Security Compliance Sample Clauses
The Security Compliance clause requires parties to adhere to specified security standards and protocols to protect sensitive data and systems. This typically involves implementing measures such as encryption, access controls, regular security assessments, and compliance with relevant laws or industry standards like GDPR or ISO 27001. Its core function is to ensure that all parties maintain a consistent level of security, thereby reducing the risk of data breaches and ensuring regulatory compliance.
POPULAR SAMPLE Copied 24 times
Security Compliance. Apple will take appropriate steps to ensure compliance with security procedures by its employees, contractors and sub processors and Apple shall ensure that any persons authorized to process Personal Data comply with applicable laws regarding the confidentiality and security of Personal Data with regards to the Service.
Security Compliance. Coinbase has obtained System and Organization Controls (SOC) certifications where applicable and is periodically evaluating other areas for additional certifications. The certification reports are shared upon request with our customers and prospects (subject to appropriate and binding contractual confidentiality provisions).
Security Compliance. Supplier agrees to comply with all provisions of the then-current Commonwealth of Virginia security procedures, published by the Virginia Information Technologies Agency (VITA) and which may be found at (▇▇▇▇://▇▇▇.▇▇▇▇.▇▇▇▇▇▇▇▇.▇▇▇/library/default.aspx?id=537#securityPSGs) or a successor URL(s), as are pertinent to Supplier's operation. Supplier further agrees to comply with all provisions of the relevant Authorized User’s then-current security procedures as are pertinent to Supplier’s operation and which have been supplied to Supplier by such Authorized User. Supplier shall also comply with all applicable federal, state and local laws and regulations. For any individual Authorized User location, security procedures may include but not be limited to: background checks, records verification, photographing, and fingerprinting of Supplier’s employees or agents. Supplier may, at any time, be required to execute and complete, for each individual Supplier employee or agent, additional forms which may include non-disclosure agreements to be signed by Supplier’s employees or agents acknowledging that all Authorized User information with which such employees and agents come into contact while at the Authorized User site is confidential and proprietary. Any unauthorized release of proprietary or Personal information by the Supplier or an employee or agent of Supplier shall constitute a breach of its obligations under this Section and the Contract. Supplier shall immediately notify VITA and Authorized User, if applicable, of any Breach of Unencrypted and Unredacted Personal Information, as those terms are defined in Virginia Code 18.2- 186.6, and other personal identifying information, such as insurance data or date of birth, provided by VITA or Authorized User to Supplier. Supplier shall provide VITA the opportunity to participate in the investigation of the Breach and to exercise control over reporting the unauthorized disclosure, to the extent permitted by law. Supplier shall indemnify, defend, and hold the Commonwealth, VITA, the Authorized User, their officers, directors, employees and agents harmless from and against any and all fines, penalties (whether criminal or civil), judgments, damages and assessments, including reasonable expenses suffered by, accrued against, or charged to or recoverable from the Commonwealth, VITA, the Authorized User, their officers, directors, agents or employees, on account of the failure of Supplier to perform its obligations pur...
Security Compliance. Contractor is responsible for establishing an information security program and maintaining physical, technical, administrative, and organizational safeguards that comply with applicable industry standards and guidelines. Contractor shall materially comply with Washington Office of the Chief Information Officer (OCIO) statewide information technology policies 141.10 – Securing Information Technology Assets Standards and 188 - Accessibility, as applicable, for Purchaser and for Contractor’s products implemented by Purchaser. Such policies are located on the OCIO website at: ▇▇▇▇▇://▇▇▇▇.▇▇.▇▇▇//policies.
Security Compliance. Each Party shall take appropriate measures to ensure compliance with the above-mentioned security measures by its employees and subcontractors, in particular by ensuring that all persons authorised to handle Data are committed to maintain confidentiality or are subject to an appropriate legal obligation of confidentiality.
Security Compliance. (i) In connection with any use of Licensed Content, Licensee shall implement and maintain copy protection and DRM technology and systems, consistent with accepted industry practices (collectively, "Security Systems") with respect the Service under its supervision and/or control, including Secured Servers and operating systems, that:
(A) are designed to prevent unauthorized reproduction and distribution of Licensed Content;
(B) encrypt Licensed Content with a reasonably current version of DRM technology accepted within the industry;
(C) are sufficient to track and enforce the use and other license limitations contemplated by this Agreement; and
(D) generally meet or exceed accepted industry practices for the licensed delivery of music via digital transmission. Provided however, Licensee may distribute MP3 files in an unprotected format when the distribution of such files is expressly approved by Licensor.
(ii) If Licensor has a good-faith basis to believe that Licensee is not in compliance with such Security Systems, Licensor shall be entitled, upon thirty (30) business days' prior written notice to Licensee, to conduct or have a third party conduct an examination (a "Security Compliance Examination") of the operations and Security Systems of Licensee solely with respect to rights covered by this Agreement. Licensee shall make commercially reasonable efforts to cooperate with Licensor and/or Licensor's qualified designated representative regarding such Compliance Examination. Licensor's shall not conduct any Security Compliance Examinations of Licensee more frequently than once every twelve (12) months.
Security Compliance. Contractor is responsible for establishing an information security program and maintaining physical, technical, administrative, and organizational safeguards, that comply with: (a) applicable industry standards and guidelines; (b) American Institute of Certified Public Accountants (AICPA) System and Organization Controls (SOC) 1; and
Security Compliance. DCC shall be entitled to carry out such security audits as it may reasonably deem necessary in order to ensure that the Contractor maintains compliance with its security obligations under a Call-Off Contract or this Framework Agreement.
Security Compliance. R3 will take appropriate steps to ensure compliance with Security Measures by its employees, contractors and Subprocessors to the extent applicable to their scope of performance, including ensuring that all persons authorized to process personal data have committed themselves to confidentiality or are under an appropriate statutory obligation of confidentiality. If R3 becomes aware of any data incidents, R3 will follow steps outlined above in the security incident identification section.
Security Compliance. We may monitor all use of the C3 AI Software for security and operational purposes. We may temporarily suspend Your access to any C3 AI Software if We reasonably determine that such access and use poses a security risk or is a threat to the function of the Software, or in the event a User is engaged in, or We in good faith suspect is engaged in, any unauthorized conduct, including any violation of any terms and conditions of this Agreement, any applicable law, or third party rights; provided, however, that We will use commercially reasonable efforts under the circumstances to provide You with notice and an opportunity to remedy such unauthorized conduct prior to such suspension.
