Security and Protection Sample Clauses

Security and Protection. 8.1 Each Party will process data (whether Contract Data, Party Data or Services Data), which may include personal data (such as the personal data of end users or a Party's staff), for the purposes of performing its obligations and exercising its rights under or in connection with the DSC. 8.2 When acting as a data processor, the relevant Party shall: (a) process Controller Data: (i) only on the documented instructions of the data controller. For the purposes of the DSC, those instructions are as set out in this Clause 8, the CDSP Service Description, or as otherwise notified in writing by the data controller to the data processor. The data processor reserves the right to charge the data controller for any material change or addition to the instructions set out in the DSC; and (ii) as required by European Union or English law applicable to the data processor, in which case the data processor shall first inform the data controller of the legal requirement, unless that law prohibits such prior notification; (b) not engage any sub-processor if such engagement will have a material adverse effect on the data controller (and the relevant data controller hereby authorises the data processor to engage a sub-processor, provided such engagement will not have a material adverse effect on the data controller); (c) not transfer any Controller Data to any country or territory outside the European Economic Area without obtaining the prior written consent of the data controller and provided that such transfer also complies with Data Protection Law; (d) implement appropriate technical and organisational measures to ensure the security of the Controller Data, including protection against unauthorised or unlawful processing and against accidental loss, destruction or damage; and (e) permit the data controller, or a third party auditor acting on the data controller's behalf and bound by a confidentiality agreement that is acceptable to the data processor, to conduct, at the data controller's cost, annual audits concerning the data processor’s compliance with the DSC. The data controller is entitled to more frequent audits if this is required by Data Protection Law. The data processor may provide sufficient evidence of its compliance with these procedures in lieu of conducting any such audits. 8.3 In addition to Clause 8.1, when acting as a data processor, the relevant Party shall: (a) where this is technically possible, implement appropriate technical and organisational measur...
AutoNDA by SimpleDocs
Security and Protection. The Service Provider shall:
Security and Protection. Particular care must be taken to ensure the comfort, safety and security of tenants and adjoining householders during Work activity. All necessary reasonable action will be required to ensure the well being of both the property worked on, and those adjoining. Specifically, operatives will be required to employ the use of dustsheets and protective coverings whenever dust, dirt, paint, mortar or similar nuisance is liable to foul surrounding property, fauna or flora. Particular care must be exercised when Work is carried out in the vicinity of small children, particularly with regard to sharp tools and toxic substances being kept well out of reach. Contractor must not enter houses where children under 16 are left unaccompanied. Care and consideration will be required when working in the home of elderly or disabled tenants including any communal area, particularly with regard to restricting or impending movement around the property, tools and materials lying on floors and maintaining acceptable levels of warmth and comfort. Any complaint arising from a dispute in any form, between tenant and Contractor must be referred immediately to the Compliance Coordinator. If for any reason a Contractor feels unable to undertake specified work on a property of the Employers, the Compliance Co-Coordinator must be informed immediately. In the interests of all concerned, whenever Contractors encounter a particular difficult or a potentially violent situation they must leave the site immediately and contact Employers staff as soon as possible.
Security and Protection. I agree to read and follow the district’s Acceptable Use Policy and all other district policies related to technology and information security. ● I understand my school issued device needs to be with me at work every day and connected to the district network. ● I understand I am permitted to take my school issued device home at the end of the workday, but it must return with me to work the following day. ● I will lock my school issued device in a safe place in my classroom or office when not in use. ● I understand leaving the school issued device in a car can promote theft and damage from temperature extremes, and I will protect my assigned school issued device from these dangers. ● I understand I am expected to protect my school issued device from misuse, damage and theft. ● I understand all student data is confidential and I will protect data that is accessible through district software and programs to avoid any data breach. I will report any suspected data breach immediately to my supervisor. ● I will not share any passwords related to my school issued device or district owned software with anyone. ● I understand if my school issued device is lost or stolen, I will immediately notify my supervisor and file a report with the police. ● I understand if I damage or lose my school issued device or accessories, I may be provided a different device for instruction. ● I understand if I want to continue to use my school issued device, if I damage or lose the charger, it is my responsibility to purchase a new charger. ● I understand if the school issued device I am given becomes inoperable, I may need to use a “loaner” school issued device until the assigned school issued device is repaired and returned to me.
