Security and Privacy. Security and privacy policies for the Genesys Cloud Service addressing use of Customer Data, which are incorporated by reference and may be updated from time to time in accordance with Section 10.12 of the Agreement, are located at xxxxx://xxxx.xxxxxxxxxxx.xxx/articles/purecloud-security-compliance/.
Security and Privacy. 1. Our security and privacy policies for the PureCloud Service addressing use of Customer Data, which are incorporated by reference, are located at xxxxx://xxxx.xxxxxxxxxxx.xxx/articles/purecloud-security-compliance/.
Security and Privacy. 11.1 Supplier will implement and maintain privacy and security measures to protect DXC Data, Services and Products in accordance with the Data Network Security Schedule ("DNSS") herein below. Additionally, these terms may be updated from time to time, and any such update may be reflected on the Supplier Portal. (xxxx://xxxxxx0.xxx.xxxxxxxxxx/contact_us/downloads/Data_Network_and_Secur ity_Schedule-DNSS.pdf)) These terms may be modified from time to time. Any terms not defined within this document will rely on the definition in the DNSS.
11.2 (Intentionally Omitted).
11.3 Supplier shall only Process Data and access information systems to the extent and manner necessary to provide the Services, software or Products, in accordance with DXC’s instructions as set out in this Agreement. Any access to or use of DXC information systems or Processing of Data by or on behalf of Supplier for any other purpose shall be deemed a material breach of the Agreement by Supplier. Supplier shall not sell, rent, transfer, distribute, disclose, copy, alter, or remove Data, DXC information system, or Product unless authorized in writing by DXC. Supplier shall ensure all Processing of Data and provisioning of Services and Products complies with all Applicable Laws. If Supplier cannot Process the Data or provide Services or Products in accordance with such Applicable Laws and these terms then Supplier shall immediately notify DXC in writing.
11.4 Supplier shall develop, implement and maintain a comprehensive information security program with information security industry standard safeguards, such as ISO 27001/2, to protect Data against Security Breach and to provide secure Services or Products.
11.5 All Notifications, whether related to Security Breach, Inquiry, Product security vulnerability or non-compliance, shall be made to the DXC Cyber Defense Center via (a) email to: XXXXX@xxx.xxx in the event of a Security Incident and (b) telephonically to 0 (000) 000 0000 AMS and /or +00 0 0000 0000 International. Supplier shall use commercially reasonable efforts to provide DXC with Notification within 12 hours after Supplier becomes aware of a Security Breach.
Security and Privacy. The public internet and third party networks will be utilized to provide the Service to you. It is your responsibility to safeguard your system, through appropriate means (for example, using commercially available software), from theft, unauthorized use or system corruption. To the extent permitted by applicable law, Xxxx Canada and/or its third party service providers are not responsible for any lack of privacy or security which may be experienced with respect to the provision of the Service to you, including as a consequence of your failure to adequately safeguard your system.
Security and Privacy. 1. To protect your privacy and information about your Kasih AP Gold Account and access to your account, when you open a Kasih AP Gold Account, you must create a Password. Unless you enter the correct Password upon logging in to your Kasih AP Gold Account, we are unable to take your instructions regarding your Kasih AP Gold Account. You are responsible for, and give us your authorization to carry out, all instructions given to us online where and when your correct Password is entered to access your Kasih AP Gold Account. Kasih AP Gold will not be liable to you for any loss or claim arising out of our relying on oral or electronic instructions provided to us using your Password.
2. You accept that it is your responsibility to keep your Password confidential. You alone are responsible for your Password security. When you give us instructions by cellular phone, email, or other non- secure methods, including instructions sent through the Mobile App, we cannot guarantee confidentiality because third parties can intercept those methods of communication. If you suspect that any other person has become aware of your Password, you must immediately notify us in writing by email or via the Kasih AP Gold Application customer service chat and you agree to cooperate with us in any subsequent investigation. Until you notify us, you will be liable for all transactions that are made using your Password. In addition to Passwords, you may be required to adopt other security measures that we make available to protect the security of your information.
