We use cookies on our site to analyze traffic, enhance your experience, and provide you with tailored content.

For more information visit our privacy policy.

Data Security definition

Data Security means defending information from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction. This applies regardless of the form the Data may take (electronic, physical, etc.).
Data Security. Any services that involve handling of University Data must comply with University policy 9.8, Policy on Information Resource Access and Security: xxxx://xxxxxx.xxxxxxxxxxxxx.xxx/technology/9-8.shtml . Additional terms and conditions may be required to protect University Data maintained or handled by vendors. For additional guidance contact the Information Security Office at 438-5533 or xxxxxxx@xxxxx.xxx.
Data SecurityThe Contractor shall adopt and apply data security standards and procedures that comply with all applicable federal, state, and local laws, regulations, and rules.

Examples of Data Security in a sentence

  • Compliance with Privacy and Data Security Laws Client agrees not to provide any consumer or other third-party data subject to privacy regulation under international, federal, state, or local laws (“Regulated Data”) to Provider including but not limited to HIPAA, GLBA, GDPR, the California Consumer Privacy Act (“CCPA”), etc.

  • Client Data Security & Privacy In addition to its other confidentiality obligations under an applicable Service Attachment, Provider shall not use, edit, or disclose to any party other than Client any Client Data (defined below), except as otherwise requested by Client, or required by court order or applicable law.

  • DSPT Data Security and Protection Toolkit (replaces the IG Toolkit from April 2018) GDPR The General Data Protection Regulation is designed to modernise laws that protect the personal data of individuals.

  • Without limiting any other provision of this Agreement, clauses 5 (Fees, payment and VAT), 8 (Intellectual Property Rights), 10 (Confidentiality and publicity) and 18 (Limitation of liability), and the Data Security and Privacy Addendum and any other clauses which should by their nature survive termination of this Agreement, survive termination or expiry of this Agreement for any reason.


More Definitions of Data Security

Data SecurityThe Company recognizes the importance of treating Data in a lawful, fair and transparent manner. The Company will apply reasonable organizational and security measures to prevent the unlawful processing and/or the accidental loss or destruction of these materials and, in particular, the personal data contained in them.
Data SecurityThe Service Provider shall adopt and apply data security standards and procedures that comply with all applicable federal, state, and local laws, regulations, and rules.
Data Security means the protection of information assets from accidental or intentional but unauthorized disclosure, modification, or destruction, or the inability to process that information.
Data Security. If Seller has access to Buyer’s data or technology systems or equipment, Seller shall comply with Buyer’s data protection requirements. Tax: Buyer shall pay all sales and use taxes imposed on the purchase price of Goods or Services purchased hereunder. Seller’s invoices shall include sufficient detail so Buyer may determine the sales and use tax. If applicable, Buyer will provide Seller with a copy of Buyer’s sales tax exemption certificate in lieu of paying any such tax. Seller will exercise a good faith effort to reduce the overall transaction taxes relating to purchases of Goods or Services (including use of resale certificates and claiming available exceptions) and extend to Buyer the benefit of any tax savings. Seller shall pay all other taxes, assessments, levies, or related charges relating to the sale of the Goods and Services purchased hereunder.
Data Security. Some or all of the items of Equipment returned to us at any time may contain sensitive information or data belonging to your organization, or your customer/clients/patients, that is stored, recorded, or in any way contained within or on the Equipment. You specifically agree that before the Equipment is shipped to or retrieved by us or our agents, or removed by a supplier, you will, at your sole cost and expense, permanently destroy, delete and remove all such information and data that is stored, recorded or in any way contained within or on the Equipment, to the extent that further recovery of any of such data and information is not possible. You have the sole responsibility to so destroy, delete, and remove all data and information stored in or on the Equipment. We have absolutely no liability for any data or information that you fail to so destroy, delete, and remove. All hard drives and other data retention components must function as originally installed after data removal.
Data Security. The Sponsored center shall adopt and apply data security standards and procedures that comply with all applicable federal, state, and local laws, regulations, and rules. Duty to Report: The Sponsored center shall report a suspected or confirmed security breach to the Institution’s Contract Administrator within twenty-four (24) hours after the breach is first discovered, provided that the Sponsored center shall report a breach involving Social Security Administration data or Internal Revenue Service data within one (1) hour after the breach is first discovered. During the performance of this contract, the Sponsored center is to notify the Institution’s contract administrator of any contact by the federal Office for Civil Rights (OCR) received by the Sponsored center. Cost Borne by Sponsored center: If any applicable federal, state, or local law, regulation, or rule requires the Institution or the sponsored center to give affected persons written notice of a security breach arising out of the Sponsored center’s performance under this contract, the Sponsored center shall bear the cost of the notice. Oversight
Data Security. : shall mean technological and organizational procedures and operations the purpose of which is to protect the privacy, secrecy, safety, unity, and completeness of Personal Data.