Storage of Data. The Company agrees to store and process the School District Data in a manner that is no less protective than those methods used to secure the Company’s own data. The Company agrees that School District Data will be stored on equipment or systems located within the United States.
Storage of Data a. Each party shall maintain a Data Log or shall cause an intermediary to maintain a Data Log recording all Messages and Associated Data as sent and received without modification.
Storage of Data. 10.1. We may, from time to time, set a limit on the number of messages you may send, store, or receive through the Services. We may delete messages in excess of that limit. We shall give you notice of any change to your limit, except in an emergency.
Storage of Data. 13.1. We assume no responsibility for the deletion or failure to store or deliver email or other messages.
Storage of Data. Each party shall maintain a Data Log or shall cause an intermediary to maintain a Data Log recording all Messages and Associated Data as sent and received without modification. The Data Logs may be maintained as Data Files on computer or by other suitable means provided that a copy of the Data can be readily retrieved and presented in human readable form. Procedures to enable a secure means of archiving Data Logs shall be detailed in the Contract or agreed between the parties. Each party shall be responsible for making such arrangements as may be necessary for the Data contained in its Data Log to be prepared as a correct record of the Messages and Associated Data as sent or received by that party. In the event that a party has destroyed its Data Log, the other party shall have no obligation to furnish it with any information recorded in its Data Log. Each party shall ensure that: it has appointed an identifiable person responsible for the operation and management of that party’s data processing system concerned with the interchange of Messages; and the person responsible for the data processing system concerned with the Interchange of Messages, or such other person as may be agreed by the parties or required by law, shall certify that the Data Log and any reproduction made from it is correct and complete.
Storage of Data. 3.1 Personal data is stored on behalf of the Processor on servers at the Processor’s sub-processors in the EU and the USA.
Storage of Data. Data stored by the PEPPOL AP shall be retained for as long as the data is necessary in order to carry out the performance of its obligations in accordance with this Agreement or is needed for the offering of or follow-up on services by the implicated users (PEPPOL SML, PEPPOL SMP or PEPPOL Participant). After that the data shall be deleted unless renewed or confirmed by the data subject.
Storage of Data. We shall notify the Buyer that, where necessary for business pur- poses and permissible within the scope of statutory regulations, personal data shall be stored and processed by us on computer.
Storage of Data. All PII that is received, stored or otherwise maintained by Securitize for Issuer pursuant to this Agreement shall be maintained in a secure environment with physical, technical, and administrative information and data security safeguards that meet or exceed industry standards. Issuer is responsible for transmitting all PII and Issuer Confidential information to Securitize in encrypted or otherwise secure form if it is transmitted outside the normal operation of the Platform. In the event of a breach or suspected breach of security of any Securitize system, website, database, equipment or storage medium or facility that results or may have resulted in unauthorized access to any PII or any Issuer Confidential Information by any third party (including any employee, agent or subcontractor of Securitize that is not authorized to access such information) (collectively, a “Security Breach”), Securitize shall (i) notify Issuer within twenty four (24) hours of being informed of such breach of security, (ii) make commercially reasonable efforts to re-secure its systems immediately and remedy the Security Breach, (iii) cooperate with Issuer, at Securitize’s expense, to draft disclosures, press releases and other communication for Issuer to use with its customers, the public or government entities, and (iv) take any other remedial measures. In the event of a breach or suspected breach of security of any Issuer system, website, database, equipment or storage medium or facility that results or may have resulted in unauthorized access to any of Securitize’s Confidential Information by any third party, Issuer shall notify Securitize within twenty four (24) hours of being informed of such breach of security, and make commercially reasonable efforts to re-secure its systems immediately.
Storage of Data. I will not operate any unauthorised software or make any unauthorised copies of software on any computer or portable device provided by the DHB. I will handle, store and dispose of any information in accordance with relevant statutory and policy obligations including the Privacy Act 1993, Health Information Privacy Code 1994, DHB’s Privacy Policy and Public Records Act 2005. I will not store sensitive and confidential patient, employee or business information on an unsecured device such as CD/DVD, USB or other portable device.