Software Programs; Security of Personal Information and access to Software Programs Sample Clauses

Software Programs; Security of Personal Information and access to Software Programs. The City may prohibit the Contractor from the use of certain software programs and computing systems to collect, use, process, store, or generate all data and information, with or without Personal Information, received as a result of the Contractor’s services under this Agreement. The Contractor will fully comply with all requirements and conditions, if any, associated with the use of software programs and computing systems as provided by the City. In addition, the Contractor will establish and maintain data privacy and information security policies and procedures, including physical, technical, administrative, and organizational safeguards, in order to: (i) ensure the security and confidentiality of Personal Information; (ii) protect against any anticipated threats or hazards to the security or integrity of Personal Information; (iii) protect against unauthorized disclosure, access to, or use of Personal Information; (iv) ensure the proper use of Personal Information; and (v) ensure that all employees, officers, agents, and subcontractors of the Contractor, if any, comply with all of the foregoing. The Contractor shall also provide for the security of all Personal Information in accordance with all policies promulgated by Denver Technology Services, as amended, and all applicable laws, rules, policies, publications, and guidelines including, without limitation: (i) the Children’s Online Privacy Protection Act, (ii) § 00-00-000, et seq., C.R.S., and (iii) Colorado House Bill 18-1128. The Contractor shall submit to the Director, within fifteen (15) days of the Director’s written request, copies of the Contractor’s policies and procedures to maintain the confidentiality of Personal Information to which the Contractor has access.
AutoNDA by SimpleDocs
Software Programs; Security of Personal Information and access to Software Programs. Contractor will use the software programs designated by the City to collect, use, process, store, or generate all data and information, with or without Personal Information, received as a result of Contractor’s services under this Agreement. Contractor will fully comply with all requirements and conditions associated with the use of said software programs as provided by the City. In addition, Contractor will establish and maintain data privacy and information security policies and procedures, including physical, technical, administrative, and organizational safeguards, in order to: (i) ensure the security and confidentiality of Personal Information; (ii) protect against any anticipated threats or hazards to the security or integrity of Personal Information; (iii) protect against unauthorized disclosure, access to, or use of Personal Information; (iv) ensure the proper use of Personal Information; and (v) ensure that all employees, officers, agents, and subcontractors of Contractor, if any, comply with all of the foregoing. Contractor shall also provide for the security of all Personal Information in accordance with all policies promulgated by Denver Technology Services, as amended, and all applicable laws, rules, policies, publications, and guidelines including, without limitation:

Related to Software Programs; Security of Personal Information and access to Software Programs

  • Patient Information Each Party agrees to abide by all laws, rules, regulations, and orders of all applicable supranational, national, federal, state, provincial, and local governmental entities concerning the confidentiality or protection of patient identifiable information and/or patients’ protected health information, as defined by any other applicable legislation in the course of their performance under this Agreement.

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes.

  • SECURITY OF PERSONAL INFORMATION 19.1 For this clause “personal information” has the meaning given to it in the Privacy Act 1988 (Cth).

Time is Money Join Law Insider Premium to draft better contracts faster.