3. You must exercise safe security practices when accessing and conducting electronic transactions. This includes signing out and closing any online electronic transaction services once all transactions have been completed regardless of your method of accessing the Kasih AP Gold Platform. You must also maintain any security measures that we recommend relating to requirements for encryption technology, virus scanning, software, firewall systems, anti-spyware software, cybersecurity measures and similar safeguards to maintain security for all electronic transaction activities.
4. Kasih AP Gold does not store Passwords on the backend, only on the user’s phone; consequently only one device can be used by a user for one account at any point in time.
5. Every network communication with Kasih AP Gold servers is secured by the Transport Layer Security (TLS) protocol.
6. Kasih AP Gold maintains the master copy of ownership records. Records...
Security and Privacy. Each party shall implement and maintain technical and physical controls in accordance with the Data Security and Cybersecurity Program to protect the security and integrity of and prevent the theft, loss, damage and unauthorized access, use and disclosure of the other party’s Confidential Information and Personal Information. Each party agrees if the Confidential Information includes any Personal Information, to comply with all applicable privacy and data protection laws and any reasonable privacy codes or policies adopted by the party that owns the Confidential Information within a reasonable period of time after they have been provided.
Security and Privacy. 6.1. As discussed in the Documentation, each Party has obligations with respect to the security of the Services and Customer Data. Taking into account the nature and types of Customer Data, Datadog will employ administrative, physical and technical measures in accordance with applicable industry practice to protect the Services and prevent the accidental loss or unauthorized access, use, alteration or disclosure of Customer Data under its control during each Customer Order Term.
6.2. Customer is responsible for properly configuring the Services in accordance with the Documentation, enabling single sign-on for Customer’s accounts, and securing access passwords, keys, tokens or other credentials used by Customer in connection with the Services (collectively, “Customer Credentials”). Customer agrees to use reasonable efforts to prevent unauthorized access or use of the Services and to promptly notify Datadog if Customer believes (a) any Customer Credentials have been lost, stolen or made available to an unauthorized third party or (b) an unauthorized third party has accessed the Services or Customer Data.
6.3. Except for limited Personal Information in Account Data, Datadog does not require Personal Information for Customer’s access and use of the Services. Customer shall limit Personal Information in Account Data to only that necessary for the creation and administration of its Datadog accounts. With regard to Customer Data, except as may otherwise be expressly provided in applicable Supplemental Terms, Customer shall not use the Services to Process any Sensitive Information and shall use reasonable efforts to restrict the inclusion of other Personal Information in Customer Data. The Documentation provides further information on both filtering Personal Information from, and masking Personal Information in, data before they are submitted to the Services.
6.4. Datadog may Process information about Customer’s configuration and use of the Services (“Usage Data”), Customer Data and Account Data: (a) to manage Partner’s and Customer’s accounts, including to calculate fees for the Services; (b) to provide and improve the Services and Support, including to address Support Requests and troubleshoot other issues; and (c) to provide Partner, Customer and Authorized Users insights, service and feature announcements and other reporting. Datadog may also Process Usage Data that has been aggregated and/or anonymized (including, for clarity, that does not allow a third part...
Security and Privacy. Marco will provide reasonable physical, technical, and administrative measures to ensure security and controlled access to Marco systems and Client information.
Security and Privacy. The Parties acknowledge that Imaging Center is a covered entity as defined in the privacy regulations promulgated pursuant to the Health Insurance Portability and Accountability Act of 1996 ("HIPAA"). To the extent that the Students and Faculty have access to protected health information by virtue of their participation in the clinical placement program at Imaging Center, the Parties agree that said Students and Faculty are deemed to be part of Imaging Center's workforce for HIPAA compliance purposes and subject to the Imaging Center's policies and procedures governing the use and disclosure of protected health infom1ation, as defined in HIPAA, by School and School's staff. Students will be required to sign a "Student/Intern/Agency/Temporary Staff confidentiality agreement. The Parties agree that the sponsorship of a clinical placement program as contemplated by this affiliation agreement does not constitute a business associate agreement under HIPAA.
Security and Privacy. Xxxxx will provide reasonable physical, technical, and administrative measures to ensure security and controlled access to Marco systems and Client information.