Security VI Sample Clauses

Security VI. Zabezpečení Taking into account the state of the art, the costs of implementation and the nature, scope, context and purposes of Processing, as well as the risk of varying likelihood and severity for the rights and freedoms of natural persons, without prejudice to any other security standards agreed upon by the Parties, directly or through Rigel, each Processor shall implement appropriate technical and organisational measures to protect against unauthorized, unlawful or accidental Processing, including accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to personal data, such measures in each case to be S ohledem na současný stav, náklady xx xxxxxxxxx, xxxxxx, xxxxxx, xxxxxxx a účely zpracování, jakož i xx xxxxxx různé pravděpodobnosti a závažnosti týkající se práv a svobod fyzických osob, aniž by xxx byly dotčeny jakékoli jiné bezpečnostní standardy dohodnuté stranami, přímo nebo prostřednictvím zadavatele, je každý zpracovatel povinen zavést vhodná technická a organizační opatření na ochranu proti neoprávněnému, nezákonnému nebo náhodnému zpracování, včetně náhodného nebo nezákonného zničení, ztráty, změny, neoprávněného zpřístupnění nebo přístupu k osobním údajům taková opatření, která musí být appropriate to the likelihood and severity of harm to Data Subjects that might result from the unauthorized, unlawful or accidental Processing, having regard to the state of technological development and the cost of implementing any measures. These measures shall include as appropriate: v každém případě přiměřená pravděpodobnosti a závažnosti poškození subjektů údajů, která by mohla vyplývat z neoprávněného, nezákonného nebo náhodného zpracování, s ohledem na stav technologického vývoje a náklady na provedení jakýchkoli opatření. Tato opatření podle potřeby zahrnují:
AutoNDA by SimpleDocs

Related to Security VI

  • Security Cameras Security cameras have been installed throughout the Facility; however, they will not routinely be used in areas where there is an expectation of privacy, such as restrooms or patient care areas.

  • Security Requirements 11.1 The Supplier shall comply, and shall procure the compliance of the Suppliers Personnel, with the Security Policy and the Security Plan and the Supplier shall ensure that the Security Plan produced by the Supplier fully complies with the Security Policy.

  • Security Standards The Provider shall implement and maintain commercially reasonable security procedures and practices that otherwise meet or exceed industry standards designed to protect Student Data from unauthorized access, destruction, use, modification, or disclosure, including but not limited to the unauthorized acquisition of computerized data that compromises the security, confidentiality, or integrity of the Student Data (a "Security Breach"). For purposes of the DPA and this Exhibit G, "Security Breach" does not include the good faith acquisition of Student Data by an employee or agent of the Provider or LEA for a legitimate educational or administrative purpose of the Provider or LEA, so long as the Student Data is used solely for purposes permitted by SOPPA and other applicable law, and so long as the Student Data is restricted from further unauthorized disclosure.

  • Security Safeguards Even if you enroll in on-line banking or bill pay or our electronic document delivery service, we may from time to time require certain transactions to be made in-person or we may require verification or authentication of your identity for security purposes before a transaction or other business with us may be initiated, processed, or completed. You agree and understand that this is for the protection of us and you and is intended to safeguard your personal information and all funds held in or by the Credit Union, and to help prevent Identity Theft and bank fraud. You agree that we will not be liable for any delay in, or prevention of, any transaction or business conducted by you due to these security measures. Legal Process Against Your Account. If any legal action is brought against your account such as tax levy, garnishment, attachment, etc., we may pay out funds according to the terms of the action or refuse any payout until the dispute is resolved. We will not be liable to you for any such payout, even if it causes overdrafts or returned items as determined under our Overdraft Governance Documents. Any expenses or attorney fees we incur responding to legal process may be charged against your account without notice, unless prohibited by law. Any legal process against your account is subject to our lien and security interest in your account and our right to set-off.

  • Security Measures Lessee hereby acknowledges that the rental payable to Lessor hereunder does not include the cost of guard service or other security measures, and that Lessor shall have no obligation whatsoever to provide same. Lessee assumes all responsibility for the protection of the Premises, Lessee, its agents and invitees and their property from the acts of third parties.

  • Security Management The Contractor shall comply with the requirements of the DOD 5200.1-M and the DD Form 254. Security of the Contractor’s electronic media shall be in accordance with the above documents. Effective Program Security shall require the Contractor to address Information Security and Operations Security enabled by the Security Classification Guides. The Contractor’s facility must be able to handle and store material up to the Classification Level as referenced in Attachment J-01, DD Form 254.

  • Security System The site and the Work area may be protected by limited access security systems. An initial access code number will be issued to the Contractor by the County. Thereafter, all costs for changing the access code due to changes in personnel or required substitution of contracts shall be paid by the Contractor and may be deducted from payments due or to become due to the Contractor. Furthermore, any alarms originating from the Contractor’s operations shall also be paid by the Contractor and may be deducted from payments due or to become due to the Contractor.

  • Contractor Security Clearance Customers may designate certain duties and/or positions as positions of “special trust” because they involve special trust responsibilities, are located in sensitive locations, or have key capabilities with access to sensitive or confidential information. The designation of a special trust position or duties is at the sole discretion of the Customer. Contractor or Contractor’s employees and Staff who, in the performance of this Contract, will be assigned to work in positions determined by the Customer to be positions of special trust, may be required to submit to background screening and be approved by the Customer to work on this Contract.

  • Security Controls Annually, upon Fund’s reasonable request, DST shall provide Fund’s Chief Information Security Officer or his or her designee with a summary of its corporate information security policy and an opportunity to discuss DST’s information security measures, and a high level and non-confidential summary of any penetration testing related to the provision of in-scope services . DST shall review its Security Policy annually.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!