Security of Data Sample Clauses

Security of Data a. Each of the parties shall: i. ensure as far as reasonably practicable, that Data is properly stored, is not accessible to unauthorised persons, is not altered, lost or destroyed and is capable of being retrieved only by properly authorised persons; ii. subject to the provisions of Sub-Clause 8.a. ensure that, in addition to any security, proprietary and other information disclosure provision contained in the Contract, Messages and Associated Data are maintained in confidence, are not disclosed or transmitted to any unauthorised person and are not used for any purpose other than that communicated by the sending party or permitted by the Contract; and iii. protect further transmission to the same degree as the originally transmitted Message and Associated Data when further transmissions of Messages and Associated Data are permitted by the Contract or expressly authorised by the sending party. b. The sending party shall ensure that Messages are marked in accordance with the requirements of the Contract. If a further transmission is made pursuant to Sub-Clause 3. a. iii. the sender shall ensure that such markings are repeated in the further transmission. c. The parties may apply special protection to Messages by encryption or by other agreed means, and may apply designations to the Messages for protective Interchange, handling and storage procedures. Unless the parties otherwise agree, the party receiving a Message so protected or designated shall use at least the same level of protection and protective procedures for any further transmission of the Message and its Associated Data for all responses to the Message and for all other communications by Interchange or otherwise to any other person relating to the Message. d. If either party becomes aware of a security breach or breach of confidence in relation to any Message or in relation to its procedures or systems (including, without limitation, unauthorised access to their systems for generation, authentication, authorisation, processing, transmission, storage, protection and file management of Messages) then it shall immediately inform the other party of such breach. On being informed or becoming aware of a breach the party concerned shall: i. immediately investigate the cause, effect and extent of such breach; ii. report the results of the investigation to the other party; and iii. use all reasonable endeavours to rectify the cause of such breach. e. Each party shall ensure that the contents of Messages t...
AutoNDA by SimpleDocs
Security of Data. SAO shall take due care and take reasonable precautions to protect Agency’s data from unauthorized physical and electronic access. SAO complies with the requirements of the OCIO 141.10 policies and standards for data security and access controls to ensure the confidentiality, and integrity of all data shared.
Security of Data. DTS at all times will have complete security of Licensee documents on dedicated servers that only authorized DTS personnel will have access to; all login by DTS authorized will be stored and saved as to time of log-in and log-out. (i) Licensee may request DTS to only store Licensee documents for the period of time that allows Licensee and its authorized personnel to create, edit and update their documents.
Security of Data. The RECIPIENT(S) agree to store the DATA on a computer with security controls adequate to protect sensitive or identifiable information, to ensure that only approved, supervised persons have access to the DATA, and to maintain appropriate control over the DATA at all times. Hard copies of any DATA must similarly be stored under conditions sufficiently secure to avoid inappropriate access, and must be shredded prior to discarding. This DUA will be in effect for a period of three (3) years from its effective date for the requested CLINICAL TRIAL data. At the end of the three (3) year period, the RECIPIENT(S) agree to destroy all copies of the CLINICAL TRIAL data, and all derivatives that contain individual-level information. An extension of this DUA can be made by submitting a new DRF and DUA to the NCI.
Security of Data. County shall secure and protect data received through the Payment Application and Purchase Application (including credit card information) according to law, County’s contractual obligations, and reasonable business standards and practices.
Security of Data. While the security of your data is important to us you must recognise that no method of transmission over the Internet, or method of electronic storage is 100% secure. While we strive to use commercially acceptable means to protect your Personal Data, we cannot guarantee its absolute security.
Security of Data. In order to safeguard and maintain the security and confidentiality of the NYMEX Data, CME shall employ all such measures to protect NYMEX Data as CME employs to protect its own such data, and in no event shall CME employ less than reasonable measures: (i) to preserve the security of the NYMEX Data; (ii) to prevent unauthorized access to or modification of any NYMEX Data; and (iii) to establish and maintain environmental, safety, facility and data security procedures and other safeguards against destruction, loss, alteration or theft of, or unauthorized access to, any NYMEX Data.
AutoNDA by SimpleDocs
Security of Data. The tenderer must ensure that departmental or personal data will be protected in accordance with the security plan submitted to the Agency as part of the tendering process.
Security of Data. The parties have or shall adopt and maintain data security policies and procedures that contain organisational and technical measures appropriate to the complexity, nature, and scope of its activities, to protect Personal and Confidential Data against unauthorised access, processing, disclosure, destruction, damage, or loss.
Security of Data. You acknowledge that unless otherwise provided for under any security service you elect to purchase from us, we are unable to exercise control over, and make no representations or warranties concerning, the security or content of data or information passing over the Network, any systems operated by third parties and the internet.
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!