Data Privacy and Security Sample Clauses

The Data Privacy and Security clause establishes the obligations of parties to protect personal and sensitive information from unauthorized access, use, or disclosure. Typically, this clause requires adherence to relevant data protection laws, implementation of security measures such as encryption or access controls, and prompt notification in the event of a data breach. Its core function is to safeguard confidential data, ensuring compliance with legal standards and minimizing the risk of data misuse or loss.
POPULAR SAMPLE Copied 40 times
Data Privacy and Security. Bank will implement and maintain a written information security program, in compliance with all federal, state and local laws and regulations (including any similar international laws) applicable to Bank, that contains reasonable and appropriate security measures designed to safeguard the personal information of the Funds’ shareholders, employees, trustees and/or officers that Bank or any Subcustodian receives, stores, maintains, processes, transmits or otherwise accesses in connection with the provision of services hereunder. In this regard, Bank will establish and maintain policies, procedures, and technical, physical, and administrative safeguards, designed to (i) ensure the security and confidentiality of all personal information and any other confidential information that Bank receives, stores, maintains, processes or otherwise accesses in connection with the provision of services hereunder, (ii) protect against any reasonably foreseeable threats or hazards to the security or integrity of personal information or other confidential information, (iii) protect against unauthorized access to or use of personal information or other confidential information, (iv) maintain reasonable procedures to detect and respond to any internal or external security breaches, and (v) ensure appropriate disposal of personal information or other confidential information. Bank will monitor and review its information security program and revise it, as necessary and in its sole discretion, to ensure it appropriately addresses any applicable legal and regulatory requirements. Bank shall periodically test and review its information security program. Bank shall respond to Customer’s reasonable requests for information concerning Bank’s information security program and, upon request, Bank will provide a copy of its applicable policies and procedures, or in Bank’s discretion, summaries thereof, to Customer, to the extent Bank is able to do so without divulging information Bank reasonably believes to be proprietary or Bank confidential information. Upon reasonable request, Bank shall discuss with Customer the information security program of Bank. Bank also agrees, upon reasonable request, to complete any security questionnaire provided by Customer to the extent Bank is able to do so without divulging sensitive, proprietary, or Bank confidential information and return it in a commercially reasonable period of time (or provide an alternative response that reasonably addresses the poin...
Data Privacy and Security. 104 (a) Holdings and its Subsidiaries have implemented commercially reasonable procedures, including firewall protections and regular virus scans, designed to ensure that software used in the operation of their business is materially free of any code designed to (or intended to): (i) disrupt, disable, harm, or otherwise impede in any manner the operation of, or provide unauthorized access to, a computer system or network or other device on which such code is stored or installed, or (ii) compromise the privacy or data security of a user or damage or destroy any data or file without the user’s consent. The information technology systems and databases used by Holdings and its Subsidiaries are sufficient in all material respects for the needs of their business and in accordance with customary industry standards and practices. There has been no (x) failure or other substandard performance of any such information technology system or database that has caused any material disruption to the business of Holdings and its Subsidiaries or (y) to the knowledge of the Credit Parties, unauthorized intrusions or breaches of security with respect to any information technology systems and databases used by Holdings and its Subsidiaries. (b) Each of Holdings and its Subsidiaries (i) is, and has at all times been, in compliance in all material respects with all applicable requirements of law and Contractual Obligations regarding the collection, protection, storage, use, processing, disclosure, retention and transfer of Personal Information and (ii) has commercially reasonable safeguards in place to protect Personal Information in their possession or control from unauthorized access by other Persons. (c) There have not been, to the knowledge of the Credit Parties, any material unauthorized intrusions or breaches of the security of any of the information technology systems and databases, any material unauthorized access or use of any Personal Information or other information stored or contained therein or accessed or processed thereby, or any material compromise of the confidentiality, integrity, or availability of Personal Information or the physical, technical, administrative, or organizational safeguards put in place by Holdings or any of its Subsidiaries that relate to the protection of Personal Information. No Person has, to the knowledge of the Credit Parties, made any illegal or unauthorized use of Personal Information that was controlled by or on behalf of Holdings or a...
