SECURITY AND PROTECTION OF INFORMATION. D1 Client Data
D1.1 The Contractor shall not delete or remove any proprietary notices contained within or relating to Client Data.
D1.2 The Contractor shall not store, copy, disclose, or use Client Data except as necessary for the performance by the Contractor of its obligations under the Contract or as otherwise expressly authorised in writing by the Client.
D1.3 To the extent that Client Data is held and/or processed by the Contractor, the Contractor shall supply that Client Data to the Client as may be requested by the Client and in the format specified by the Client.
D1.4 The Contractor shall take responsibility for preserving the integrity of Client Data and shall take all necessary steps to prevent the corruption or loss of Client Data.
D1.5 The Contractor shall perform secure back-ups of all Client Data and shall ensure that up-to-date back-ups are stored off-site in accordance with the Client’s instructions. The Contractor shall ensure that such back-ups are available to the Client at all times upon request and are delivered to the Client at agreed intervals.
D1.6 The Contractor shall ensure that any system on which the Contractor holds Client Data, including back-up data, is a secure system that complies with the Client’s current Security Policy. If any Client Data is corrupted, lost or sufficiently degraded as a result of the Contractor's Default so as to be unusable, the Client may:
(a) require the Contractor (at the Contractor's expense) to restore or procure the restoration of the Client Data to the extent required by the Client and in accordance with the Client’s security requirements and the Contractor shall do so as soon as practicable but not later than any agreed timescale; and/or
(b) itself restore or procure the restoration of the Client Data, and shall be reimbursed by the Contractor any reasonable expenses incurred in doing so to the extent required by the Client and in accordance with the Client’s security requirements.
D1.7 If at any time the Contractor suspects or has reason to believe that Client Data has or may become corrupted, lost or sufficiently degraded in any way for any reason, then the Contractor shall notify the Client immediately and inform the Client of the remedial action the Contractor proposes to take.
SECURITY AND PROTECTION OF INFORMATION. 33 13.1 Information (Electronic) Access.......................................... 34 13.2 Personnel Access......................................................... 35 13.3
SECURITY AND PROTECTION OF INFORMATION. The State considers its information and communication capabilities to be a valued and important resource. The State's systems and databases contain private and
SECURITY AND PROTECTION OF INFORMATION. The Participants will take all lawful steps to ensure that all exercise-related information or material exchanged or generated pursuant to this TA is protected from further disclosure and is not released to any government, national organisation, individual or other entity of a third party without the prior written consent of the originating Participants.
SECURITY AND PROTECTION OF INFORMATION. D1 Customer Data
D1.1 The Contractor shall not delete or remove any proprietary notices contained within or relating to Customer Data.
D1.2 The Contractor shall not store, copy, disclose, or use Customer Data except as necessary for the performance by the Contractor of its obligations under the Contract or as otherwise expressly authorised in writing by the relevant Customer.
D1.3 To the extent that Customer Data is held and/or processed by the Contractor, the Contractor shall supply that Customer Data to the relevant Customer as may be requested, and in the format specified, by the relevant Customer.
D1.4 The Contractor shall take responsibility for preserving the integrity of Customer Data and shall take all necessary steps to prevent the corruption or loss of Customer Data.
SECURITY AND PROTECTION OF INFORMATION. 10.1 SECURITY
10.1. 1Security and Policies
SECURITY AND PROTECTION OF INFORMATION. Security Requirements The Supplier shall comply, and shall procure the compliance of the Staff, with the Security Policy and the Security Management Plan (if any) and the Supplier shall ensure that the Security Management Plan produced by the Supplier fully complies with the Security Policy. The Customer shall notify the Supplier of any changes or proposed changes to the Security Policy. If the Supplier believes that a change or proposed change to the Security Policy will have a material and unavoidable cost implication to the provision of the Services it may notify the Customer. In doing so, the Supplier must support its request by providing evidence of the cause of any increased costs and the steps that it has taken to mitigate those costs. Any change to the Call Off Contract Charges shall then be subject to the Variation Procedure. Until and/or unless a change to the Call Off Contract Charges is agreed by the Customer pursuant to the Variation Procedure the Supplier shall continue to provide the Services in accordance with its existing obligations.
