Security of User Information Sample Clauses

Security of User Information. Each Party will maintain and enforce safety and physical security procedures with respect to its access and maintenance of User Information that are (a) at least equal to industry standards for such types of locations, and (b) which provide reasonably appropriate technical and organizational safeguards against accidental or unlawful destruction, loss, alteration or unauthorized disclosure or access of User Information and all other data owned by a Party and accessible by the other Party under this Agreement. Without limiting the generality of the foregoing, each Party will take all reasonable measures to secure and defend its location and equipment against "hackers" and others who may seek, without authorization, to modify or access its systems or the information found therein without its consent. Both parties will periodically test their systems for potential areas where security could be breached. Both parties will report to the other Party immediately any breaches of security or unauthorized access to their respective systems that they detect or become aware of. Both parties will use diligent efforts to remedy such breach of security or unauthorized access in a timely manner. 14.5.1. All User Information must be stored in a physically secure environment that protects it from unauthorized access, modification, theft, misuse and destruction. In addition, to the general standards set forth above, each Party will maintain an adequate level of physical security controls over its facility including, but not limited to, appropriate alarm systems, fire suppression, access controls (including off-hour controls) which may include visitor access procedures, security guard force, and video surveillance.
AutoNDA by SimpleDocs
Security of User Information. You are responsible for maintaining the confidentiality and security of any and all account names, user IDs, passwords, personal identification numbers (PINs) and mobile unlock codes that you use to access the Platform Services. CNHCGL will not be liable for any loss or damage arising from your failure to protect your account information. We shall not bear any liability for any damage or interruptions caused by any computer viruses, spyware, or other malware that may affect your computer or other equipment, or any phishing, spoofing, or other attack. We advise the regular use of a reliable virus and malware screening and prevention software. If you question the authenticity of a communication purporting to be from CNHCGL, you should login to your CNHC Account through the Platform Services website or mobile applications, not by clicking links contained in emails.
Security of User Information. For regulatory, risk and security purposes iPay may impose limitations on the maximum amount per transaction and number of transactions per day. You should maintain the security of your iPay account by controlling and making sure that all IDs, passwords, PINs or other codes that you use for accessing iPay services are secured and not revealed to any other person and you shall be responsible in the event any third party have access to your account/mobile device or computer. You must register either your fingerprint image, retina image, password, PIN or any suitable, complex authentication mechanism available in your device to prevent others from accessing or using the iPay application on your device. You agree to keep your authentication information confidential. If you lose your Device or your iPay password or PIN has been revealed to anyone else or suspects of a possible third-party activity, then You must take immediate steps to deactivate your iPay account vis web platform (or by contacting iPay Help Desk) to prevent use of the iPay application by others. Failure to comply with such requests will result in iPay being held harmless in the event of unauthorized transactions being carried out through the iPay application on your device. iPay is not bound to carry out the instructions given by the Customer, if iPay at its sole discretion believes that such instructions do not emanate from the Customer. The Customer hereby agrees to accept full responsibility for all transactions processed from the use of the iPay application using the Customer mobile device/iPay account, even if the instructions were not authorized by the Customer and to accept iPay's record of transactions as conclusive and binding for all purposes. We may ask you at any time to confirm that you comply with Anti-Money Laundering, Anti-Terrorist Financing and other similar acts or legislations mandated by the Government of Sri Lanka. Failure to comply with such requests may result in your iPay account being suspended.
Security of User Information. You are responsible for maintaining the confidentiality and security of all account names, user IDs, passwords, personal identification numbers (PINs) and mobile unlock codes that you use to access the poundtoken Services. You are responsible for keeping your email address up to date in your poundtoken Account profile and for maintaining the confidentiality of your user information. You agree to (i) notify xxxxxxxxxx.xx immediately if you become aware of any unauthorized use of your poundtoken Account, the poundtoken Services, or any other breach of security regarding the poundtoken Services. We strongly advise you to enable all relevant security features such as two-factor authentication, as available: this offers you greater protection from possible attackers attempting to log in to your Account rather than password alone and in situations where your email and/or password is compromised by a third-party data breach. xxxxxxxxxx.xx will not be liable for any loss or damage arising from your failure to protect your account information. We shall not bear any liability for any damage or interruptions caused by any computer viruses, spyware, or other malware that may affect your computer or other equipment, or any phishing, spoofing, or other attack. We advise the regular use of a reliable virus and malware screening and prevention software. If you question the authenticity of a communication purporting to be from xxxxxxxxxx.xx, you should login to your poundtoken Account through the poundtoken Services website or mobile applications, not by clicking links contained in emails. We go to great lengths to protect your account, but we need you to do the same. It is important that you always protect not only your xxxxxxxxxx.xx password but also the email account associated with your account and any device used to access your account.
Security of User Information. You are responsible for maintaining the confidentiality and security of any and all account names, user IDs, passwords, personal identification numbers (PINs) and mobile unlock codes that you use to access the Reserve App. You are responsible for keeping your email address up to date in your Reserve App Account profile and for maintaining the confidentiality of your user information. You agree to (i) notify Company immediately if you become aware of any unauthorized use of your Reserve App Account. We strongly advise you to enable all relevant security features such as two- factor authentication, as available: this offers you greater protection from possible attackers attempting to log in to your Reserve App Account than password alone and in situations where your email and/or password is compromised by a third-party data breach. Company will not be liable for any loss or damage arising from your failure to protect your account information. We shall not bear any liability for any damage or interruptions caused by any computer viruses, spyware, or other malware that may affect your computer or other equipment, or any phishing, spoofing, or other attack. We advise the regular use of a reliable virus and malware screening and prevention software. We go to great lengths to protect your account, but we need you to do the same. It is important that you always protect not only your Reserve App password but also the email account associated with your account and any device used to access your account.
Security of User Information. You are responsible for maintaining the confidentiality and security of any and all API Credentials. You agree to (i) notify Carbon immediately if you become aware of any unauthorized use of your API Credentials, or any other breach of security regarding this API Agreement. We strongly advise you to enable all relevant security features such as two-factor authentication, as available: this offers you greater protection from possible attackers attempting to log in to your API than password alone and in situations where your email and/or password is compromised by a third-party data breach. Carbon will not be liable for any loss or damage arising from your failure to protect your account information. We shall not bear any liability for any damage or interruptions caused by any computer viruses, spyware, or other malware that may affect your computer or other equipment, or any phishing, spoofing, or other attack. We advise the regular use of a reliable virus and malware screening and prevention software. If you question the authenticity of a communication purporting to be from Carbon, you should contact us at xxxxxxx@xxxxxx.xxxxx, not by clicking links contained in emails.
Security of User Information. We have what We consider to be reasonable administrative, technical and physical safeguards to protect against the loss, misuse or alteration of the information under Our control. However, We cannot guarantee or warrant the security of any information disclosed or transmitted to Us online, and We are not responsible for the theft, destruction, or inadvertent disclosure of PII. In the unfortunate event that a User’s PII is compromised, then in Our sole discretion We may notify Users by e-mail to the last e-mail address provided Us in the most expedient time reasonable under the circumstances.
AutoNDA by SimpleDocs

