Security and Privacy Controls Sample Clauses

Security and Privacy Controls. CMS shall:  Comply with the latest CMS Acceptable Risk Safeguards (ARS), which are based on the most recent NIST SP 800-53 and HHS policy and standards. The Non-CMS Organization shall:  Adhere to the security and privacy requirements specified in the Enhanced Direct Enrollment (EDE) System Security and Privacy Plan (SSP) document,9 which are specifically incorporated herein.
AutoNDA by SimpleDocs
Security and Privacy Controls. EDE Entity agrees to monitor, periodically assess, and update its security controls and related system risks to ensure the continued effectiveness of those controls in accordance with this Agreement, including the NEE SSP. Furthermore, EDE Entity agrees to timely inform the Exchange of any material change in its administrative, technical, or operational environments, or any material change that would require an alteration of the privacy and security standards within this Agreement through the EDE Entity-initiated Change Request process (Section IX.c of this Agreement).
Security and Privacy Controls. Web-broker agrees to monitor, periodically assess, and update its security and privacy controls documented in the NEE SSP and related system risks to ensure the continued effectiveness of those controls in accordance with this Agreement, including Appendix A: Privacy and Security Standards for , Appendix B: Annual Security and Privacy Assessment (SPA), NEE Information Security and Privacy Continuous Monitoring (ISCM) Strategy Guide, and the NEE SSP. Furthermore, Web-broker agrees to timely inform the Exchange of any material change in its administrative, technical, or operational environments, or any material change that would require an alteration of the privacy and security standards within this Agreement.
Security and Privacy Controls. 6.1 Controls for the Protection of Customer Data. SFDC shall maintain appropriate technical and organizational measures for protection of the security (including protection against unauthorized or unlawful Processing and against accidental or unlawful destruction, loss or alteration or damage, unauthorized disclosure of, or access to, Customer Data), confidentiality and integrity of Customer Data. Measures for the Covered Services are set forth in the Security, Privacy and Architecture Documentation found at xxxxx://xxx.xxxxxxxxxx.xxx/company/legal/agreements as updated from time to time.
Security and Privacy Controls 

Related to Security and Privacy Controls

  • Security and Privacy 3. Security and privacy policies for the Genesys Cloud Service addressing use of Customer Data, which are incorporated by reference, are located at xxxxx://xxxx.xxxxxxxxxxx.xxx/articles/Genesys Cloud-security-compliance/.

  • Data Security and Privacy 12.1 SERVICE PROVIDER acknowledges the importance of Data Security and agrees to adhere to the Terms and Conditions of the Data Security Policy of IIMC.

  • Data Security and Privacy Plan As more fully described herein, throughout the term of the Master Agreement, Vendor will have a Data Security and Privacy Plan in place to protect the confidentiality, privacy and security of the Protected Data it receives from the District. Vendor’s Plan for protecting the District’s Protected Data includes, but is not limited to, its agreement to comply with the terms of the District’s Bill of Rights for Data Security and Privacy, a copy of which is set forth below and has been signed by the Vendor. Additional components of Vendor’s Data Security and Privacy Plan for protection of the District’s Protected Data throughout the term of the Master Agreement are as follows:

  • Security and Data Privacy Each party will comply with applicable data privacy laws governing the protection of personal data in relation to their respective obligations under this Agreement. Where Siemens acts as Customer’s processor of personal data provided by Customer, the Data Privacy Terms available at xxxxx://xxx.xxxxxxx.xxx/dpt/sw, including the technical and organizational measures described therein, apply to the use of the relevant Offering and are incorporated herein by reference.

  • INFORMATION AND PRIVACY You understand and agree that in conjunction with employee training, quality control and the provision of services, we may monitor and/or electronically record cellular transmissions related to the Services, as well as conversations with you or others. Further, you understand that privacy cannot be guaranteed on telephone, cellular network and computer systems, and we shall not be liable to you for any claims, loss, damages or costs which may result from a lack of privacy experienced. You consent to us (i) using information about you and your location (collectively, “information’) to administer services, offer you new products or services, enforce the terms of this Agreement, prevent fraud and respond to regulatory and legal requirements, (ii) response to a subpoena or other such legal process, and (iii) using and sharing aggregate Subscriber information and statistics that do not include information that identifies you personally.

  • Personal Information and Privacy 9.1 We will handle Personal Information in accordance with the Privacy Legislation and our privacy policy available at xxx.xxxxxxxxxxxxxxx.xxx/xx/xxxxxxx-xxxxxx/.

  • PERSONAL INFORMATION PRIVACY AND SECURITY CONTRACT 11 Any reference to statutory, regulatory, or contractual language herein shall be to such language as in 12 effect or as amended.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!