SECURITY AND PROTECTION OF INFORMATION. The Enterprise User’s User and System Data are private and confidential and are treated as such. Mindset Management takes all reasonable steps to secure and protect such data during hosting and transmission and to ensure that such information is handled in accordance with the Terms. However, it is possible for Internet-based communications to be intercepted or servers to be hacked. Unless otherwise stipulated in the applicable and relevant privacy and protection of information laws, regulations and code that apply to such data in the country of legal domicile of Mindset Management, Mindset Management will not be responsible for any damages the Enterprise User or any third party may suffer as a result of the hosting or transmission of confidential or disclosed information that the User makes to Mindset Management through the Internet, or that the Enterprise User expressly or implicitly authorises Mindset Management to make, or for any errors or any changes made to any transmitted information by unauthorised third parties. To ensure acquaintance with and awareness of the privacy measures and policies of Mindset Management, the Enterprise User is urged to take care to read and understand the underlying privacy clauses incorporated in these Terms.
SECURITY AND PROTECTION OF INFORMATION. 1. The protection of information exchanged or generated under this Agreement shall be regulated between the Parties through an agreement for the protection of such information.
2. Pending the entry into force of the agreement referred to in paragraph 1, all classified information obtained or exchanged directly between the Parties and information of common interest otherwise obtained by each of the Parties shall be protected in accordance with the following principles and in conformity with the domestic laws of the Parties:
(a) The receiving Party shall not provide or disseminate to third States classified information obtained under this Agreement without the prior approval of the sending Party;
(b) The receiving Party shall classify the information at the same security level as that assigned by the sending Party and shall take the consequent necessary protective measures;
(c) The information obtained shall be used only for the purpose for which it was authorized;
(d) Access to classified information shall be limited to the persons and entities authorized for such purpose, in accordance with the domestic laws of each Party;
(e) The Parties shall notify each other of changes in the security level of classified information;
(f) The receiving Party may downgrade the security level of classified information and declassify classified information, in accordance with the relevant procedures and conditions provided for in its domestic legal provisions. Such action shall be taken with the authorization of the Party that sent the information in question.
3. The respective responsibilities and obligations of the Parties with regard to the measures for the security and protection of classified information shall continue to apply even if this Agreement is no longer in force.
SECURITY AND PROTECTION OF INFORMATION. The Enterprise User’s User and System Data are private and confidential and are treated as such. Mindset Management takes all reasonable steps to secure and protect such data during hosting and transmission and to ensure that such information is handled in accordance with the Terms. However, it is possible for Internet-based communications to be intercepted or servers to be hacked. Mindset Management will not be responsible for any damages the Enterprise User or any third party may suffer as a result of the hosting or transmission of confidential or disclosed information that the User makes to Mindset Management through the Internet, or that the Enterprise User expressly or implicitly authorises Mindset Management to make, or for any errors or any changes made to any transmitted information. To ensure acquaintance with and awareness of the privacy measures and policies of Mindset Management, the Enterprise User is urged to take care to read and understand the underlying privacy clauses incorporated in these Terms. Mindset Management may use and share the User and System Data collected from the Enterprise User in accordance with the Agreement and for the reasons and uses as detailed below: • To provide the Enterprise User with an optimal Engage service and experience; • To provide the Enterprise User with the necessary customer support and assistance where required or requested; • To contact the Enterprise User regarding their account or to update the Enterprise User with respect to changes in prices, policies or the Terms; • To provide the Enterprise User with news and information about products and services. Mindset Management undertakes not to share any of the Enterprise User’s User or Systems Data that are deemed of a personal or private nature. User responses to surveys will be combined with the responses of others and made available as aggregate data. Mindset Management retains the right to transfer the User’s information to a new owner if the ownership of all or substantially all of the business should change, in which case the terms of this Agreement will still apply until the Terms are updated or amended by the acquiring party upon notice to the Enterprise User. Mindset Management may release account information or User Data when deemed, in good faith, that such release is reasonably necessary to (a) comply with law, (b) enforce or apply the terms of any user agreement or