Related to Security of User Information

  • User Information Any user or usage data or information collected via Station’s digital properties or related to Station’s digital properties, or any information collected from websites operated by Station’s affiliates under this Agreement, shall be the property of Station and/or such affiliates. Advertiser shall have no rights in such information by virtue of this Agreement.

  • Security of Confidential Information Each party possessing Confidential Information of the other party will maintain all such Confidential Information under secure conditions, using reasonable security measures and in any event not less than the same security procedures used by such party for the protection of its own Confidential Information of a similar kind.

  • Customer Information CPNI of a Customer and any other non-public, individually identifiable information about a Customer or the purchase by a Customer of the services or products of a Party.

  • Safeguarding Customer Information The Servicer has implemented and will maintain security measures designed to meet the objectives of the Interagency Guidelines Establishing Standards for Safeguarding Customer Information published in final form on February 1, 2001, 66 Fed. Reg. 8616 and the rules promulgated thereunder, as amended from time to time (the “Guidelines”). The Servicer shall promptly provide the Master Servicer, the Trustee and the NIMS Insurer information reasonably available to it regarding such security measures upon the reasonable request of the Master Servicer, the Trustee and the NIMS Insurer which information shall include, but not be limited to, any Statement on Auditing Standards (SAS) No. 70 report covering the Servicer’s operations, and any other audit reports, summaries of test results or equivalent measures taken by the Servicer with respect to its security measures to the extent reasonably necessary in order for the Seller to satisfy its obligations under the Guidelines.

