Technical and Organizational Safeguards Sample Clauses

Technical and Organizational Safeguards. In connection with the provision of the Service, Company will maintain commercially reasonable administrative, physical, and technical safeguards for protection of the security, confidentiality and integrity of the Service and Customer Data. Those safeguards will include, but will not be limited to, measures for preventing access, use, modification or disclosure of Customer Data by Company personnel except (a) to provide the Service and prevent or address service or technical problems, (b) as compelled by law and upon identification of lawful authority, or (c) as expressly permitted in writing by Customer. Company shall, in connection with the provision of the Service, comply with Data Protection Laws, as well as the Company’s Privacy Policy. Company will employ security measures in accordance with Company’s security policy as amended from time to time available upon request.
Technical and Organizational Safeguards. Quad will have and maintain policies and procedures reasonably designed to detect and respond to Security Incidents. These policies and procedures will be aligned with the scope and type of Client Personal Data received, and include physical, technical/electronic, and administrative/procedural safeguards that are designed to reasonably detect and respond to Security Incidents.
Technical and Organizational Safeguards. In connection with the provision of the Network Services, eleven-x will maintain commercially reasonable administrative, physical, and technical safeguards for protection of the security, confidentiality and integrity of Personal Information and shall secure Personal Information with safeguards appropriate to the level of sensitivity of the Personal Information. Those safeguards will include, but will not be limited to, measures for preventing access, use, modification or disclosure of Personal Information by eleven-x personnel except (a) to provide the Network Services and prevent or address service or technical problems, (b) as compelled by law and upon identification of lawful authority, or (c) as expressly permitted in writing by Customer. eleven-x shall, in connection with the provision of the Network Services, comply with Data Protection Laws, as well as eleven-x’s Privacy Policy. eleven-x shall ensure that its personnel engaged in the processing of Personal Information are informed of the confidential nature of the Personal Information and have received appropriate training on their responsibilities and eleven-x shall take commercially reasonable steps to ensure the reliability of any eleven-x personnel engaged in the processing of Personal Information.
Technical and Organizational Safeguards. In connection with the provision of the Service, Solace will maintain commercially reasonable administrative, physical, and technical safeguards for protection of the security, confidentiality and integrity of Personal Data. Those safeguards will include, but will not be limited to, measures for preventing access, use, modification or disclosure of Personal Data by Solace personnel except (a) to provide the Service and prevent or address service or technical problems, (b) as compelled by law and upon identification of lawful authority, or (c) as expressly permitted in writing by Customer. Solace shall, in connection with the provision of the Service, comply with Data Protection Laws, as well as Solace’s Privacy Policy. Solace shall ensure that its personnel engaged in the Processing of Personal Data are informed of the confidential nature of the Personal Data and have received appropriate training on their responsibilities and Solace shall take commercially reasonable steps to ensure the reliability of any Solace personnel engaged in the Processing of Personal Data.
Technical and Organizational Safeguards. In connection with the provision of the ClearRisk Service, ClearRisk will maintain commercially reasonable administrative, physical, and technical safeguards for protection of the security, confidentiality and integrity of Client Data. Those safeguards will include, but will not be limited to, measures for preventing access, use, modification or disclosure of Client Data by ClearRisk personnel except (a) to provide the ClearRisk Service and prevent or address service or technical problems, (b) as compelled by law in accordance with Section 9.4 below and upon identification of lawful authority, or (c) as expressly permitted in writing by Client. ClearRisk shall not access Client Data except to provide the ClearRisk Service and prevent or address service or technical problems, or at Client’s request in connection with customer support matters.

Related to Technical and Organizational Safeguards

  • Technical and Organizational Measures The following sections define SAP’s current technical and organizational measures. SAP may change these at any time without notice so long as it maintains a comparable or better level of security. Individual measures may be replaced by new measures that serve the same purpose without diminishing the security level protecting Personal Data.

  • Technical and Organisational Measures The Supplier shall, taking into account the state of technical development and the nature of Processing, implement and maintain appropriate technical and organisational measures to protect the Personal Data against unauthorised or unlawful Processing, destruction or accidental loss, alteration, or unauthorised disclosure of the Personal Data.

  • Technical Safeguards 1. USAC and DSS will process the data matched and any data created by the match under the immediate supervision and control of authorized personnel to protect the confidentiality of the data, so unauthorized persons cannot retrieve any data by computer, remote terminal, or other means. 2. USAC and DSS will strictly limit authorization to these electronic data areas necessary for the authorized user to perform their official duties. All data in transit will be encrypted using algorithms that meet the requirements of the Federal Information Processing Standard (FIPS) Publication 140-2 or 140-3 (when applicable). 3. Authorized system users will be identified by User ID and password, and individually tracked to safeguard against the unauthorized access and use of the system. System logs of all user actions will be saved, tracked and monitored periodically. 4. USAC will transmit data to DSS via encrypted secure file delivery system. For each request, a response will be sent back to USAC to indicate success or failure of transmission.

