Security Compliance Sample Clauses

Security Compliance. Apple will take appropriate steps to ensure compliance with security procedures by its employees, contractors and sub processors and Apple shall ensure that any persons authorized to process Personal Data comply with applicable laws regarding the confidentiality and security of Personal Data with regards to the Service.
AutoNDA by SimpleDocs
Security Compliance. Contractor is responsible for establishing an information security program and maintaining physical, technical, administrative, and organizational safeguards that comply with applicable industry standards and guidelines. Contractor shall materially comply with Washington Office of the Chief Information Officer (OCIO) statewide information technology policies 141.10 – Securing Information Technology Assets Standards and 188 - Accessibility, as applicable, for Purchaser and for Contractor’s products implemented by Purchaser. Such policies are located on the OCIO website at: xxxxx://xxxx.xx.xxx//policies.
Security Compliance. Supplier agrees to comply with all provisions of the then-current Commonwealth of Virginia security procedures, published by the Virginia Information Technologies Agency (VITA) and which may be found at (xxxx://xxx.xxxx.xxxxxxxx.xxx/library/default.aspx?id=537#securityPSGs) or a successor URL(s), as are pertinent to Supplier's operation. Supplier further agrees to comply with all provisions of the relevant Authorized User’s then-current security procedures as are pertinent to Supplier’s operation and which have been supplied to Supplier by such Authorized User. Supplier shall also comply with all applicable federal, state and local laws and regulations. For any individual Authorized User location, security procedures may include but not be limited to: background checks, records verification, photographing, and fingerprinting of Supplier’s employees or agents. Supplier may, at any time, be required to execute and complete, for each individual Supplier employee or agent, additional forms which may include non-disclosure agreements to be signed by Supplier’s employees or agents acknowledging that all Authorized User information with which such employees and agents come into contact while at the Authorized User site is confidential and proprietary. Any unauthorized release of proprietary or Personal information by the Supplier or an employee or agent of Supplier shall constitute a breach of its obligations under this Section and the Contract. Supplier shall immediately notify VITA and Authorized User, if applicable, of any Breach of Unencrypted and Unredacted Personal Information, as those terms are defined in Virginia Code 18.2- 186.6, and other personal identifying information, such as insurance data or date of birth, provided by VITA or Authorized User to Supplier. Supplier shall provide VITA the opportunity to participate in the investigation of the Breach and to exercise control over reporting the unauthorized disclosure, to the extent permitted by law. Supplier shall indemnify, defend, and hold the Commonwealth, VITA, the Authorized User, their officers, directors, employees and agents harmless from and against any and all fines, penalties (whether criminal or civil), judgments, damages and assessments, including reasonable expenses suffered by, accrued against, or charged to or recoverable from the Commonwealth, VITA, the Authorized User, their officers, directors, agents or employees, on account of the failure of Supplier to perform its obligations pur...
Security Compliance. Supplier shall comply with all provisions of the then-current Commonwealth security procedures, published by VITA and which may be found at: xxxxx://xxx.xxxx.xxxxxxxx.xxx/it-governance/itrm- policies-standards/, or any successor URL(s), as are pertinent to Supplier's operation. Further, Supplier shall comply with all applicable provisions of the relevant Authorized User's then-current security procedures as are pertinent to Supplier's operation and that have been provided to Supplier by the Authorized User. Supplier shall also comply with all applicable federal, state, and local laws and regulations. Any unauthorized release of any Confidential Information, or Commonwealth proprietary or personal information, by the Supplier or Supplier Personnel constitutes a breach of Supplier’s obligations under the Contract. Supplier shall notify VITA and any affected Authorized User within 24 hours of discovery of, or when Supplier should have discovered, any breach of “unencrypted” and “unredacted” personal information, as those terms are defined in Code § 18.2-186.6, and other confidential or personal identifying information provided to the Supplier by VITA or an Authorized User. To the extent permitted by law, Supplier shall provide VITA and any affected Authorized User the opportunity to participate in the investigation of the breach and to exercise control over reporting the unauthorized disclosure. Supplier shall ensure performance of an audit of Supplier’s environment at least annually to provide assurance of “Controls Relevant to Security, Availability, Processing Integrity, Confidentiality or Privacy” in accordance with the then-current standards set forth by the American Institute of CPAs.
Security Compliance. R3 will take appropriate steps to ensure compliance with Security Measures by its employees, contractors and Subprocessors to the extent applicable to their scope of performance, including ensuring that all persons authorized to process personal data have committed themselves to confidentiality or are under an appropriate statutory obligation of confidentiality. Data Incidents If R3 becomes aware of any data incidents, R3 will follow steps outlined above in the security incident identification section.
Security Compliance. 17.6 DCC shall be entitled to carry out such security audits as it may reasonably deem necessary in order to ensure that the Contractor maintains compliance with its security obligations under a Call-Off Contract or this Framework Agreement.
Security Compliance. Business Associate agrees to implement administrative, physical and technical safeguards that reasonably and appropriately protect the confidentiality, integrity and availability of the electronic protected health information that it creates, receives, maintains, or transmits on behalf of the Covered Entity, and will require that its agents and contractors to whom it provides such information do the same. Further, Business Associate agrees to comply with Covered Entity’s security policies and procedures. Business Associate also agrees to provide Covered Entity with access to and information concerning Business Associate’s security and confidentiality policies, processes, and practices that affect electronic PHI provided to or created by Business Associate pursuant to the Agreement upon reasonable request of the Covered Entity. Covered Entity shall determine if Business Associate’s security and confidentiality practices, policies, and processes comply with HIPAA and all regulations promulgated under HIPAA. Additionally, Business Associate will immediately report to Covered Entity any Security Incident of which it becomes aware.
AutoNDA by SimpleDocs
Security Compliance. Claris will take appropriate steps to ensure compliance with security procedures by its employees, contractors and sub processors and Claris shall ensure that any persons authorized to process Personal Data comply with applicable laws regarding the confidentiality and security of Personal Data with regards to the Service.
Security Compliance. Customer and its Customer Representatives shall comply with all Security and Access Policies.
Security Compliance. Each Party shall take appropriate measures to ensure compliance with the above-mentioned security measures by its employees and subcontractors, in particular by ensuring that all persons authorised to handle Data are committed to maintain confidentiality or are subject to an appropriate legal obligation of confidentiality.
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!