SECURITY AND DATA PROTECTION REQUIREMENTS Sample Clauses

SECURITY AND DATA PROTECTION REQUIREMENTS. 12.1 Cisco and its affiliates, representatives, agents, employees, and subcontractors shall only access Your and Your Approved Source’s and the Authorized Third PartiesCustomer Content, networks, and systems when such access is necessary to provide or otherwise deliver Cisco Technology and services contemplated herein.
AutoNDA by SimpleDocs
SECURITY AND DATA PROTECTION REQUIREMENTS. The CDT must ensure agreements with state and non-state entities include provisions, which protect and minimize risk to the state when engaging in the development, use, or maintenance of information systems, products, solutions, or services. In order to comply with the State Administrative Manual (XXX) Section 5305.8, Contractor must comply with Exhibit E, Security and Data Protection. Department of Technology PO 19-13054 EXHIBIT A-1 ACCEPTANCE DOCUMENT CONTRACTOR NAME: DEPARTMENT OF TECHNOLOGY CONTRACT NUMBER: ACCEPTANCE DOCUMENT (AD) NUMBER: TITLE: COMPLETION DATE: TOTAL COST: $ DESCRIPTION: DEPARTMENT OF TECHNOLOGY ACCEPTANCE OR REJECTION: AUTHORIZED AND APPROVED: CONTRACTOR OFFICIAL SIGNATURE / DATE DEPARTMENT OF TECHNOLOGY CONTRACT ADMINISTRATOR SIGNATURE / DATE Note: Once the Contractor and the Department of Technology have approved the AD as stipulated in the contract, the Contractor may submit an invoice to the Department of Technology. Refer to payment terms in Exhibit B. Department of Technology PO 19-13054 EXHIBIT A-2 WORK AUTHORIZATION FORM The task/deliverable(s) will be performed in accordance with this Work Authorization and the provision of Contract Number: of PAGE(S) WORK AUTHORIZATION NUMBER TITLE OF TASK/DELIVERABLE TASK/DELIVERABLE SUMMARY (Brief description of task/deliverable to be performed under work authorization) START DATE COMPLETION DATE TOTAL ESTIMATED LABOR HOURS TOTAL ESTIMATED COST APPROVALS CONTRACTOR CONTRACT ADMINISTRATOR NAME TITLE SIGNATURE DATE DEPARTMENT OF TECHNOLOGY CONTRACT ADMINISTRATOR NAME TITLE SIGNATURE DATE Department of Technology PO 19-13054 WORK AUTHORIZATIONS (WA)
SECURITY AND DATA PROTECTION REQUIREMENTS. The State must ensure Agreements with State and non-state entities include provisions which protect and minimize risk to the State when engaging in the development, use, or maintenance of information systems, products, solutions, or services. In order to comply with the State Administrative Manual (XXX) Section 5305.8, Contractor must comply with Exhibit E, Security and Data Protection.
SECURITY AND DATA PROTECTION REQUIREMENTS. SCO must ensure agreements with State and non-state entities include provisions which protect and minimize risk to the State when engaging in the development, use, or maintenance of information systems, products, solutions, or services. In order to comply with the State Administrative Manual (XXX) Section 5305.8, Contractor must comply with Exhibit E: Special Terms and Conditions.
SECURITY AND DATA PROTECTION REQUIREMENTS. The Cal OES must ensure agreements with state and non-state entities include provisions which protect and minimize risk to the state when engaging in the development, use, or maintenance of information systems, products, solutions, or services. In order to comply with the State Administrative Manual (XXX) Section 5305.8, Contractor must comply with the EXHIBIT D: CLOUD COMPUTING SERVICES SOFTWARE AS A SERVICE (SAAS) SPECIAL PROVISIONS - TELECOMMUNICATIONS (Rev. 05/03/2021) requirements. The host Cloud provider must provide FedRAMP High Certification, plus, meet the additional requirements found in XXX and CA Statewide Information Management Manual (SIMM).‌
SECURITY AND DATA PROTECTION REQUIREMENTS. The EDD must ensure agreements with state and non-state entities include provisions, which protect and minimize risk to the state when engaging in the development, use, or maintenance of information systems, products, solutions, or services. In accordance with the State Administrative Manual (XXX) Section 5305.8, Exhibit E, Security and Data Protection, California Government Code Section 1044 and Internal Revenue Service Publication 1075, Section 5.1.1, contracted employees who have access to federal tax information (FTI) are required to comply with security requirements as specified under federal and state law. All currently existing and new contracted employees with access to FTI, will be required to complete and successfully pass a background check. Access to FTI would include, but not be limited to the following access modes: • ACES • SCDB • TOP • IRS TIN verification website • Remote access to computers with FTI • Server data files with FTI • Audit documents with FTI data • Form 1099Official Personnel Files that include adverse actions with FTI data • Access to Central Office buildings • Access to areas with FT EXHIBIT B (Standard Agreement) EDD Contract No. M62980-7100 Am. 1 EDD/Maximus US Services, Inc. BUDGET DETAIL AND PAYMENT PROVISIONS