  • Certification Regarding Business with Certain Countries and Organizations Pursuant to Subchapter F, Chapter 2252, Texas Government Code, PROVIDER certifies it is not engaged in business with Iran, Sudan, or a foreign terrorist organization. PROVIDER acknowledges this Purchase Order may be terminated if this certification is or becomes inaccurate.

  • Information Technology Accessibility Standards Any information technology related products or services purchased, used or maintained through this Grant must be compatible with the principles and goals contained in the Electronic and Information Technology Accessibility Standards adopted by the Architectural and Transportation Barriers Compliance Board under Section 508 of the federal Rehabilitation Act of 1973 (29 U.S.C. §794d), as amended. The federal Electronic and Information Technology Accessibility Standards can be found at: xxxx://xxx.xxxxxx-xxxxx.xxx/508.htm.

  • Human and Financial Resources to Implement Safeguards Requirements The Borrower shall make available necessary budgetary and human resources to fully implement the EMP and the RP.

  • Function of Joint Health and Safety Committee All incidents involving aggression or violence shall be brought to the attention of the Joint Health and Safety Committee. The Employer agrees that the Joint Health and Safety Committee shall concern itself with all matters relating to violence to staff.

  • Environmental and Social Safeguards (a) The Borrower, through PMD, shall ensure that each Sub-Project is prepared, implemented and monitored in accordance with the Implementation Guidelines for Social and Environmental Safeguards, which form a supplement to the Operations Manual, and all guidelines and checklists set out therein, including those specifically provided for Indigenous Peoples and land donation, and the Negative List. (b) In the event of any conflict between the provisions of the Implementation Guidelines for Social and Environmental Safeguards and those of this Agreement, the latter shall prevail. 2. The Borrower, through PMD, shall apply the section of the Implementation Guidelines for Social and Environmental Safeguards in each Sub-Project that may affect Indigenous Peoples, in a manner to ensure that the Sub-Project shall: (a) avoid, and, if not possible, minimize cultural, social and economic adverse effects on Indigenous Peoples, caused or likely to be caused by the Project, by taking appropriate mitigating measures; and (b) through a process of free, prior and informed participation, involve concerned Indigenous Peoples in the design and implementation of Sub- projects in which such people reside or make their living and design and implement measures so as to ensure that the benefits received by the Indigenous Peoples under the Project are in harmony with their economic, social and cultural preferences, and likely to protect their customary user rights and reduce, mitigate and offset any adverse impacts of Sub-projects. 3. The Borrower, through PMD, shall ensure that the proceeds of Kecamatan Grants shall not be used to finance the acquisition of land or compensation for involuntary resettlement and that no Sub-Project shall require or permit the involuntary acquisition of land or involuntary resettlement. The Borrower, through PMD, shall ensure that in any Sub-Project involving land donation, the planning and verification procedures for land donation (voluntary donation and donation with compensation) set out in the Implementation Guidelines for Social and Environmental Safeguards shall have been followed and documented in a manner satisfactory to the Bank and PMD prior to the commencement of the Sub-Project. 4. The Borrower shall ensure that the proceeds of the Loan are not used to finance any activities or materials on the Negative List as set out in Section A.2 of Annex 1 to this Schedule 2. 5. Without limiting the obligations under Section II.A of this Schedule 2, the Borrower shall include in each Project Report: (a) information on the status of compliance with the Implementation Guidelines for Social and Environmental Safeguards; (b) details of measures taken for each Sub-Project in the implementation of such guidelines; (c) conditions, if any, in any Sub-Project which interfere or threaten to interfere with the implementation of such guidelines; and (d) remedial measures taken or required to be taken to address such conditions.

  • CONTRACTOR NAME CHANGE An amendment is required to change the Contractor's name as listed on this Agreement. Upon receipt of legal documentation of the name change the State will process the amendment. Payment of invoices presented with a new name cannot be paid prior to approval of said amendment.

  • Information Technology Enterprise Architecture Requirements If this Contract involves information technology-related products or services, the Contractor agrees that all such products or services are compatible with any of the technology standards found at xxxxx://xxx.xx.xxx/iot/2394.htm that are applicable, including the assistive technology standard. The State may terminate this Contract for default if the terms of this paragraph are breached.