Data Security のサンプル条項

Data Security. We have put in place appropriate security measures to prevent your personal data from being accidentally lost, used or accessed in an unauthorised way, altered or disclosed. In addition, we limit access to your personal data to those employees, agents, contractors and other third parties who have a business need to know. They will only process your personal data on our instructions and they are subject to a duty of confidentiality. We have put in place procedures to deal with any suspected personal data breach and will notify you and any applicable regulator of a breach where we are legally required to do so. How long will you use my personal data for? We will only retain your personal data for as long as necessary to fulfil the purposes we collected it for, including for the purposes of satisfying any legal, accounting, or reporting requirements. To determine the appropriate retention period for personal data, we consider the amount, nature, and sensitivity of the personal data, the potential risk of harm from unauthorised use or disclosure of your personal data, the purposes for which we process your personal data and whether we can achieve those purposes through other means, and the applicable legal requirements. In some circumstances you can ask us to delete your data: see Request erasure in YOUR LEGAL RIGHTS below for further information. In some circumstances we may anonymise your personal data (so that it can no longer be associated with you) for research or statistical purposes in which case we may use this information indefinitely without further notice to you.
Data Security. Qlik will use commercially reasonable, industry standard security measures in providing Qlik Cloud and will comply with such data security regulations applicable to Qlik Cloud. Qlik has implemented appropriate technical and procedural safeguards to protect and secure Content in accordance with the Information Security Addendum available at ▇▇▇.▇▇▇▇.▇▇▇/▇▇▇▇▇▇▇- terms. Qlik Cloud is hosted and delivered from a data center operated by a third-party provider, which is solely responsible for the underlying infrastructure and hosting of Qlik Cloud. Qlik reserves the right to remove or update its third-party provider. Customer is solely responsible for any breach or loss resulting from: (i) Customer’s failure to control user access; (ii) failure to secure Content which Customer transmits to and from Qlik Cloud; and
Data Security. (a) RETRANSMISSION PROHIBITED - Subscriber shall use Market Data only for its individual use in its business or, if Subscriber is an individual, for his or her personal, non-business use. Subscriber shall neither furnish Market Data to any other person nor retransmit Market Data among its premises. (b) CONTROL OF EQUIPMENT - Subscriber shall assure that Subscriber or, if applicable, Subscriber’s partners or officers and employees, have sole control or physical possession of, and sole access to Market Data through, Subscriber Equipment. (c) DISPLAYS ACCESSIBLE TO THE GENERAL PUBLIC - Notwithstanding the limitations of Paragraph 5(a), if Subscriber is a securities professional, such as a registered brokerdealer or investment banker, Subscriber may install one or more Subscriber Devices on enclosed portions of premises to which the general public has access if Subscriber (i) controls the premises and access to them and (ii) gives Vendor written notice of the installation. Subscriber may permit individuals who are passing through or visiting the premises to operate or to view the devices on a sporadic basis, and for limited periods of time, during their temporary presence on the premises. (d) SECURITIES PROFESSIONAL EXCEPTION - Notwithstanding Paragraph 5(a), if Subscriber is a securities professional, such as a registered broker-dealer or investment adviser, Subscriber may occasionally furnish limited amounts of Market Data to its customers and clients and to its branch offices, but solely in the regular course of its securities business. Subscriber may so furnish Market Data to its customers and clients who are not on Subscriber’s premises solely (i) in written advertisements, educational material, sales literature or similar written communications, or (ii) during telephonic voice communication not entailing the use of computerized voice synthesization or similar technology. Subscriber may so furnish Market Data to its branch offices solely (i) as provided in the preceding sentence, or (ii) through manual entry of the data over its teletype network. Subscriber shall not permit any customer or client to take physical possession of Subscriber Equipment. Subscriber shall abide by any additional limitations that NYSE may specify in writing, either directly or through Vendor. (e) EQUIPMENT SECURITY - Subscriber understands that this Paragraph 5 requires Subscriber to carefully locate and protect Subscriber Equipment. Subscriber shall abide by any requirements tha...