Related to SECURITY AND DATA PROTECTION REQUIREMENTS

  • Security and Data Privacy Each party will comply with applicable data privacy laws governing the protection of personal data in relation to their respective obligations under this Agreement. Where Siemens acts as Customer’s processor of personal data provided by Customer, the Data Privacy Terms available at xxxxx://xxx.xxxxxxx.xxx/dpt/sw, including the technical and organizational measures described therein, apply to the use of the relevant Offering and are incorporated herein by reference.

  • Compliance with Data Protection Laws 2.1 bookinglab shall comply with its obligations under the Data Protection Laws as they apply to it as a Data Processor of the Customer Personal Data.

  • Data Protection Act 7.1.1 The Supplier shall (and shall procure that its entire Staff) comply with any notification requirements under the DPA and both Parties will duly observe all their obligations under the DPA which arise in connection with the Contract.

  • Privacy and Data Protection 8.1 The Receiving Party undertakes to comply with South Africa’s general privacy protection in terms Section 14 of the Xxxx of Rights in connection with this Bid and shall procure that its personnel shall observe the provisions of such Act [as applicable] or any amendments and re-enactments thereof and any regulations made pursuant thereto.

  • Data Security Requirements Without limiting Contractor’s obligation of confidentiality as further described in this Contract, Contractor must establish, maintain, and enforce a data privacy program and an information and cyber security program, including safety, physical, and technical security and resiliency policies and procedures, that comply with the requirements set forth in this Contract and, to the extent such programs are consistent with and not less protective than the requirements set forth in this Contract and are at least equal to applicable best industry practices and standards (NIST 800-53). Contractor also shall provide technical and organizational safeguards against accidental, unlawful, or unauthorized access or use, destruction, loss, alteration, disclosure, transfer, commingling, or processing of such information that ensure a level of security appropriate to the risks presented by the processing of County Data, Contractor personnel and/or subcontractor personnel and affiliates approved by County to perform work under this Contract may use or disclose County personal and confidential information only as permitted in this Contract. Any other use or disclosure requires express approval in writing by the County of Orange. No Contractor personnel and/or subcontractor personnel or affiliate shall duplicate, disseminate, market, sell, or disclose County personal and confidential information except as allowed in this Contract. Contractor personnel and/or subcontractor personnel or affiliate who access, disclose, market, sell, or use County personal and confidential information in a manner or for a purpose not authorized by this Contract may be subject to civil and criminal sanctions contained in applicable federal and state statutes. Contractor shall take all reasonable measures to secure and defend all locations, equipment, systems, and other materials and facilities employed in connection with the Services against hackers and others who may seek, without authorization, to disrupt, damage, modify, access, or otherwise use Contractor systems or the information found therein; and prevent County data from being commingled with or contaminated by the data of other customers or their users of the Services and unauthorized access to any of County data. Contractor shall also continuously monitor its systems for potential areas where security could be breached. In no case shall the safeguards of Contractor’s data privacy and information and cyber security program be less stringent than the safeguards used by County. Without limiting any other audit rights of County, County shall have the right to review Contractor’s data privacy and information and cyber security program prior to commencement of Services and from time to time during the term of this Contract. All data belongs to the County and shall be destroyed or returned at the end of the contract via digital wiping, degaussing, or physical shredding as directed by County.

  • General Data Protection Regulation 10.1 Protecting your personal information is incredibly important to Excalibur. Our privacy policy which sets out how we do this is available here: xxxxx://xxx.xxxxxxxxxxxxxx.xx.xx/gdpr-policy/. This policy explains the information that we hold, how we use it, and how long we keep it for. Please take a few minutes to read it.

  • Data Protection Laws those laws applicable to the processing of personal data in the relevant jurisdictions, including but not limited to the General Data Protection Regulation 2016/679.

  • COMPLIANCE WITH BREACH NOTIFICATION AND DATA SECURITY LAWS Contractor shall comply with the provisions of the New York State Information Security Breach and Notification Act (General Business Law § 899-aa and State Technology Law § 208) and commencing March 21, 2020 shall also comply with General Business Law § 899-bb.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!