Data Privacy and Security. (i) The Purchaser and each of its Subsidiaries complies, and during the past two years has complied, in all material respects, with all Privacy and Information Security Requirements. Neither the Purchaser nor any of its Subsidiaries have been notified in writing of, or is the subject of, any complaint, regulatory investigation or proceeding related to Processing of Personal Data by any third party, Governmental Entity or payment card association, regarding any material violations of any Privacy and Information Security Requirement by or with respect to the Purchaser or any of its Subsidiaries; (ii) The Purchaser and each of its Subsidiaries employs commercially reasonable safeguards that comply in all respects with all applicable Privacy and Information Security Requirements to protect Purchaser Data within its custody or control and requires the same of all vendors under contract with the Purchaser that Process Purchaser Data on its behalf. The Purchaser and each of its Subsidiaries have provided all requisite notices and obtained all required consents, and satisfied all other requirements (including but not limited to notification to applicable Governmental Entities), necessary for the Processing (including international and onward transfer) of all Personal Data in connection with the conduct of the business as currently conducted and in connection with the consummation of the transactions contemplated hereunder, except to the extent that any failure to do so would not have, individually or in the aggregate, a Purchaser Material Adverse Effect; and (iii) Neither the Purchaser nor any of its Subsidiaries, to the Purchaser’s knowledge, has suffered a security breach with respect to any of the Purchaser Data and, to the Purchaser’s knowledge, there has been no unauthorized or illegal use of, access or disclosure to, or unavailability of any Purchaser Data. Neither the Purchaser nor any of its Subsidiaries has notified, or been required to notify, any Person of any information security breach or other incident involving Personal Data. To the Purchaser’s knowledge, the Purchaser Systems have had no material errors or defects that have not been fully remedied and contain no code designed to disrupt, disable, harm, distort, or otherwise impede in any manner the legitimate operation of such Purchaser Systems (including what are sometimes referred to as “viruses,” “worms,” “time bombs,” or “back doors”) that have not been removed or fully remedied. Neither it nor...
Data Privacy and Security. A. Personal Data and Customer Instructions. Under this Agreement, Apple, acting as a data processor on your behalf, may receive Personal Data if provided by You. By entering into this Agreement, You instruct Apple to process Your Personal Data, in accordance with applicable law: (i) to provide the Service; (ii) pursuant to Your instructions as given through your use of the Services (including the web portal and other functionality of the Service); (iii) as specified under this Agreement; and (iv) as further documented in any other written instructions given by You and acknowledged by Apple as constituting instructions under this Agreement. Apple shall comply with the instructions described in this Section 3A unless prohibited by an applicable legal requirement from doing so, in which case Apple will inform You of that legal requirement before processing Personal Data (unless prohibited by that law from doing so on important grounds of public interest).
Data Privacy and Security. 7.1.1 With respect to any End-User Customer Information received, accessible, or accessed by Merchant, Merchant will comply with applicable law regarding the use of non-public personal information and the requirements of BlueSnap’s Privacy Policy as amended from time to time. Further, Merchant (i) will not use any End-User Customer Information for any other purpose other than those contemplated hereunder, (ii) has and will maintain reasonable and appropriate measures to protect the security and confidentiality of such End-User Customer Information, and (iii) will not, directly or through an affiliate, disclose or permit the disclosure of any End-User Customer Information to any other person that is not an affiliate or service provider, or an employee or agent of any such party with a demonstrable need to know such End User Customer Confidential Information in order to fulfill the obligations hereunder. Merchant shall take all available steps and precautions to prevent fraud, theft and/or misappropriation of End-User Customer Information. 7.1.2 Subject to each Merchant’s obligations of confidentiality or a duty to restrict dissemination of proprietary information arising from third party relationships or as otherwise imposed by law, ▇▇▇▇▇▇▇▇ will promptly notify BlueSnap as soon as commercially reasonable upon learning of any suspected or actual security breach, unauthorized disclosure, compromise of privacy involving End-User Customers’ Information or the actual loss or theft of any such personal information (“Security Incident”).
Data Privacy and Security. Data Privacy. "
Data Privacy and Security. Except as otherwise disclosed in the Commission Documents or as would not be reasonably be expected to have, individually or in the aggregate, a Material Adverse Effect, the Company and each of its Subsidiaries are, and since January 1, 2021, has been, in compliance with all applicable Privacy and Security Requirements. Except as otherwise disclosed in the Commission Documents, the Company and each of its Subsidiaries has, where appropriate to the risk level, implemented technical, administrative and organizational measures, including policies relating to the lawful Processing of Personal Data, data privacy and data security, as and to the extent required by applicable Privacy Law (“Privacy and Data Security Policies”). Except as otherwise disclosed in the Commission Documents, since January 1, 2021, there has been no Proceeding, and to the Company’s Knowledge, there is no Proceeding currently pending against the Company or any of its Subsidiaries initiated by any Person (including (i) the United States Federal Trade Commission, any state attorney general or similar state official, or (ii) any other Governmental Entity, foreign or domestic) that, in each case, alleged that any Processing of Personal Data by or on behalf of the Company or any Subsidiary is or was in material violation of any Privacy and Security Requirements or any Privacy and Data Security Policies. Except as otherwise disclosed in the Commission Documents, neither the Company nor any of its Subsidiaries is under any Order issued by any Governmental Entity, foreign or domestic, related to Privacy and Security Requirements. Except as otherwise disclosed in the Commission Documents, to the Company’s Knowledge, since January 1, 2021, (i) there have been no incidents of unauthorized Processing of Personal Data that have adversely affected the business or operations of the Company or any of its Subsidiaries in a material way, and (ii) neither the Company nor any of its Subsidiaries has notified, or has been required by applicable Privacy Laws or agreement to notify, any Person of any (A) loss, theft or damage of, or (B) other unauthorized access to, acquisition of, or use, disclosure, or other Processing of Personal Data.
