of and copyright permissions for all Customer Data entered into the Subscription Services. Customer represents and warrants that it has complied with all applicable data protection laws and will obtain, all right, title, and interest in and to any Customer Data provided hereunder, which may be necessary for Materialise to process such Customer Data for the purposes set forth herein, including in connection with the analysis and monitoring of Customer’s and its Authorized Users’ use of the Software and the Subscription Services and in connection with the legitimate non-commercial business and information security operations of Customer. Materialise represents to the Customer that the Subscription Services have been designed to be in compliance with the U.S. Health Insurance Portability and Accountability Act of 1996 as amended (“HIPAA”) and EU General Data Protection Regulation (“GDPR”) as of the Effective Date. If new requirements are promulgated under HIPAA or GDPR that are applicable to the Subscription Services, then Materialise shall update the Subscription Services accordingly. The Data Processor Agreement for GDPR and Business Associate Agreement for HIPAA shall be entered into between the Parties if and when personal data is being processed within the scope of the GDPR respectively HIPAA and are available here.
AutoNDA by SimpleDocs
SECURITY AND CUSTOMER DATA 

Related to SECURITY AND CUSTOMER DATA

  • Customer Data 5.1 The Customer shall own all rights, title and interest in and to all of the Customer Data and shall have sole responsibility for the legality , reliability, integrity, accuracy and quality of the Customer Data. 5.2 The Customer shall have sole responsibility for the security, back-up, archiving and recovery of Customer Data. 5.3 If the Customer utilises the customer service icon provided by the Supplier within the Software the Customer acknowledges that any Customer Data uploaded via such service will be subject to the relevant third party supplier’s Security Policy. The Supplier currently utilises the Fresh Desk application. For a copy of the Fresh Desk Security Policy see xxxxx://xxxxxxxxx.xxx/security. The Supplier accepts no liability for any Customer Data transferred through the customer service icon provided within the Software. 5.4 The Supplier shall not be responsible for any loss suffered by the Customer as a result of or arising from the destruction, alteration, or disclosure of any Customer Data caused by any third party (including any third-party providing customer service functionality in connection with the Software), except and to the extent that the Supplier is entitled to recover and has so recovered an amount (net of the costs of recovery) equal to such loss from the relevant third party. 5.5 If the Supplier processes any personal data on the Customer's behalf when performing its obligations under these Terms and Conditions of Use, the parties record their intention that the Customer shall be the data controller and the Supplier shall be a data processor and in any such case: (a) the Customer undertakes to comply with all the requirements of the Data Protection Act 1998 in connection with any personal data processed by the Supplier on the Customer's behalf when performing its obligations under these Terms and Conditions of Use ; (b) the Customer shall ensure that the Customer is entitled to transfer the relevant personal data to the Supplier so that the Supplier may lawfully process the personal data in accordance with these Terms and Conditions of Use on the Customer's behalf; (c) the Customer acknowledges and agrees that the personal data may be transferred or stored outside the EEA or the country where the Customer and the Authorised Users are located in order to carry out the Services and the Supplier's other obligations under these Terms and Conditions of Use; (d) the Customer shall ensure that the relevant third parties have been informed of, and have given their consent to, such use, processing and transfer as required by all applicable data protection legislation; (e) the Supplier shall process the personal data only in accordance with these Terms and Conditions of Use and any lawful instructions reasonably given by the Customer from time to time; (f) each party shall take appropriate technical and organisational measures against unauthorised or unlawful processing of the personal data or its accidental loss, destruction or damage; and (g) the Customer shall make and maintain all necessary registration applications within all appropriate categories under the DPA as are required in relation to any personal data processed by the Supplier on the Customer's behalf when performing its obligations under these Terms and Conditions of Use. 5.6 The Customer shall indemnify and keep indemnified the Supplier against all actions, proceedings , costs, claims, demands , liabilities , losses and expenses whatsoever arising out of or in connection with the Supplier 's processing of personal data on the Customer's behalf when performing its obligations under these Terms and Conditions of Use, save to the extent that the same is caused by or arises from the Supplier’s (or its directors, employees or sub-contractors’) negligence or breach of its obligations under these Terms and Conditions of Use.

