Data Privacy and Security. Bank will implement and maintain a written information security program, in compliance with all federal, state and local laws and regulations (including any similar international laws) applicable to Bank, that contains reasonable and appropriate security measures designed to safeguard the personal information of the Funds' shareholders, employees, trustees and/or officers that Bank or any Subcustodian receives, stores, maintains, processes, transmits or otherwise accesses in connection with the provision of services hereunder. In this regard, Bank will establish and maintain policies, procedures, and technical, physical, and administrative safeguards, designed to (i) ensure the security and confidentiality of all personal information and any other confidential information that Bank receives, stores, maintains, processes or otherwise accesses in connection with the provision of services hereunder, (ii) protect against any reasonably foreseeable threats or hazards to the security or integrity of personal information or other confidential information, (iii) protect against unauthorized access to or use of personal information or other confidential information, (iv) maintain reasonable procedures to detect and respond to any internal or external security breaches, and (v) ensure appropriate disposal of personal information or other confidential information. Bank will monitor and review its information security program and revise it, as necessary and in its sole discretion, to ensure it appropriately addresses any applicable legal and regulatory requirements. Bank shall periodically test and review its information security program. Bank shall respond to Customer's reasonable requests for information concerning Bank's information security program and, upon request, Bank will provide a copy of its applicable policies and procedures, or in Bank's discretion, summaries thereof, to Customer, to the extent Bank is able to do so without divulging information Bank reasonably believes to be proprietary or Bank confidential information. Upon reasonable request, Bank shall discuss with Customer the information security program of Bank. Bank also agrees, upon reasonable request, to complete any security questionnaire provided by Customer to the extent Bank is able to do so without divulging sensitive, proprietary, or Bank confidential information and return it in a commercially reasonable period of time (or provide an alternative response that reasonably addresses the poin...
Data Privacy and Security. (a) To the Company’s knowledge, each Group Company has implemented adequate written policies relating to the Processing of Personal Data as and to the extent required by applicable Law (“Privacy and Data Security Policies”).
(b) To the Company’s knowledge, there is (and since the Lookback Date there has been) no material Proceeding pending or, to the Company’s knowledge, threatened against or involving any Group Company initiated by any Person (including (i) the United States Federal Trade Commission, any state attorney general or similar state official; (ii) any other Governmental Entity, foreign or domestic; or (iii) any regulatory or self-regulatory entity) alleging that any Processing of Personal Data by or on behalf of a Group Company is or was in violation of any Privacy Laws or any Privacy and Data Security Policies nor, to the Company’s knowledge, is there (nor since the Lookback Date has there been) any basis for the foregoing.
(c) To the Company’s knowledge, since the Lookback Date: (i) no person has alleged or given written notice of unauthorized access to, or use, disclosure, or Processing of Personal Data in the possession or control of any Group Company or any of its contractors with regard to any Personal Data obtained from or on behalf of a Group Company; (ii) no person has alleged or given written notice of unauthorized intrusions or breaches of security into any Company IT Systems; and (iii) none of the Group Companies has notified or been required to notify any Person of any (A) loss, theft or damage of, or (B) other unauthorized or unlawful access to, or use, disclosure or other Processing of, Personal Data, except, in each case, as would not have a Company Material Adverse Effect.
(d) Each Group Company owns or has license to use such Company IT Systems as necessary to operate the business of each Group Company as currently conducted. All Company IT Systems are: (i) free from any material defect, bug, virus or programming, design or documentation error and (ii) in sufficiently good working condition to effectively perform all material information technology operations necessary for the operation of the Business (except for ordinary wear and tear). To the Company’s knowledge, since the Lookback Date, there have not been any material failures, breakdowns or continued substandard performance of any Company IT Systems that have caused a material failure or disruption of the Company IT Systems other than routine failures or disruptions that...
Data Privacy and Security. A. Personal Data and Customer Instructions. Under this Agreement, Apple, acting as a data processor on your behalf, may receive Personal Data if provided by You. By entering into this Agreement, You instruct Apple to process Your Personal Data, in accordance with applicable law:
(i) to provide the Service; (ii) pursuant to Your instructions as given through your use of the Services (including the web portal and other functionality of the Service); (iii) as specified under this Agreement; and (iv) as further documented in any other written instructions given by You and acknowledged by Apple as constituting instructions under this Agreement. Apple shall comply with the instructions described in this Section 3A unless prohibited by an applicable legal requirement from doing so, in which case Apple will inform You of that legal requirement before processing Personal Data (unless prohibited by that law from doing so on important grounds of public interest).