Data Privacy and Security. Supplier shall comply with the Data Privacy and Security Addendum terms contained in Exhibit C, attached hereto and made a part hereof.
Data Privacy and Security. (a) Each Group Company does not knowingly collect or process Personal Data contrary to law, to each Group Company’s knowledge. The Company has safeguards in place that are sufficient to protect Personal Data and confidential information in the Company’s possession or control from unauthorized access by third Persons and to ensure that the operation of the businesses of each Group Company (including with respect to employee matters) are in compliance with all Privacy and Security Requirements in all material respects. (b) There are no pending Proceedings, nor has there been any Proceedings against any Group Company initiated by (i) any Person; (ii) the United States Federal Trade Commission, any state attorney general or similar state official; (iii) any other Governmental Entity or (iv) any regulatory or self-regulatory entity, in each case, alleging that any Processing of Personal Data by or on behalf of a Group Company is in violation of any applicable Privacy Laws. (c) Since the Lookback Date, (i) there has been no material unauthorized access, use, acquisition or disclosure of Personal Data, or confidential business information in the possession or control of any Group Company or, to the Company’s knowledge, any third party service provider on behalf of any Group Company, and (ii) to the Company’s knowledge, there have been no unauthorized intrusions into or Security Breaches of any Group Company systems networks, communication equipment or other technology necessary for the operations of the Group Companies’ business. The Group Companies have not experienced any material successful unauthorized access to, use or modification of, or interference with Company IT Systems since the Lookback Date and none of the Group Companies is aware of any written or, to the knowledge of the Company, oral notices or complaints from any Person regarding such a Security Breach or incident. None of the Group Companies has received any written complaints, claims, demands, inquiries or other notices, including a notice of investigation, from any Person (including any Governmental Entity or self-regulatory authority) regarding any of the Group Companies’ Processing of Personal Data or compliance with applicable Privacy and Security Requirements. Since the Lookback Date, none of the Group Companies have provided or have been obligated to provide notice under any Privacy and Security Requirements to regarding any Security Breach or unauthorized access to or use of any Company ...
Data Privacy and Security. (a) Since January 1, 2018, the collection, acquisition, use, storage, transfer (including any cross-border transfers), distribution or dissemination by Tempranillo and its Subsidiaries of any Personal Data are and have been in compliance in all material respects with the Privacy Requirements, except where any instances of non-compliance have not had, and would not reasonably be expected to have, a Tempranillo Material Adverse Effect. (b) Tempranillo and its Subsidiaries maintain commercially reasonable policies, procedures, trainings, and security measures with respect to the physical and electronic security and privacy of Personal Data that are designed to achieve compliance with the Privacy Requirements, and Tempranillo and its Subsidiaries are in compliance with such policies and procedures, except as have not had, and would not reasonably be expected to have, a Tempranillo Material Adverse Effect. Since January 1, 2018, there have been no material breaches or material violations of any such security measures, or any unauthorized access of any Personal Data or Tempranillo’s or its Subsidiaries’ business data by any Third Party. As of the date of this Agreement, no written claim or other Proceeding is pending against Tempranillo or any of its Subsidiaries, nor to Tempranillo’s Knowledge, threatened, relating to any such obligation, policy, Applicable Law in relation to Personal Data or any breach or alleged breach thereof, except as has not had, and would not reasonably be expected to have, a Tempranillo Material Adverse Effect. (c) Except as would not reasonably be expected to have a Tempranillo Material Adverse Effect, to Tempranillo’s Knowledge, as of the date of this Agreement, the IT Assets owned by, or used and controlled by, Tempranillo and its Subsidiaries (i) operate and perform as required by Tempranillo and its Subsidiaries in connection with the conduct of their respective businesses, (ii) since January 1, 2018, have not malfunctioned or failed (except for malfunctions or failures that have been fully remedied) and (iii) are free from bugs and other defects and do not contain any “virus”, “worm”, “spyware” or other malicious Software. Except as would not reasonably be expected to have a Tempranillo Material Adverse Effect, to Tempranillo’s Knowledge, since January 1, 2018, no Person has gained unauthorized access to the IT Assets owned by, or used and controlled by, Tempranillo and its Subsidiaries. (d) To the Knowledge of Tempranillo, Tempra...