  • Contractor Information The Contractor will provide up to date information for each of the following in the form and manner specified by OGS:

  • Privacy of Customer Information Company Customer Information in the possession of the Agent, other than information independently obtained by the Agent and not derived in any manner from or using information obtained under or in connection with this Agreement, is and shall remain confidential and proprietary information of the Companies. Except in accordance with this Section 10.10, the Agent shall not use any Company Customer Information for any purpose, including the marketing of products or services to, or the solicitation of business from, Customers, or disclose any Company Customer Information to any Person, including any of the Agent’s employees, agents or contractors or any third party not affiliated with the Agent. The Agent may use or disclose Company Customer Information only to the extent necessary (i) for examination and audit of the Agent’s activities, books and records by the Agent’s regulatory authorities, (ii) to protect or exercise the Agent’s, the Custodian’s and the Lenders’ rights and privileges or (iii) to carry out the Agent’s, the Custodian’s and the Lenders’ express obligations under this Agreement and the other Facilities Papers (including providing Company Customer Information to Approved Investors), and for no other purpose; provided that the Agent may also use and disclose the Company Customer Information as expressly permitted by the relevant Company in writing, to the extent that such express permission is in accordance with the Privacy Requirements. The Agent shall take commercially reasonable steps to ensure that each Person to which the Agent intends to disclose Company Customer Information, before any such disclosure of information, agrees to keep confidential any such Company Customer Information and to use or disclose such Company Customer Information only to the extent necessary to protect or exercise the Agent’s, the Custodian’s and the Lenders’ rights and privileges, or to carry out the Agent’s, the Custodian’s and the Lenders’ express obligations, under this Agreement and the other Facilities Papers (including providing Company Customer Information to Approved Investors). The Agent agrees to maintain an Information Security Program and to assess, manage and control risks relating to the security and confidentiality of Company Customer Information pursuant to such program in the same manner as the Agent does so in respect of their own customers’ information, and shall implement the standards relating to such risks in the manner set forth in the Interagency Guidelines Establishing Standards for Safeguarding Company Customer Information set forth in 12 CFR Parts 30, 208, 211, 225, 263, 308, 364, 568 and 570. Without limiting the scope of the foregoing sentence, the Agent shall use at least the same physical and other security measures to protect all Company Customer Information in the Agent’s possession or control as the Agent uses for their own customers’ confidential and proprietary information.

  • Security of State Information The Contractor represents and warrants that it has implemented and it shall maintain during the term of this Contract the highest industry standard administrative, technical, and physical safeguards and controls consistent with NIST Special Publication 800-53 (version 3 or higher) and Federal Information Processing Standards Publication 200 and designed to (i) ensure the security and confidentiality of State Data; (ii) protect against any anticipated security threats or hazards to the security or integrity of the State Data; and (iii) protect against unauthorized access to or use of State Data. Such measures shall include at a minimum: (1) access controls on information systems, including controls to authenticate and permit access to State Data only to authorized individuals and controls to prevent the Contractor employees from providing State Data to unauthorized individuals who may seek to obtain this information (whether through fraudulent means or otherwise); (2) industry-standard firewall protection; (3) encryption of electronic State Data while in transit from the Contractor networks to external networks; (4) measures to store in a secure fashion all State Data which shall include multiple levels of authentication; (5) dual control procedures, segregation of duties, and pre-employment criminal background checks for employees with responsibilities for or access to State Data; (6) measures to ensure that the State Data shall not be altered or corrupted without the prior written consent of the State; (7) measures to protect against destruction, loss or damage of State Data due to potential environmental hazards, such as fire and water damage; (8) staff training to implement the information security measures; and (9) monitoring of the security of any portions of the Contractor systems that are used in the provision of the services against intrusion on a twenty-four (24) hour a day basis.

