Common use of Security of User Information Clause in Contracts

Security of User Information. Each Party will maintain and enforce safety and physical security procedures with respect to its access and maintenance of User Information that are (a) at least equal to industry standards for such types of locations, and (b) which provide reasonably appropriate technical and organizational safeguards against accidental or unlawful destruction, loss, alteration or unauthorized disclosure or access of User Information and all other data owned by a Party and accessible by the other Party under this Agreement. Without limiting the generality of the foregoing, each Party will take all reasonable measures to secure and defend its location and equipment against "hackers" and others who may seek, without authorization, to modify or access its systems or the information found therein without its consent. Both parties will periodically test their systems for potential areas where security could be breached. Both parties will report to the other Party immediately any breaches of security or unauthorized access to their respective systems that they detect or become aware of. Both parties will use diligent efforts to remedy such breach of security or unauthorized access in a timely manner.

Appears in 4 contracts

Samples: Master Agreement (Intersections Inc), Master Agreement (Intersections Inc), Master Agreement (Intersections Inc)

AutoNDA by SimpleDocs
Time is Money Join Law Insider Premium to draft better contracts faster.