Data Privacy and Security. Data Privacy. "
Data Privacy and Security. 104
(a) Holdings and its Subsidiaries have implemented commercially reasonable procedures, including firewall protections and regular virus scans, designed to ensure that software used in the operation of their business is materially free of any code designed to (or intended to): (i) disrupt, disable, harm, or otherwise impede in any manner the operation of, or provide unauthorized access to, a computer system or network or other device on which such code is stored or installed, or (ii) compromise the privacy or data security of a user or damage or destroy any data or file without the user’s consent. The information technology systems and databases used by Holdings and its Subsidiaries are sufficient in all material respects for the needs of their business and in accordance with customary industry standards and practices. There has been no (x) failure or other substandard performance of any such information technology system or database that has caused any material disruption to the business of Holdings and its Subsidiaries or (y) to the knowledge of the Credit Parties, unauthorized intrusions or breaches of security with respect to any information technology systems and databases used by Holdings and its Subsidiaries.
(b) Each of Holdings and its Subsidiaries (i) is, and has at all times been, in compliance in all material respects with all applicable requirements of law and Contractual Obligations regarding the collection, protection, storage, use, processing, disclosure, retention and transfer of Personal Information and (ii) has commercially reasonable safeguards in place to protect Personal Information in their possession or control from unauthorized access by other Persons.
(c) There have not been, to the knowledge of the Credit Parties, any material unauthorized intrusions or breaches of the security of any of the information technology systems and databases, any material unauthorized access or use of any Personal Information or other information stored or contained therein or accessed or processed thereby, or any material compromise of the confidentiality, integrity, or availability of Personal Information or the physical, technical, administrative, or organizational safeguards put in place by Holdings or any of its Subsidiaries that relate to the protection of Personal Information. No Person has, to the knowledge of the Credit Parties, made any illegal or unauthorized use of Personal Information that was controlled by or on behalf of Holdings or a...
Data Privacy and Security. Supplier shall comply with the Data Privacy and Security Addendum terms contained in Exhibit C, attached hereto and made a part hereof.
Data Privacy and Security. 7.1.1 With respect to any End-User Customer Information received, accessible, or accessed by Merchant, Merchant will comply with applicable law regarding the use of non-public personal information and the requirements of BlueSnap’s Privacy Policy as amended from time to time. Further, Merchant (i) will not use any End-User Customer Information for any other purpose other than those contemplated hereunder, (ii) has and will maintain reasonable and appropriate measures to protect the security and confidentiality of such End-User Customer Information, and (iii) will not, directly or through an affiliate, disclose or permit the disclosure of any End-User Customer Information to any other person that is not an affiliate or service provider, or an employee or agent of any such party with a demonstrable need to know such End User Customer Confidential Information in order to fulfill the obligations hereunder. Merchant shall take all available steps and precautions to prevent fraud, theft and/or misappropriation of End-User Customer Information.
7.1.2 Subject to each Merchant’s obligations of confidentiality or a duty to restrict dissemination of proprietary information arising from third party relationships or as otherwise imposed by law, Xxxxxxxx will promptly notify BlueSnap as soon as commercially reasonable upon learning of any suspected or actual security breach, unauthorized disclosure, compromise of privacy involving End-User Customers’ Information or the actual loss or theft of any such personal information (“Security Incident”).
Data Privacy and Security. (a) The Acquired Companies and, with respect to the Business, Parent and its Subsidiaries (other than the Acquired Companies) comply in all material respects, and since the Lookback Date, have complied in all material respects, with applicable Privacy Laws, contractual obligations and industry standards (including PCI DSS) relating to the collection, use and other Processing of Personal Data, information security or cybersecurity and each of the Privacy Policies (collectively, the “Privacy Requirements”), including with respect to, where required by Law, obtaining all valid and informed consents from and offering opt out and giving all required notices to the Persons subject of the Personal Data.
(b) Except as would not reasonably be expected to be material to the Business, since the Lookback Date, (i) neither Parent nor any of its Subsidiaries (including the Acquired Companies) have received any complaints, claims, warnings or other written notification from any Person (including any Governmental Body) in respect of information security, cybersecurity or the Processing of Personal Data in connection with the Business, (ii) no Action, enforcement or investigation notices or audit requests have been served on Parent or any Subsidiary thereof in respect of information security, cybersecurity or the Processing of Personal Data in connection with the Business and (iii) none of Parent or any of its Subsidiaries have been subject to any Order or Arbitration Decision, nor is any Order or Arbitration Decision pending, nor, to the Knowledge of Seller, threatened, alleging noncompliance with any applicable Privacy Requirements in respect of information security, cybersecurity or the Processing of Personal Data in connection with the Business.