  • Protection of Customer Data The Supplier shall not delete or remove any proprietary notices contained within or relating to the Customer Data. The Supplier shall not store, copy, disclose, or use the Customer Data except as necessary for the performance by the Supplier of its obligations under this Call Off Contract or as otherwise Approved by the Customer. To the extent that the Customer Data is held and/or Processed by the Supplier, the Supplier shall supply that Customer Data to the Customer as requested by the Customer and in the format (if any) specified by the Customer in the Call Off Order Form and, in any event, as specified by the Customer from time to time in writing. The Supplier shall take responsibility for preserving the integrity of Customer Data and preventing the corruption or loss of Customer Data. The Supplier shall perform secure back-ups of all Customer Data and shall ensure that up-to-date back-ups are stored off-site at an Approved location in accordance with any BCDR Plan or otherwise. The Supplier shall ensure that such back-ups are available to the Customer (or to such other person as the Customer may direct) at all times upon request and are delivered to the Customer at no less than six (6) Monthly intervals (or such other intervals as may be agreed in writing between the Parties). The Supplier shall ensure that any system on which the Supplier holds any Customer Data, including back-up data, is a secure system that complies with the Security Policy and the Security Management Plan (if any). If at any time the Supplier suspects or has reason to believe that the Customer Data is corrupted, lost or sufficiently degraded in any way for any reason, then the Supplier shall notify the Customer immediately and inform the Customer of the remedial action the Supplier proposes to take. If the Customer Data is corrupted, lost or sufficiently degraded as a result of a Default so as to be unusable, the Supplier may: require the Supplier (at the Supplier's expense) to restore or procure the restoration of Customer Data to the extent and in accordance with the requirements specified in Call Off Schedule 8 (Business Continuity and Disaster Recovery) or as otherwise required by the Customer, and the Supplier shall do so as soon as practicable but not later than five (5) Working Days from the date of receipt of the Customer’s notice; and/or itself restore or procure the restoration of Customer Data, and shall be repaid by the Supplier any reasonable expenses incurred in doing so to the extent and in accordance with the requirements specified in Call Off Schedule 8 (Business Continuity and Disaster Recovery) or as otherwise required by the Customer.

  • Use of Customer Data Verizon, Verizon Affiliates and their respective agents, may use, process and/or transfer Customer Data (including intra-group transfers and transfers to entities in countries that do not provide statutory protections for personal information) as set forth in the Privacy Policy and as necessary: (a) in connection with provisioning of Services; (b) to incorporate Customer Data into databases controlled by Verizon, Verizon Affiliates or their respective agents for the purpose of providing Services; administration; provisioning; invoicing and reconciliation; verification of Customer identity, solvency and creditworthiness; maintenance, support and product development; fraud detection and prevention; sales, revenue and customer analysis and reporting; market and customer use analysis including in the manner described in the Privacy Policy; and (c) to communicate to Customer regarding Services.

  • User Data We will maintain certain data that you transmit to the Services for the purpose of managing the performance of the Services, as well as data relating to your use of the Services. Although we perform regular routine backups of data, you are solely responsible for all data that you transmit or that relates to any activity you have undertaken using the Services. You agree that we shall have no liability to you for any loss or corruption of any such data, and you hereby waive any right of action against us arising from any such loss or corruption of such data.

  • Customer Information CPNI of a Customer and any other non-public, individually identifiable information about a Customer or the purchase by a Customer of the services or products of a Party.

  • Return of Customer Data Okta shall return Customer Data to Customer and, to the extent allowed by applicable law, delete Customer Data in accordance with the procedures and time periods specified in the Trust & Compliance Documentation, unless the retention of the data is requested from Okta according to mandatory statutory laws.

  • Domain Name Data 1.5.1 Query format: whois EXAMPLE.TLD 1.5.2 Response format:

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!