Security and Protection. For purposes Licensee safeguarding the Software, Licensee shall assign responsibility for security of Software, Documentation, and username(s) and password(s) required to operate the Software to the Licensee's representative selected by Licensee and such person will keep custody of the Software, Documentation, username(s) and password(s). Licensee agrees to secure and protect all original versions and copies of Software and Documentation in its possession in a manner consistent with the maintenance of Owner's rights therein, and to take appropriate action by instruction or agreement with all employees or any others who might obtain access to the Software, Documentation, username(s) and password(s). Licensee further agrees not to provide or otherwise make available the Software, Documentation, username(s) or password(s), in any form, to any other person without the express written consent of Owner. Licensee also understands and agrees that the Software is a trade secret and is the exclusive property of Owner. Licensee shall not sell, loan, give, or otherwise transfer the Software, Documentation, or username(s) and password(s) required for authentication of usage, to any third party (including a subcontractor performing work for the Licensee), without written consent from Owner. Licensee shall exercise due caution and use due care and diligence in protecting the Software so that unauthorized copies of the Software do not escape Licensee's control and Licensee shall treat the Software, Documentation, user name(s) and password(s) as confidential and protect same with the degree of care Licensee uses to protect its own confidential information which shall be not less than that of a reasonable business person. Violation of this provision shall be a material default of this XXXX and Owner may immediately terminate this XXXX without any notice to Licensee and without penalty to Owner, and Owner shall have all rights and remedies available under this XXXX and at law and in equity, including without limitation monetary damages, injunction, and specific performance. If security of the Software, username(s), password(s), or Documentation is compromised, Licensee must and shall give notice by email to Owner immediately so that new security procedures can be established. Owner may periodically require Licensee to change a password that associated with Software usage authentication.
Security and Protection. 1. The Office shall be responsible for security and maintenance of order within the Premises of the Office. 2. The Host Country shall provide to the Office and its personnel such security as is required for the effective performance of its activities. To this end, the Host Country shall take all appropriate measures to ensure the security and protection of the Premises of the Office and exercise due diligence to ensure that the tranquillity of the Premises is not disturbed by the unauthorized entry of persons or groups of persons from outside or by disturbances in their immediate vicinity. If so requested by the Head of the Office, the competent authorities of the Host Country shall take such measures as may be necessary for the preservation of law and order in the Premises of the Office or in their immediate vicinity.
Security and Protection. 5.14.1 The Parties acknowledge and agree that the HR shall carry out all law enforcement activities in accordance with the Law in relation to the Beneficiary Systems, and that the Beneficiary is responsible for obtaining any additional security services considered appropriate as per best industry practices to ensure effective protection of the Beneficiary Systems against vandalism and sabotage. 5.14.2 The Beneficiary may suspend all or part of the Beneficiary Systems Services at any time if, in its reasonable discretion, this is necessary to prevent or mitigate any substantial loss or damage to the Beneficiary Systems or any substantial threat to health or safety. 5.14.3 The Parties acknowledge and agree that the Beneficiary undertakes no obligation hereunder with respect to the operation and maintenance, protection and security of the External Water Supply System, and that these obligations will be specified exclusively in the Operation and Maintenance Agreement.
AutoNDA by SimpleDocs
Security and Protection. I agree to use company property for company use only. ___ I understand that my equipment needs to be with me every day. ___ I understand that I am permitted to take my equipment home at the end of the workday. ___ I will secure my equipment in my office when not in use. ___ I understand that leaving the equipment in a car can promote theft and damage from temperature extremes, and that I will be responsible to pay for loss or damage as a result of leaving the equipment in a car. ___ I understand that I am expected to protect my equipment from damage, and that I will be responsible for the damage. ___ I understand that if my equipment is lost or stolen, I will immediately notify Management and file a report with the police.
Security and Protection. I agree to use company property for company use only. I understand that my laptop needs to be with me every day. I understand that I am permitted to take my laptop home at the end of the workday. I will secure my laptop in my office when not in use. I understand that leaving the laptop in a car can promote theft and damage from temperature extremes, and that I will be responsible to pay for loss or damage as a result of leaving the laptop in a car. I understand that I am expected to protect my laptop from damage, and that I will be responsible for the damage. I understand that if my laptop is lost or stolen, I will immediately notify Management and file a report with the police.
Security and Protection. Open Hours
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!