Security and Data Protection. Contractor is responsible for the security and protection of State data subject to and related to Cloud Services in this Contract. The terms, conditions, and provisions of this Security and Data Protection section take precedence and will prevail over any other terms, conditions, and provisions of the Contract, if in conflict. This Security and Data Protection section, including its sub-sections, survives the completion, termination, expiration, or cancellation of the Contract. For the purposes of this Security and Data Protection section, the following terms have the following meanings:
Security and Data Protection. 10.1 The Air Operator undertakes to comply with the valid data protection legislation applicable to its operations. The operator acts as the controller of the processed personal data.
Security and Data Protection. 14.1 Questionmark shall maintain information and physical security policies and procedures to protect the Customer Data consistent with good industry practice.
14.2 Questionmark represents that it is certified by a reputable third party against the ISO 27001 standard or a comparable successor standard, and that its production data centre used to deliver assessments is also audited against the SSAE 18 or ISO 27001 standards or comparable successor standards. On written request, Questionmark shall provide to Customer copies of its certificates and other reasonably requested documentation about its security.
14.3 Questionmark shall use reasonable efforts to respond to Customer questions regarding Questionmark’s security practices. Any reports, summaries thereof or information provided pursuant to this clause 14 is Confidential Information of Questionmark.
14.4 Questionmark shall use commercially reasonable efforts not to include in the Services any computer viruses, malware, disabling devices or contaminants the purpose of which is to damage Customer’s computer systems (“Contaminants”), the parties agreeing that any feature of the software that monitors the service configuration or disables access to the software at the end of the Term is not a Contaminant.
14.5 The parties shall comply with their respective obligations as detailed in Schedule 1.
Security and Data Protection. The content of your emails or online appointments will not be communicated with a third party except for the purposes of supervision of my work. In this instance, your identity will not be revealed, and the presenting issues are discussed in a general context, to help ensure I am working ethically and safely with clients. I strongly recommend that online clients use an encrypted email server for sending and receiving email exchanges when engaging with counselling, this helps to ensure that our communication will not be intercepted by a third party. A free and secure email provider is xxx.xxxxxxxxxx.xxx My protonmail address is: XxxxxxxXxxxxxx0@xxxxxxxxxxx.xxxXxx contact after our initial communication would be via this email provider. In respect of online counselling via email,SMS, and webcam the UK police force and other international government authorities can ask for access to an individual’s email account or synchronous messaging account where there is suspicion of illegal activities. On this basis I am not able to guarantee confidentiality in circumstances which lead to access being granted. Where a complaint is made by a client to my professional bodyI reserve the right to breach confidentiality and to use my session notes in order to address any grievances which might occur within the OCST counselling practice. Wherever possible you will be informed of this. At the end of our counselling agreement copies of our exchanges will be stored securely offline for a period of 7 years and then destroyed by shredding after this time. I am a registered Data Controller and Data Processor and abide by the regulations imposed by such procedures. My registration number is:Z9440927.OCST has a policy for data processing and storage.The procedures in this document have been compiled in relation to GDPR (General Data Privacy Requlations) from May 26th 2018 onwards. As the Data Controller and data Processor I maintain and storebrief notes relating to your sessions. I will not share this data with someone other than yourself, unless required by a court of law. Under GDPR you have the right to request a copy of sessionrecords. Where requestedby you these will be within 30 days in electronic format, Under GDPR you have the right to ask for records to be amended if you feel they are inaccurate. If you wish to ask for an amendment or if you raise objection to any data kept by me, such objection will be stored with the original session notes. The Client agreement /assessment...
Security and Data Protection. 3.1 Protection of Customer Data. Conga has adopted and will maintain industry-standard administrative, physical, and technical safeguards designed to protect the security, privacy and integrity of Customer Data, as further described in the Data Security Exhibit found at xxxx://xxxxx.xxxxxx.xxx/#data-security-exhibit. Conga will not be responsible for loss of data processed, stored or transmitted on systems or networks not owned or operated by Conga, including the Internet.
