Security of Customer Data. GreenOrbit will implement reasonable security measures to protect any Customer Data that is hosted on the Hosted Service from unauthorized access and disclosure, including penetration testing from time to time to test GreenOrbit’s security procedures.
Security of Customer Data. (a) The Supplier must comply with the security requirements set out in this Agreement, including in the Order Documents (Information Security Requirements) in carrying out the Supplier's Activities.
(b) The Supplier must establish, maintain, enforce and continuously improve its safeguard and security measures, and take all reasonable steps, to ensure that Customer Data is protected against misuse, interference and loss, and from unauthorised access, modification or disclosure.
(c) The Supplier must immediately notify the Customer where it is or may be required by Law to disclose any Customer Data to any third party contrary to the terms of this Agreement.
Security of Customer Data. Each party shall implement appropriate technical, physical and organizational security measures to safeguard Customer Personal Data from unauthorized processing or accidental loss or damage, as further described in the applicable Service Description (the “Data Safeguards”). Taking into account the ongoing state of technological development, the costs of implementation and the nature, scope, context and purposes of the processing of the Customer Personal Data, as well as the likelihood and severity of risk to individuals, Accenture’s implementation of and compliance with the Data Safeguards is designed to provide a level of security appropriate to the risk in respect of the processing of the Customer Personal Data.
Security of Customer Data. As between Xxxxxxx-xxx.xxx and Customer, all Customer Data is owned exclusively by Customer. Customer Data shall be considered Confidential Information subject to the terms of this Agreement. Xxxxxxx-xxx.xxx may access Customer's Process User accounts, including Customer Data, solely to respond to System or technical problems or at Customer's request, and for the purposes of hosting such Customer Data in connection with the provision of the System to Customer and Customer’s authorized Users. Xxxxxxx-xxx.xxx shall use industry standard security measures, including standard encryption protocols, to protect and guard the availability and security of all Customer Data and shall be strictly prohibited from using the Customer Data in any fashion other than that defined above.
Security of Customer Data. 8.1. During the Subscription Period, Lookout will maintain reasonable administrative, physical, and technical safeguards designed to protect any Customer Data stored by Lookout against unauthorized access, use or disclosure. To protect the privacy of Customer Data Lookout employs industry-standard controls including physical access controls, encryption, internet firewalls, intrusion detection, and network monitoring. Upon request, Lookout will provide additional information regarding Lookout’s data security policies and procedures. If Customer's use of the Service requires Lookout to process personal data falling within the scope of EU Regulation 2016/679 (the "GDPR"), the GDPR Data Processing Addendum ("DPA") set out at xxxxx://xxx.xxxxxxx.xxx/documents/legal/cloud-service- agreement-dpa.pdf shall apply. The DPA shall hereby be incorporated into this Agreement by reference. In the event of any conflict between the terms of the DPA and this Agreement as they relate to End User data, the DPA shall prevail to the extent of such conflict.
8.2. Subject and limited to the limitation of liability as provided for in the Agreement (Section 11), Lookout will reimburse Customer for the following out of pocket costs and fees which are commercially reasonable and required by law in connection with the unauthorized access, use, or disclosure of Customer Data: (i) notice to affected individuals, (ii) credit or other forms of required monitoring for up to 12 months for affected individuals;
Security of Customer Data. 3.1 Customer Data shall at all times remain the property of the Customer. The Customer acknowledges that Davies Technology Solutions has no control over any Customer Data hosted as part of the provision of the Subscribed Services and may not actively monitor or have access to the content of the Customer Data. The Customer shall ensure (and is exclusively responsible for) the accuracy, quality, integrity and legality of the Customer Data and that its use (including use in connection with the Subscribed Service) complies with all applicable laws and Intellectual Property Rights.