(c) The execution, delivery or performance of this Agreement and the transactions contemplated by this Agreement will not violate any applicable Privacy Requirements in any material respect and, except as would not reasonably be expected to be material to the Business, following the consummation of the transactions contemplated by this Agreement, the Acquired Companies will have substantially the same right to Process any Personal Data currently Processed by Parent or its Subsidiaries in connection with the Business as Parent and its Subsidiaries have immediately prior to the Closing.
(d) Except as would not reasonably be expected to be material to the Business, the Acquired Companies and, with respect to the Business, Parent a...
Data Privacy and Security. A. CONTRACTOR, its officers, agents, owners, partners, employees, volunteers and subcontractors shall, to the extent applicable, abide by the provisions of the Minnesota Government Data Practices Act, Minnesota Statutes, chapter 13 (MGDPA) and all other applicable law, rules, regulations and orders relating to data or the privacy, confidentiality or security of data, which may include but is not limited to the Health Insurance Portability and Accountability Act of 1996 and its implementing regulations (HIPAA). For clarification and not limitation, COUNTY hereby notifies CONTRACTOR that the requirements of Minnesota Statutes section 13.05, subd. 11, apply to this Agreement. CONTRACTOR shall promptly notify COUNTY if CONTRACTOR becomes aware of any potential claims, or facts giving rise to such claims, under the MGDPA or other data, data security, privacy or confidentiality laws, and shall also comply with the other requirements of this Section. Classification of data, including trade secret data, will be determined pursuant to applicable law and, accordingly, merely labeling data as “trade secret” by CONTRACTOR does not necessarily make the data protected as such under any applicable law.
B. In addition to the foregoing MGDPA and other applicable law obligations, CONTRACTOR shall comply with the following duties and obligations regarding County Data and County Systems (as each term is defined herein). As used herein, “County Data” means any data or information, and any copies thereof, created by CONTRACTOR or acquired by CONTRACTOR from or through COUNTY pursuant to this Agreement, including but not limited to handwriting, typewriting, printing, photocopying, photographing, facsimile transmitting, and every other means of recording any form of communication or representation, including electronic media, email, letters, works, pictures, drawings, sounds, videos, or symbols, or combinations thereof. If CONTRACTOR has access to or possession/control of County Data, CONTRACTOR shall safeguard and protect the County Data in accordance with generally accepted industry standards, all laws, and all then applicable COUNTY policies, procedures, rules and directions. To the extent of any inconsistency between accepted industry standards and such COUNTY policies, procedures, rules and directions, CONTRACTOR shall notify COUNTY of the inconsistency and follow COUNTY direction. CONTRACTOR shall immediately notify COUNTY of any known or suspected security breach or unauth...
Data Privacy and Security. (a) The Company complies, and since December 31, 2021 the Company has complied, in all material respects, with all Privacy and Information Security Requirements, except where the failure to so comply would not reasonably be expected to have a Company Material Adverse Effect. Since December 31, 2021, the Company has not been notified in writing of, or, to the Knowledge of the Company, is the subject of, any Action related to Processing of Personal Data by any Governmental Authority regarding any actual or possible violations of any Privacy and Information Security Requirement by the Company.
(b) The Company employs safeguards that are required to comply with all Privacy and Information Security Requirements to protect Personal Data within its control and requires the same of all vendors under contract with the Company that Process Personal Data on its behalf, except where the failure to do any of the foregoing would not reasonably be expected to have a Company Material Adverse Effect. The Company provides, and has since December 31, 2021 provided, all requisite notices and obtained all required consents, and satisfied all other requirements (including notification to Governmental Authorities) necessary under any Privacy and Information Security Requirement for the Processing (including international and onward transfer) of all Personal Data in connection with the conduct of the business as currently conducted, except where the failure to do any of the foregoing would not reasonably be expected to have a Company Material Adverse Effect.
(c) Except as would not be material to the Company, to the Knowledge of the Company, since December 31, 2021, the Company has not suffered a security breach with respect to any of the Company Data in the possession or control of the Company and, except as would not be material to the Company and to the Knowledge of the Company, since December 31, 2021, there has been no unauthorized or illegal use of or access to any Company Data in the possession or control of the Company. To the Knowledge of the Company, since December 31, 2021, the Company Systems owned or controlled by the Company have had no material errors or defects that have not been remedied in all material respects and, to the Knowledge of the Company, contain no code designed to disrupt, disable, harm, distort or otherwise impede in any manner the legitimate operation of such Company Systems (including what are sometimes referred to as “viruses,” “worms,” “time bom...