Security and Data Integrity Sample Clauses

Security and Data Integrity. OnSolve shall maintain industry standard physical, administrative, and technical security policies and procedures designed to protect against and prevent the loss, misuse and unauthorized access, alteration or disclosure of Content and Standard Personal Information. If OnSolve learns of any unauthorized access to Content or Standard Personal Information while in OnSolve’s care or custody, OnSolve shall, as required by Applicable Law, promptly notify Customer of such unauthorized access, and the parties agree to coordinate and cooperate in good faith on developing the content of any related public statements or any required notices for the affected persons. OnSolve may modify its security procedures from time to time in accordance with changes to industry standards, but only in a manner that retains or increases the stringency of OnSolve’s security obligations.
AutoNDA by SimpleDocs
Security and Data Integrity. 1. The Service Provider may identify security risks, breaches, or other liabilities and make specific recommendations in writing to the Client for the resolution of these risks. The Service Provider cannot be held responsible for such exploited security threats.
Security and Data Integrity. We maintain a variety of physical, electronic, and procedural safeguards to guard your personally identifiable information and CPNI. Specifically, we use commercially accepted procedures and reasonable security systems to protect against unauthorized access to our systems. We restrict access to your personally identifiable information and CPNI to those employees and contractors—all of whom are covered by this Policy—who need to know that information to provide services to you or otherwise assist you for a legitimate business reason. We protect the security of your personally identifiable information during transmission via the Lightning Communications website by using Secure Sockets Layer (“SSL”) software, which encrypts information you input, so that no one else can read it as it is transmitted over the Internet. And we use an SSL connection to enable you to view, enter, and change the information in the “Preferences” section securely on our website.
Security and Data Integrity. Each party agrees on behalf of their customers to implement such measures as to protect the security and integrity of each party’s computer systems. Each will ensure that no individual or group of individuals will be allowed access to the data or systems without prior agreement from the relevant party. Each party will ensure procedures are in place to respect the confidentiality of the information provided both in paper and electronic format.

Related to Security and Data Integrity

  • System Security and Data Safeguards When SAP is given access to Licensee’s systems and data, SAP shall comply with Licensee’s reasonable administrative, technical, and physical safeguards to protect such data and guard against unauthorized access. In connection with such access, Licensee shall be responsible for providing Consultants with user authorizations and passwords to access its systems and revoking such authorizations and terminating such access, as Licensee deems appropriate from time to time. Licensee shall not grant SAP access to Licensee systems or personal information (of Licensee or any third party) unless such access is essential for the performance of Services under the Agreement. The parties agree that no breach of this provision shall be deemed to have occurred in the event of SAP non-conformance with the aforementioned safeguard but where no personal information has been compromised.

  • Security and Data Privacy Each party will comply with applicable data privacy laws governing the protection of personal data in relation to their respective obligations under this Agreement. Where Siemens acts as Customer’s processor of personal data provided by Customer, the Data Privacy Terms available at xxxxx://xxx.xxxxxxx.xxx/dpt/sw, including the technical and organizational measures described therein, apply to the use of the relevant Learning Services and are incorporated herein by reference.

  • Data Integrity Contractor shall implement policies and procedures reasonably intended to ensure that Protected Health Information and Personally Identifiable Information in its possession is complete, accurate, and current, to the extent necessary for the Contractor’s intended purposes, and has not been altered or destroyed in an unauthorized manner.

  • Information Integrity and Security Contractor shall immediately notify County of any known or suspected breach of personal, sensitive and confidential information related to Contractor’s work under this Agreement.

  • Security and Data Transfers Party shall comply with all applicable State and Agency of Human Services' policies and standards, especially those related to privacy and security. The State will advise the Party of any new policies, procedures, or protocols developed during the term of this agreement as they are issued and will work with the Party to implement any required. Party will ensure the physical and data security associated with computer equipment, including desktops, notebooks, and other portable devices, used in connection with this Agreement. Party will also assure that any media or mechanism used to store or transfer data to or from the State includes industry standard security mechanisms such as continually up-to-date malware protection and encryption. Party will make every reasonable effort to ensure media or data files transferred to the State are virus and spyware free. At the conclusion of this agreement and after successful delivery of the data to the State, Party shall securely delete data (including archival backups) from Party’s equipment that contains individually identifiable records, in accordance with standards adopted by the Agency of Human Services. Party, in the event of a data breach, shall comply with the terms of Section 7 above.

  • Security and Safety A. The Contractor warrants it is and shall remain in compliance with all applicable local, state and federal laws, regulations, codes and ordinances relating to fire, construction, building, health, food service and safety, including but not limited to the Hotel and Motel Fire Safety Act of 1990, Public Law 101-391. The Judicial Council may terminate this Agreement, pursuant to the termination for cause provision set forth herein, without penalty or prejudice if the Contractor fails to comply with the foregoing requirements.

  • Data Security and Privacy 12.1 SERVICE PROVIDER acknowledges the importance of Data Security and agrees to adhere to the Terms and Conditions of the Data Security Policy of IIMC.

  • Security and Validation Procedures The Scheduling Coordinator shall apply to the Meter Data of the Scheduling Coordinator Metered Entities that it represents the security and validation procedures prescribed by the relevant Local Regulatory Authority. If the relevant Local Regulatory Authority has not prescribed any such procedures, the Scheduling Coordinator shall apply the procedures set forth in the CAISO Tariff. Meter Data submitted by a Scheduling Coordinator for Scheduling Coordinator Metered Entities shall conform to these standards unless the CAISO has, at its discretion, exempted the Scheduling Coordinator from these standards.

  • Security and Privacy 3. Security and privacy policies for the Genesys Cloud Service addressing use of Customer Data, which are incorporated by reference, are located at xxxxx://xxxx.xxxxxxxxxxx.xxx/articles/Genesys Cloud-security-compliance/.

  • Data Protection and Security A. In this Agreement the following terms shall have the meanings respectively ascribed to them:

Time is Money Join Law Insider Premium to draft better contracts faster.