3.2 The Customer acknowledges and agrees that it is responsible for maintaining safe backups and copies of any Customer Data, including as necessary to ensure the continuation of its businesses. The Customer shall, without limitation, ensure that it backs up (or procures the back up of) all Customer Data regularly and extracts it from each Subscribed Service prior to the termination or expiry of the Subscription Term or the cessation or suspension of any of the Subscribed Services. To the maximum extent permitted by applicable law, the Supplier shall not be responsible (under any legal theory, including in negligence) for any loss of availability of, or corruption or damage to, any Customer Data.
Security of Customer Data. CARE4 shall: (i) ensure that it has in place appropriate administrative, physical and technical measures designed to protect the security and confidentiality of Customer Data against any accidental or illicit destruction, alteration or unauthorized access or disclosure to third parties; (ii) have measures in place designed to protect the security and confidentiality of Customer Data; and (iii) access and use the Customer Data solely to perform its obligations in accordance with the terms of this Agreement, and as otherwise expressly permitted in this agreement.
Security of Customer Data. Customer shall undertake commercially reasonable efforts to ensure the security of its account ID, password, and connectivity with the Service is aligned with industry standards and best practices. If Customer becomes aware of the theft or compromise of an administrative account ID or password or other data submitted by Customer (collectively, “Customer Data”), Customer shall use its best efforts to change the password as soon as is feasible and inform ITI of the compromise. Customer acknowledges that responsibility for all Customer Data, text, information, messages and other material submitted by Customer or its Authorized Users to the Service lies solely with Customer. ITI shall not be liable or responsible for the content of Customer Data brought to the Service or the Software by Customer’s Authorized Users unless the Service or the Software directly affects Customer Data; Customer is solely responsible for all Customer Data. ITI may change the authorization method for access to the ITI Service if it determines in its sole discretion that there are circumstances justifying such changes. Notwithstanding the foregoing, Customer agrees that ITI shall not be liable to Customer for any loss, misuse or alteration of Customer Data exported by Customer or a Customer’s Authorized Users to third-party applications (e.g., Microsoft Excel). ITI will implement and maintain appropriate technical and organizational measures intended to prevent the loss, destruction, damage and unauthorized use of Customer Data, and will without undue delay, notify Customer of any security breaches of the Service affecting Customer Data. Notwithstanding the foregoing, Customer acknowledges and agrees that it is impossible for ITI to completely prevent the unauthorized copying of Customer Content (Text, video, audio, or images), uploaded using the Service and provided to your Authorized Users. Without limiting the generality of the foregoing, and by way of example, your Authorized Users could violate your required terms and conditions and attempt to pirate, copy, or download Customer Content. Accordingly, ITI MAKES NO REPRESENTATION OR WARRANTY, EXPRESS, IMPLIED OR OTHERWISE, THAT CUSTOMER CONTENT UPLOADED TO THE SERVICE WILL BE SECURE FROM UNAUTHORIZED COPYING. ITI SHALL NOT BE LIABLE FOR ANY DAMAGES ARISING OUT OF, IN CONNECTION WITH, OR RELATING TO THE UNAUTHORIZED COPYING OR DOWNLOADING OF CUSTOMER CONTENT.
Security of Customer Data. CyberArk shall: (i) ensure that is has in place appropriate administrative, physical and technical measures designed to protect the security and confidentiality of Customer Data against any accidental or illicit destruction, alteration or unauthorized access or disclosure to third parties; (ii) have measures in place designed to protect the security and confidentiality of Customer Data; and (iii) access and use the Customer Data solely to perform its obligations in accordance with the terms of this Agreement, and as otherwise expressly permitted in this Agreement. CyberArk shall not materially diminish its security controls with respect to Customer Data during a particular SaaS Products term.
Security of Customer Data. For purposes of this Agreement, “Customer Data” shall mean all data of Customer hosted by Company pursuant to this Agreement. Company will host U.S. Customer Data in secure, U.S. based facilities; and will host Canadian Customer Data in secure, Canadian based facilities. Company shall be deemed to have exercised reasonable care in the maintenance, custody and preservation of Customer Data in Company’s possession if such Customer Data is treated substantially the same as Company treats its own like data.