3.2 Use of Services Attributes and Anonymized Data. Conga may collect, use and disclose quantitative and other data related to Customer’s use of the Subscription Services (“Services Attributes”) for industry benchmarking, analytics, marketing, and other business purposes. Services Attributes will be considered in the aggregate form only, and will not identify Customer or its Users (“Anonymized Data”). Conga retains all rights, title and interest in and to Anonymized Data.
Security and Data Protection. 13.1 BMC obtains annual third party security audits of the BMC Subscriptions Services (“Security Audit”) and will provide a copy of its most then-recent Security Audit upon Customer’s request, subject to confidentiality requirements.
13.2 BMC will not access Customer Data except as required to provide the Services or at Customer’s specific request. BMC has implemented and will maintain procedures to logically segregate Customer Data. BMC uses industry standard security measures to protect Customer Data.
13.3 Customer is responsible for complying with all legal requirements, including applicable privacy laws and regulations, relating to the collection, use, processing and transfer of Customer Data. BMC and Customer specifically agree that with regard to European Economic Area data protection laws (if applicable), Customer is the ‘data controller’, and BMC is the ‘data processor’. Customer and Third Party Publishers shall agree upon their respective obligations with respect to the processing of personal data by Third Party Publishers as per section 4.
1. Each party shall fulfill its respective legal obligations, including but not limited to any approval and/or notification obligations towards national data protection authorities.
13.4 BMC will process Customer Data for the purpose of providing the Services subscribed under this Agreement, in accordance with Customer’s lawful and explicit instructions and with BMC Controller and Processor Binding Corporate Rules Policy found at xxxx://xxxxx.xxx.xxx.xxx/documents/External+Privacy+Binding+Coporate+Rules+Policy+- +Aug+04.pdf (the “BCR”) with respect to compliance with data protection laws and/or regulations. The details of the BCR approval of BMC Software, Inc. are available at xxxx://xx.xxxxxx.xx/justice/data-protection/international- transfers/binding-corporate-rules/bcr_cooperation/index_en.htm. The BCR policy is incorporated into a BMC corporate wide policy, requiring all BMC entities, employees and third party providers to comply with and respect the BCR policy which is governing the collection, use, access, storage and transfer of Personal Data among BMC entities and third-party sub-processors. In the course of normal business, BMC may collect and process personal information related to Customer (mainly contact and related information) in order to perform its obligations under this Agreement, such information being referred to hereinafter as “Customer Contact Information”. Where the Customer Contact Informatio...
Security and Data Protection. The Administrator shall, at its cost and expense, implement, maintain and comply with information security and data protection procedures and safeguards consistent with industry standards for the Services provided hereunder. Such procedures and safeguards shall be designed in part, to ensure protection from loss and unauthorized disclosure of confidential information, including without limitation, all Trust Data and other Trust Confidential Information that is within the Administrator’s possession or control
Security and Data Protection. [For IT-related contracts, if you are a MNIT Consolidated agency, Contact MNIT at xxx.xxxx@xxxxx.xx.xx to determine if this section is necessary and to receive current language. For physical records contact your agency legal staff to determine if necessary and to receive current language.]
Security and Data Protection. INAP has established and shall use commercially reasonably adequate security programs and procedures relating to the Online Services and Customer Data. Each of Customer and INAP agrees to use its reasonable efforts to prevent unauthorized persons from having access to the Online Services or Site, or any equipment providing the Online Services. Each Party agrees to notify the other Party promptly upon becoming aware of any unauthorized access or use of the Online Services, Site, or Customer Data, by any third party. Except where Customer purchases Managed Services that cover any of the following, Customer shall be responsible for protection of its data against loss, damage or destruction, including, but not limited to, daily back-ups, anti-virus protection and data security measures. Customer shall backup individual computers before any Services are rendered in order to protect against any loss, damage or destruction of data. Except for the provision of Managed Services by INAP to Customer, INAP will have no responsibility or liability for lost, damaged or destroyed data, except in the event of INAP’s gross
Security and Data Protection. Taking into account the nature of the Processing, each party shall implement appropriate technical and organizational measures to ensure a level of security appropriate to the risk as set out under GDPR Article 32, and otherwise as set out under GDPR Articles 33-36 .