Security Privacy & Sovereignty Sample Clauses

Security Privacy & Sovereignty. This module provides flexible security and privacy capabilities in order to accommodate the different needs of specific target cases, by providing support for confidentiality, integrity, authentication, immutability and non-repudiation. It provides mechanisms to authenticate and secure data in transit, establishing trust among different architectural components of PLATOON platform, providing authentication both for end users identities and backend components, and therefore authorization enforcement for accessing the protected data resources. The module, in addition, provides functionalities in line with the privacy by design principles. It ensures that the system complies with privacy regulations, in particular GDPR, during its operation and data exchanges. It performs Data Usage Control, to give access to personal or other policy regulated data, only if the intended use complies with those defined by usage policies. In the specific case of end user personal data, the Consent Management functionality additionally enforces GDPR compliancy of data requests, based on consent given by data owners (data subject). Furthermore, any personal data and their interrelationships, are hidden from plain view, thus they cannot easily be abused. PLATOON platform is envisaged as a federated platform where several organizational platforms can interact. The following security and privacy modules have the objectives to meet inter organization security and privacy requirements. If each of the individual organization platforms already covers the requested security and privacy requirements then we only to protect the data flows between platforms at the communication level. Therefore, PLATOON will mainly focus on developing the solutions to ensure security and privacy in the data exchange between platforms. As part of the project no specific security and privacy component will be developed for protecting the individual platforms from the different partners. This means that the internal security and privacy issues of the existent pilot infrastructures (that already have their security capabilities) will be maintained and managed by the pilot owners and will be not replaced by PLATOON security component that, instead cover the security and privacy inside the PLATOON platform and in in particular in the data exchange flows between different pilots. In any case it will be necessary to assure interoperability between the PLATOON security and the existing security systems of the pilots...
AutoNDA by SimpleDocs

Related to Security Privacy & Sovereignty

  • Security Protocols Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.

  • Information Security Program (1) DTI shall implement and maintain a comprehensive written information security program applicable to the Personal Information ("Information Security Program") which shall include commercially reasonable measures, including, as appropriate, policies and procedures and technical, physical, and administrative safeguards that are consistent with industry standards, providing for (i) the security and confidentiality of the Personal Information, (ii) protection of the Personal Information against reasonably foreseeable threats or hazards to the security or integrity of the Personal Information, (iii) protection against unauthorized access to or use of or loss or theft of the Personal Information, and (iv) appropriate disposal of the Personal Information. Without limiting the generality of the foregoing, the Information Security Program shall provide for (i) continual assessment and re-assessment of the risks to the security of Personal Information acquired or maintained by DTI and its agents, contractors and subcontractors in connection with the Services, including but not limited to (A) identification of internal and external threats that could result in unauthorized disclosure, alteration or destruction of Personal Information and systems used by DTI and its agents, contractors and subcontractors, (B) assessment of the likelihood and potential damage of such threats, taking into account the sensitivity of such Personal Information, and (C) assessment of the sufficiency of policies, procedures, information systems of DTI and its agents, contractors and subcontractors, and other arrangements in place, to control risks; and (ii) appropriate protection against such risks.

  • Security Practices A. Protected data provided to the contractor will be stored: (include where and how) B. The security protections taken to ensure data will be protected that align with the NIST Cybersecurity Framework and industry best practices include:

  • Safety and Security Procedures Contractor shall maintain and enforce, at the Contractor Work Locations, industry-standard safety and physical security policies and procedures. While at each Court Work Location, Contractor shall comply with the safety and security policies and procedures in effect at such Court Work Location.

  • Contractor and Employee Security Precautions A. The security aspects of working at the Correctional Facility are critical. The following security precautions are part of the site conditions and are a part of this Contract. All persons coming on the site in any way connected with this Work shall be made aware of them, and it is the (General) Contractor’s responsibility to check and enforce them.

  • PERSONAL INFORMATION PRIVACY AND SECURITY CONTRACT 11 Any reference to statutory, regulatory, or contractual language herein shall be to such language as in 12 effect or as amended.

  • Business Associate Obligations Business Associate agrees to comply with applicable federal confidentiality and security laws, specifically the provisions of the HIPAA Rules and the HITECH Act applicable to business associates, including:

  • Personally Identifiable Information (PII); Security a. If Grantee or any of its subcontractors may or will create, receive, store or transmit PII under the terms of this Agreement, Grantee must provide for the security of such PII, in a form acceptable to Florida Housing, without limitation, non-disclosure, use of appropriate technology, security practices, computer access security, data access security, data storage encryption, data transmission encryption, security inspections and audits. Grantee shall take full responsibility for the security of all data in its possession or in the possession of its subcontractors and shall hold Florida Housing harmless for any damages or liabilities resulting from the unauthorized disclosure of loss thereof.

  • System Security and Data Safeguards When SAP is given access to Licensee’s systems and data, SAP shall comply with Licensee’s reasonable administrative, technical, and physical safeguards to protect such data and guard against unauthorized access. In connection with such access, Licensee shall be responsible for providing Consultants with user authorizations and passwords to access its systems and revoking such authorizations and terminating such access, as Licensee deems appropriate from time to time. Licensee shall not grant SAP access to Licensee systems or personal information (of Licensee or any third party) unless such access is essential for the performance of Services under the Agreement. The parties agree that no breach of this provision shall be deemed to have occurred in the event of SAP non-conformance with the aforementioned safeguard but where no personal information has been compromised.

  • Security Safeguards (1) Each party acknowledges that it is solely responsible for determining and communicating to the other the appropriate technological, physical, and organizational security measures required to protect Personal Data.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!