Asset Handling Clause Samples

The Asset Handling clause defines the procedures and responsibilities for managing, storing, and transferring assets involved in a contract. It typically outlines how assets—such as equipment, materials, or intellectual property—should be handled during the term of the agreement, including requirements for maintenance, security, and return upon contract completion. This clause ensures that all parties understand their obligations regarding the care and disposition of assets, thereby minimizing disputes and safeguarding the value and integrity of the assets throughout the contractual relationship.
Asset Handling a. Acuity classifies Customer Data to help identify it and allow for access to it to be appropriately restricted (e.g. through encryption). b. Acuity imposes restrictions on printing Customer Data and has procedures for disposing of printed materials that contain Customer Data. c. Acuity personnel must obtain authorization prior to storing Customer Data on portable devices, remotely accessing Customer Data, or processing Customer Data outside Acuity’s facilities. This includes removing media (e.g., USB sticks and CD ROMs) and documents containing Customer Data from Acuity’s facilities.
Asset Handling i. The Data Importer employees are required to utilize encryption to store data in a secure manner and are required to use two-factor authentication to access Wildbit, LLC’s networks. ii. The Data Importer imposes restrictions on printing customer data and has procedures for disposing of printed materials that contain customer data. iii. The Data Importer's personnel must obtain authorization prior to storing customer data on portable devices, remotely accessing customer data, or processing customer data outside the Data Importer's facilities.
Asset Handling. ▇. Microsoft classifies Customer Data to help identify it and to allow for access to it to be appropriately restricted (e.g., through encryption). B. Microsoft imposes restrictions on printing Customer Data and has procedures for disposing of printed materials that contain Customer Data. C. Microsoft personnel must obtain Microsoft authorization prior to storing Customer Data on portable devices, remotely accessing Customer Data, or processing Customer Data outside Microsoft's facilities.
Asset Handling i. Provider shall classify Accenture Data so that it is properly identified and access to Accenture Data shall be appropriately restricted. ii. Provider shall maintain an acceptable use policy with restrictions on printing Accenture Data and procedures for appropriately disposing of printed materials that contain Accenture Data when such data is no longer needed to provide the Provider Services under the Agreement. iii. Provider shall maintain an appropriate approval process whereby such approval is provided to personnel, contractors, and agents prior to storing Accenture Data on portable devices; remotely accessing Accenture Data; or processing such data outside of Provider facilities. If storing Accenture Data on portable devices is approved and granted, Provider shall enforce the use of current Industry Standard encryption on the portable device. If mobile devices are used to access or store Accenture Data, Provider personnel, contractors and agents shall use a mobile device management (MDM)/mobile application mangement (MAM) solution that enforces encryption, passcode, and remote wipe settings to secure Accenture Data. Provider will prohibit the enrollment of mobile devices that have been “jail broken.”
Asset Handling. (i) Provider’s employees are required to utilize encryption to store data in a secure manner and are required to use two-factor authentication to access LiveChat, Inc. network.
Asset Handling. A. CloudBlue classifies Personal Data to help identify it and to allow for access to be appropriately restricted (e.g., through encryption). B. CloudBlue personnel must obtain Customer authorization prior to storing Personal Data on portable devices or CloudBlue facilities. This includes removing media (e.g., USB sticks and disks)
Asset Handling i. The Data Importer employees are required to utilize encryption to store data in a secure manner and are required to use two-factor authentication to access Traxo’s networks. ii. The Data Importer imposes restrictions on printing customer data and has procedures for disposing of printed materials that contain customer data. iii. The Data Importer's personnel must obtain authorization prior to storing customer data on portable devices, remotely accessing customer data, or processing customer data outside the Data Importer's facilities.
Asset Handling i. The Data Importer imposes restrictions on printing customer data and has procedures for disposing of printed materials that contain customer data. ii. The Data Importer's personnel must obtain authorization prior to storing customer data on portable devices, remotely accessing customer data, or processing customer data outside the Data Importer's facilities.
Asset Handling. The Data Importer provides guidance to Data Importer businesses on: (a) classifying information generated or used by the applicable Data Importer business; and (b) recommended ways to label, store, transmit, and dispose of such information, depending on its classification. This includes paper documents, electronic reports and presentations, as well as transmitted or stored data such as email and Data Exporter transactions.
Asset Handling. A. Microsoft restricts access to Customer Data. Customer may implement encryption of Customer Data within Customer’s application. Microsoft imposes restrictions on printing Customer Data and has procedures for disposing of printed materials that contain Customer Data. B. Microsoft personnel must obtain Microsoft authorization prior to storing Customer Data on portable devices, remotely accessing Customer Data, or processing Customer Data outside Microsoft’s facilities. This includes removing media (e.g., USB sticks and CD ROMs) and documents containing Customer Data from Microsoft’s facilities.