Security Compliance. Apple will take appropriate steps to ensure compliance with security procedures by its employees, contractors and sub processors and Apple shall ensure that any persons authorized to process Personal Data comply with applicable laws regarding the confidentiality and security of Personal Data with regards to the Service.
Security Compliance. Contractor is responsible for establishing an information security program and maintaining physical, technical, administrative, and organizational safeguards that comply with applicable industry standards and guidelines. Contractor shall materially comply with Washington Office of the Chief Information Officer (OCIO) statewide information technology policies 141.10 – Securing Information Technology Assets Standards and 188 - Accessibility, as applicable, for Purchaser and for Contractor’s products implemented by Purchaser. Such policies are located on the OCIO website at: xxxxx://xxxx.xx.xxx//policies.
Security Compliance. Supplier agrees to comply with all provisions of the then-current Commonwealth of Virginia security procedures, published by the Virginia Information Technologies Agency (VITA) and which may be found at (xxxx://xxx.xxxx.xxxxxxxx.xxx/library/default.aspx?id=537#securityPSGs) or a successor URL(s), as are pertinent to Supplier's operation. Supplier further agrees to comply with all provisions of the relevant Authorized User’s then-current security procedures as are pertinent to Supplier’s operation and which have been supplied to Supplier by such Authorized User. Supplier shall also comply with all applicable federal, state and local laws and regulations. For any individual Authorized User location, security procedures may include but not be limited to: background checks, records verification, photographing, and fingerprinting of Supplier’s employees or agents. Supplier may, at any time, be required to execute and complete, for each individual Supplier employee or agent, additional forms which may include non-disclosure agreements to be signed by Supplier’s employees or agents acknowledging that all Authorized User information with which such employees and agents come into contact while at the Authorized User site is confidential and proprietary. Any unauthorized release of proprietary or Personal information by the Supplier or an employee or agent of Supplier shall constitute a breach of its obligations under this Section and the Contract. Supplier shall immediately notify VITA and Authorized User, if applicable, of any Breach of Unencrypted and Unredacted Personal Information, as those terms are defined in Virginia Code 18.2- 186.6, and other personal identifying information, such as insurance data or date of birth, provided by VITA or Authorized User to Supplier. Supplier shall provide VITA the opportunity to participate in the investigation of the Breach and to exercise control over reporting the unauthorized disclosure, to the extent permitted by law. Supplier shall indemnify, defend, and hold the Commonwealth, VITA, the Authorized User, their officers, directors, employees and agents harmless from and against any and all fines, penalties (whether criminal or civil), judgments, damages and assessments, including reasonable expenses suffered by, accrued against, or charged to or recoverable from the Commonwealth, VITA, the Authorized User, their officers, directors, agents or employees, on account of the failure of Supplier to perform its obligations pur...
Security Compliance. R3 will take appropriate steps to ensure compliance with Security Measures by its employees, contractors and Subprocessors to the extent applicable to their scope of performance, including ensuring that all persons authorized to process personal data have committed themselves to confidentiality or are under an appropriate statutory obligation of confidentiality. If R3 becomes aware of any data incidents, R3 will follow steps outlined above in the security incident identification section.
Security Compliance. DCC shall be entitled to carry out such security audits as it may reasonably deem necessary in order to ensure that the Contractor maintains compliance with its security obligations under a Call-Off Contract or this Framework Agreement.
Security Compliance. (i) In connection with any use of Licensed Content, Licensee shall implement and maintain copy protection and DRM technology and systems, consistent with accepted industry practices (collectively, "Security Systems") with respect the Service under its supervision and/or control, including Secured Servers and operating systems, that:
(A) are designed to prevent unauthorized reproduction and distribution of Licensed Content;
(B) encrypt Licensed Content with a reasonably current version of DRM technology accepted within the industry;
(C) are sufficient to track and enforce the use and other license limitations contemplated by this Agreement; and
(D) generally meet or exceed accepted industry practices for the licensed delivery of music via digital transmission. Provided however, Licensee may distribute MP3 files in an unprotected format when the distribution of such files is expressly approved by Licensor.
(ii) If Licensor has a good-faith basis to believe that Licensee is not in compliance with such Security Systems, Licensor shall be entitled, upon thirty (30) business days' prior written notice to Licensee, to conduct or have a third party conduct an examination (a "Security Compliance Examination") of the operations and Security Systems of Licensee solely with respect to rights covered by this Agreement. Licensee shall make commercially reasonable efforts to cooperate with Licensor and/or Licensor's qualified designated representative regarding such Compliance Examination. Licensor's shall not conduct any Security Compliance Examinations of Licensee more frequently than once every twelve (12) months.
Security Compliance. Business Associate agrees to implement administrative, physical and technical safeguards that reasonably and appropriately protect the confidentiality, integrity and availability of the electronic protected health information that it creates, receives, maintains, or transmits on behalf of the Covered Entity, and will require that its agents and contractors to whom it provides such information do the same. Further, Business Associate agrees to comply with Covered Entity’s security policies and procedures. Business Associate also agrees to provide Covered Entity with access to and information concerning Business Associate’s security and confidentiality policies, processes, and practices that affect electronic PHI provided to or created by Business Associate pursuant to the Agreement upon reasonable request of the Covered Entity. Covered Entity shall determine if Business Associate’s security and confidentiality practices, policies, and processes comply with HIPAA and all regulations promulgated under HIPAA. Additionally, Business Associate will immediately report to Covered Entity any Security Incident of which it becomes aware.
Security Compliance. Customer and its Customer Representatives shall comply with all Security and Access Policies.
Security Compliance. Each Party shall take appropriate measures to ensure compliance with the above-mentioned security measures by its employees and subcontractors, in particular by ensuring that all persons authorised to handle Data are committed to maintain confidentiality or are subject to an appropriate legal obligation of confidentiality.
Security Compliance. Upon reasonable notice to Seller, Seller shall permit the Company, its auditors, designated audit representatives, and regulators including data protection regulators, to audit and inspect, at the Company sole expense, and no more often than once per year Seller’s security practices with regard to the Company Confidential Information.