Security of Confidential Information. Each party possessing Confidential Information of the other party will maintain all such Confidential Information under secure conditions, using reasonable security measures and in any event not less than the same security procedures used by such party for the protection of its own Confidential Information of a similar kind.
Security of Confidential Information. 1. The Contractor shall implement and maintain a comprehensive data-security program in accordance with commercial best practices for the protection of Confidential Information, whether the Confidential Information is stored electronically and/or in hard copy. Such data-security program shall include, but is not limited to, the following:
a. Security policies for the Contractor’s employees, agents, affiliates, and subcontractors related to the storage, access, retention, transportation, and disposition of data containing Confidential Information;
b. Reasonable restrictions on access to records containing Confidential Information, including access to any locked storage where such records are kept;
c. Secure access controls to Confidential Information, including but not limited to passwords;
d. Procedures for data recovery, incident response and processes, and business continuity processes and procedures;
e. Encryption of Confidential Information in accordance with industry standard encryption when it is stored or transmitted electronically;
f. Protocols for regular backups that include retention of backup copies for such period of time as may be required by MCPS, or by federal, state, and county laws and regulations;
g. Audit logs of its system on a secured server with restricted access to prevent tampering or altering of audit data; and
h. A process for reviewing policies, procedures, and security measures, as well as training on security policies for employees who have access to Confidential Information, at least annually.
2. The Contractor certifies that it has implemented policies, procedures, and security measures to protect against reasonably foreseeable unauthorized access to, or disclosure of, Confidential Information, and to prevent other reasonably foreseeable events that may result in substantial harm to MCPS. In addition, the Contractor shall not maintain or store Confidential Information outside of the United States. To the extent that the Contractor uses cloud computing services, all Confidential Information provided by MCPS or MCPS Users shall be securely stored with a commercially reasonable third-party vendor using physical servers located solely within the United States and subject to network security measures consistent with industry standards. The Contractor will confirm to MCPS that the third-party vendor agrees to the non-disclosure agreement terms described in Article 18.C.6.
3. Access to the Contractor’s server(s) hosting Confidentia...
Security of Confidential Information. The Employee agrees that all University-owned data, software, equipment, facilities and supplies must be properly protected and secured. University-owned data, software, equipment, facilities and supplies must not be used to create Employee-owned software or personal data. Employee will comply with all University policies and instructions regarding security of confidential information. Any software, products or data created as a result of work-related activities are owned by the University and must be produced in the approved format and medium. The Employee agrees to protect University records from unauthorized disclosure or damage and will comply with all requirements of law regarding disclosure of University information.
Security of Confidential Information. 36.1 In order to ensure that no unauthorised person gains access to any Confidential Information or any data obtained in the performance of the Agreement, the Contractor undertakes to maintain security systems approved by the Commissioner. Where necessary to prevent such access, the Commissioner may require the Contractor to alter any security systems at any time during the Contract Period at the Contractor’s expense.
36.2 The Contractor will immediately notify the Commissioner of any breach of security in relation to Confidential Information and all data obtained in the performance of the Agreement and will keep a record of such breaches. The Contractor will use its best endeavours to recover such Confidential Information or data however it may be recorded. This obligation is in addition to the Contractor’s obligations under clause 34. The Contractor will co-operate with the Commissioner in any investigation that the Commissioner considers necessary to undertake as a result of any breach of security in relation to Confidential Information or data.
Security of Confidential Information. 36.1 In order to ensure that no unauthorised person gains access to any Confidential Information or any data obtained in the performance of the Contract, the Contractor undertakes to maintain security systems approved by the Authority. Any such approval shall not however thereby relieve the Contractor of any liability.
36.2 The Contractor will immediately notify the Authority of any breach of security in relation to Confidential Information and all data obtained in the performance of the Agreement and will keep a record of such breaches. The Contractor will use its best endeavours to recover such Confidential Information or data however it may be recorded. This obligation is in addition to the Contractor‟s obligations under Clause 34. The Contractor will co-operate with the Authority in any investigation that the Authority considers necessary to undertake as a result of any breach of security in relation to Confidential Information or data.
Security of Confidential Information. Employee agrees that all Agency-owned data, software, equipment, facilities and supplies must be properly protected and secured. Agency-owned data, software, equipment, facilities and supplies must not be used to create Employee-owned software or personal data. Employee will comply with all Agency policies and instructions regarding security of confidential information. Any software, products or data created as a result of work-related activities are owned by the Agency and must be produced in the approved format and medium.
Security of Confidential Information. 36.1 In order to ensure that no unauthorised person gains access to any Confidential Information or any data obtained in the performance of the Agreement, the Contractor undertakes to maintain security systems approved by the Authority.
36.2 The Contractor will immediately notify the Authority of any breach of security in relation to Confidential Information and all data obtained in the performance of the Agreement and will keep a record of such breaches. The Contractor will use its reasonable endeavours to recover such Confidential Information or data however it may be recorded. This obligation is in addition to the Contractor’s obligations under clause 34. The Contractor will co-operate with the Authority in any investigation that the Authority reasonably considers necessary to undertake as a result of any breach of security in relation to Confidential Information or data.
Security of Confidential Information. 21.1 In order to ensure that no unauthorised person gains access to any Confidential Information or any data obtained in the performance of the Contract, the Contractor undertakes to maintain security systems approved by the Authority.
21.2 The Contractor will immediately notify the Authority of any breach of security in relation to Confidential Information and all data obtained in the performance of the Contract and will keep a record of such breaches. The Contractor will use its best endeavours to recover such Confidential Information or data however it may be recorded. This obligation is in addition to the Contractor’s obligations under Condition 19. The Contractor will co-operate with the Authority in any investigation that the Authority considers necessary to undertake as a result of any breach of security in relation to Confidential Information or data.
Security of Confidential Information. 22.1 In order to ensure that no unauthorised person gains access to any Confidential Information or any data obtained in the performance of the Framework Agreement, the Contractor undertakes to maintain security systems approved by the Authority.
22.2 The Contractor will immediately notify the Authority of any breach of security in relation to Confidential Information and all data obtained in the performance of the Framework Agreement and will keep a record of such breaches. The Contractor will use its best endeavours to recover such Confidential Information or data however it may be recorded. This obligation is in addition to the Contractor’s obligations under Clause 22.6. The Contractor will co-operate with the Authority in any investigation that the Authority considers necessary to undertake as a result of any breach of security in relation to Confidential Information or data.
22.3 The Authority may require the Contractor to alter any security systems at any time during the Term of the Framework Agreement.
22.4 The Contractor acknowledges that the Authority’s Data is the property of the Authority and the Authority hereby reserves all Intellectual Property Rights which may subsist in the Authority’s Data. The Contractor shall not delete or remove any copyright notices contained within or relating to the Authority’s Data.
22.5 The Contractor and the Authority shall each take reasonable precautions (having regard to the nature of their other respective obligations under this Framework Agreement) to preserve the integrity of the Authority’s Data and to prevent any corruption or loss of the Authority’s Data.
22.6 In the event that the Authority’s Data is corrupted or lost as a result of any default by the Contractor or its Staff the Authority shall have the option, in addition to any other remedies that may be available to it either under this Framework Agreement or otherwise, to elect either of the following remedies:
Security of Confidential Information. In order to ensure that no unauthorised person gains access to any Confidential Information or any data obtained in the performance of the Agreement, the Contractor undertakes to maintain security systems approved by the Commissioner. Where necessary to prevent such access, the Commissioner may require the Contractor to alter any security systems at any time during the Contract Period at the Contractor’s expense.