Integrity and Confidentiality. Escrow Agent will be required to (i) hold and maintain the Deposits in a secure, locked, and environmentally safe facility, which is accessible only to authorized representatives of Escrow Agent, (ii) protect the integrity and confidentiality of the Deposits using commercially reasonable measures and (iii) keep and safeguard each Deposit for one (1) year. ICANN and Registry Operator will be provided the right to inspect Escrow Agent’s applicable records upon reasonable prior notice and during normal business hours. Registry Operator and ICANN will be provided with the right to designate a third-‐party auditor to audit Escrow Agent’s compliance with the technical specifications and maintenance requirements of this Specification 2 from time to time. If Escrow Agent receives a subpoena or any other order from a court or other judicial tribunal pertaining to the disclosure or release of the Deposits, Escrow Agent will promptly notify the Registry Operator and ICANN unless prohibited by law. After notifying the Registry Operator and ICANN, Escrow Agent shall allow sufficient time for Registry Operator or ICANN to challenge any such order, which shall be the responsibility of Registry Operator or ICANN; provided, however, that Escrow Agent does not waive its rights to present its position with respect to any such order. Escrow Agent will cooperate with the Registry Operator or ICANN to support efforts to quash or limit any subpoena, at such party’s expense. Any party requesting additional assistance shall pay Escrow Agent’s standard charges or as quoted upon submission of a detailed request.
Integrity and Confidentiality i. The Data Importer instructs its personnel to disable administrative sessions when leaving the Data Importer's premises or when computers are unattended.
ii. The Data Importer stores passwords in a way that makes them unintelligible while they are in force.
Integrity and Confidentiality a. Acuity instructs its personnel to disable administrative sessions when leaving premises Acuity controls or when computers are otherwise left unattended.
b. Acuity stores passwords in a way that makes them unintelligible while they are in force.
Integrity and Confidentiality. A. Microsoft instructs Microsoft personnel to disable administrative sessions when leaving premises Microsoft controls or when computers are otherwise left unattended.
B. Microsoft stores passwords in a way that makes them unintelligible while they are in force.
Integrity and Confidentiality. (i) Provider instructs its personnel to disable administrative sessions when leaving the Provider’s premises or when computers are unattended.
(ii) Provider’s stores passwords in a way that makes them unintelligible while they are in force.
Integrity and Confidentiality. As a Data Controller, the College is further required to:-
Integrity and Confidentiality. The processor instructs its personnel to disable administrative sessions when computers are otherwise left unattended • The processor stores passwords in a way that makes them unintelligible while they are in force. • The processor uses industry standard practices to identify and authenticate users who attempt to access information systems with personal data • Where authentication mechanisms are based on passwords, the processor requires use of strong passwords of at least eight characters, in accordance with our password policy • The processor enforces use of multi-factor authentication for all user accounts • The processor ensures that deactivated or expired identifiers are not granted to other individuals • The processor uses industry standard password protection practices, including practices designed to maintain the confidentiality and integrity of passwords when they are assigned and distributed and during storage. The processor maintains emergency and contingency plans for the facilities and the devices in which the processor access and process personal data. The processor’s contingency plan is tested at least once a year. The processor redundant storage and its procedures for recovering personal data are designed to attempt to reconstruct personal data in its original or last-replicated state from before the time it was lost or destroyed.
Integrity and Confidentiality. We ensure appropriate security of your personal data, including protection against unauthorised or unlawful processing and against accidental loss, destruction or damage.
Integrity and Confidentiality. Escrow Agent will be required to (i) hold and maintain the Deposits in a secure, locked, and environmentally safe facility which is accessible only to authorized representatives of Escrow Agent and (ii) protect the integrity and confidentiality of the Deposits using commercially reasonable measures. ICANN and Registry Operator will be provided the right to inspect Escrow Agent's applicable records upon reasonable prior notice and during normal business hours. Registry Operator will be provided with the right to designate a third-party auditor to audit Escrow Agent’s compliance with the technical specifications and maintenance requirements of this Specification 2 no more than once per calendar year. If Xxxxxx Agent receives a subpoena or any other order from a court or other judicial tribunal pertaining to the disclosure or release of the Deposits, Escrow Agent will promptly notify the Registry Operator and ICANN unless prohibited by law. After notifying the Registry Operator and ICANN, Escrow Agent shall allow sufficient time for Registry Operator or ICANN to challenge any such order, which shall be the responsibility of Registry Operator or ICANN; provided, however, that Escrow Agent does not waive its rights to present its position with respect to any such order. Escrow Agent will cooperate with the Registry Operator or ICANN to support efforts to quash or limit any subpoena, at such party’s expense. Any party requesting additional assistance shall pay Escrow Agent’s standard charges or as quoted upon submission of a detailed request.
Integrity and Confidentiality. The following information security measures will be put in place by the Authority and the Grant Recipient to ensure the safekeeping of the data shared under this DSA, including, and with particular reference to, personal data. The Partners agree to work and comply with their respective information assurance and data protection policies, while following the security measures outlined below.