  • Security of Information Unless otherwise specifically authorized by the DOH Chief Information Security Officer, Contractor receiving confidential information under this contract assures that: • Encryption is selected and applied using industry standard algorithms validated by the National Institute of Standards and Technology (NIST) Cryptographic Algorithm Validation Program against all information stored locally and off-site. Information must be encrypted both in-transit and at rest and applied in such a way that it renders data unusable to anyone but authorized personnel, and the confidential process, encryption key or other means to decipher the information is protected from unauthorized access. • It is compliant with the applicable provisions of the Washington State Office of the Chief Information Officer (OCIO) policy 141, Securing Information Technology Assets, available at: xxxxx://xxxx.xx.xxx/policy/securing-information-technology-assets. • It will provide DOH copies of its IT security policies, practices and procedures upon the request of the DOH Chief Information Security Officer. • DOH may at any time conduct an audit of the Contractor’s security practices and/or infrastructure to assure compliance with the security requirements of this contract. • It has implemented physical, electronic and administrative safeguards that are consistent with OCIO security standard 141.10 and ISB IT guidelines to prevent unauthorized access, use, modification or disclosure of DOH Confidential Information in any form. This includes, but is not limited to, restricting access to specifically authorized individuals and services through the use of: o Documented access authorization and change control procedures; o Card key systems that restrict, monitor and log access; o Locked racks for the storage of servers that contain Confidential Information or use AES encryption (key lengths of 256 bits or greater) to protect confidential data at rest, standard algorithms validated by the National Institute of Standards and Technology (NIST) Cryptographic Algorithm Validation Program (CMVP); o Documented patch management practices that assure all network systems are running critical security updates within 6 days of release when the exploit is in the wild, and within 30 days of release for all others; o Documented anti-virus strategies that assure all systems are running the most current anti-virus signatures within 1 day of release; o Complex passwords that are systematically enforced and password expiration not to exceed 120 days, dependent user authentication types as defined in OCIO security standards; o Strong multi-factor authentication mechanisms that assure the identity of individuals who access Confidential Information; o Account lock-out after 5 failed authentication attempts for a minimum of 15 minutes, or for Confidential Information, until administrator reset; o AES encryption (using key lengths 128 bits or greater) session for all data transmissions, standard algorithms validated by NIST CMVP; o Firewall rules and network address translation that isolate database servers from web servers and public networks; o Regular review of firewall rules and configurations to assure compliance with authorization and change control procedures; o Log management and intrusion detection/prevention systems; o A documented and tested incident response plan Any breach of this clause may result in termination of the contract and the demand for return of all personal information.

  • Security of Data a. Each of the parties shall: i. ensure as far as reasonably practicable, that Data is properly stored, is not accessible to unauthorised persons, is not altered, lost or destroyed and is capable of being retrieved only by properly authorised persons; ii. subject to the provisions of Sub-Clause 8.a. ensure that, in addition to any security, proprietary and other information disclosure provision contained in the Contract, Messages and Associated Data are maintained in confidence, are not disclosed or transmitted to any unauthorised person and are not used for any purpose other than that communicated by the sending party or permitted by the Contract; and iii. protect further transmission to the same degree as the originally transmitted Message and Associated Data when further transmissions of Messages and Associated Data are permitted by the Contract or expressly authorised by the sending party. b. The sending party shall ensure that Messages are marked in accordance with the requirements of the Contract. If a further transmission is made pursuant to Sub-Clause 3. a. iii. the sender shall ensure that such markings are repeated in the further transmission. c. The parties may apply special protection to Messages by encryption or by other agreed means, and may apply designations to the Messages for protective Interchange, handling and storage procedures. Unless the parties otherwise agree, the party receiving a Message so protected or designated shall use at least the same level of protection and protective procedures for any further transmission of the Message and its Associated Data for all responses to the Message and for all other communications by Interchange or otherwise to any other person relating to the Message. d. If either party becomes aware of a security breach or breach of confidence in relation to any Message or in relation to its procedures or systems (including, without limitation, unauthorised access to their systems for generation, authentication, authorisation, processing, transmission, storage, protection and file management of Messages) then it shall immediately inform the other party of such breach. On being informed or becoming aware of a breach the party concerned shall: i. immediately investigate the cause, effect and extent of such breach; ii. report the results of the investigation to the other party; and iii. use all reasonable endeavours to rectify the cause of such breach. e. Each party shall ensure that the contents of Messages that are sent or received are not inconsistent with the law, the application of which could restrict the content of a Message or limit its use, and shall take all necessary measures to inform without delay the other party if such an inconsistency arises.

  • Seller Information The Company may require each seller of Registrable Securities as to which any registration is being effected to furnish, and such seller shall furnish, to the Company such information regarding the distribution of such securities as the Company may from time to time reasonably request in writing.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!