Data Security and Processing Sample Clauses

The Data Security and Processing clause establishes the obligations and standards for handling, storing, and protecting data exchanged or processed under the agreement. It typically outlines requirements for implementing security measures, restricting access to sensitive information, and ensuring compliance with relevant data protection laws. This clause is essential for safeguarding confidential or personal data, mitigating the risk of data breaches, and clarifying each party’s responsibilities regarding data management.
Data Security and Processing. 9.1. Security Program. SailPoint will maintain administrative, physical, and technical safeguards designed to protect the security and confidentiality of Customer Data, including measures designed to prevent unauthorized access, use, modification, or disclosure of Customer Personal Data. SailPoint’s current SaaS data security programs for each SaaS Service are described on SailPoint’s website at ▇▇▇▇▇://▇▇▇.▇▇▇▇▇▇▇▇▇.▇▇▇/legal/. With respect to the SaaS Services listed at ▇▇▇▇▇://▇▇▇.▇▇▇▇▇▇▇▇▇.▇▇▇/legal/saas-services/, SailPoint will operate in conformance with the physical, technical, operational, and administrative measures and protocols regarding data security that are set forth in its then current Service Organization Control 2 (SOC 2) Type 2 Report(s) (or equivalent report(s)), received from its third-party auditors. Upon Customer request, for each calendar year during the term of this SaaS Agreement, upon sixty (60) calendar days of issuance but no later than the end of each calendar year, SailPoint shall submit to Customer via email to Customer’s Contract Manager or designee a copy of its annual American Institute of Certified Public Accountants Service Organization Control (SOC) 1 type 2 report or SOC 2 type 2 report (for all Trusted Services Principles) relevant to the Services, such relevancy as solely determined by Customer.
Data Security and Processing. 7.1. Data Security Standards. Varicent shall use, process, retain, and disclose Customer Data only as necessary for the specific purpose of providing the Cloud Service and in compliance with Varicent’s data security standards and procedures set forth at: ▇▇▇▇▇://▇▇▇.▇▇▇▇▇▇▇▇.▇▇▇/legal_agreements (the “Data Security Standards”) and applicable Law. Varicent shall not sell Personal Data. Customer acknowledges that (a) Varicent may modify the Data Security Standards from time to time at Varicent’s sole discretion and (b) such modifications shall supersede prior versions; provided that, such modified Data Security Standards shall be, except to the extent required to comply with applicable Law, no less protective of the Customer Data than the Data Security Standards in place as of the Effective Date. 7.2. Customer Responsibilities. Customer is solely responsible for (a) taking necessary actions to order, enable, and use the available data protection features for the Cloud Service and (b) implementing and managing security and privacy measures for the Customer Systems and any items not provided and managed by Varicent within the Cloud Service (such as systems and applications built or deployed by Customer upon the Cloud Service and Customer end-user access control to the Cloud Service).
Data Security and Processing 

Related to Data Security and Processing

  • Data Security and Privacy Except as would not, individually or in the aggregate, reasonably be expected to be material to the business of the Company Group, taken as a whole, the Company and each of its Subsidiaries (i) is in compliance with all Data Security Requirements and (ii) has taken commercially reasonable steps consistent with standard industry practice by companies of similar size and maturity, and in compliance in all material respects with all Data Security Requirements to protect (A) the confidentiality, integrity, availability and security of its Business Systems that are involved in the Processing of Personally Identifiable Information, in the conduct of the business of the Company and its Subsidiaries as currently conducted; and (B) Personally Identifiable Information Processed by or on behalf of the Company or such Subsidiary or on their behalf from unauthorized use, access, disclosure, theft and modification. Except as would not, individually or in the aggregate, reasonably be expected to be material to the business of the Company Group, taken as a whole, (i) there are, and since January 1, 2022, have been, no pending complaints, investigations, inquiries, notices, enforcement proceedings, or Actions by or before any Governmental Authority and (ii) since January 1, 2022, no fines or other penalties have been imposed on or written claims, notice, complaints or other communications have been received by the Company or any Subsidiary, relating to any Specified Data Breach or alleging non-compliance with any Data Security Requirement. The Company and each of its Subsidiaries have not, since January 1, 2022, (1) experienced any Specified Data Breaches, or (2) been involved in any Legal Proceedings related to or alleging any violation of any Data Security Requirements by the Company Group or any Specified Data Breaches, each except as would not be material to the business of the Company Group, taken as a whole. The consummation of the transactions contemplated by this Agreement will not cause the Company Group to breach any Data Security Requirement, except as would not reasonably be expected to be material to the business of the Company Group, taken as a whole.

  • Data Security and Privacy Plan Contractor shall adopt and maintain administrative, technical and physical safeguards, measures and controls to manage privacy and security risks and protect PII in a manner that complies with New York State, federal and local laws and regulations and the EA’s policies. Education Law Section 2-d requires that Contractor provide the EA with a Data Privacy and Security Plan that outlines such safeguards, measures and controls including how the Contractor will implement all applicable state, federal and local data security and privacy requirements. Contractor’s Data Security and Privacy Plan is attached to this DPA as Exhibit C.

  • Data Security and Unauthorized Data Release The Requester and Approved Users, including the Requester’s IT Director, acknowledge NIH’s expectation that they have reviewed and agree to manage the requested controlled-access dataset(s) and any Data Derivatives of controlled-access datasets according to NIH’s expectations set forth in the current NIH Security Best Practices for Controlled-Access Data Subject to the GDS Policy and the Requester’s IT security requirements and policies. The Requester, including the Requester’s IT Director, agree that the Requester’s IT security requirements and policies are sufficient to protect the confidentiality and integrity of the NIH controlled-access data entrusted to the Requester. If approved by NIH to use cloud computing for the proposed research project, as outlined in the Research and Cloud Computing Use Statements of the Data Access Request, the Requester acknowledges that the IT Director has reviewed and understands the cloud computing guidelines in the NIH Security Best Practices for Controlled-Access Data Subject to the NIH GDS Policy. The Requester and PI agree to notify the appropriate DAC(s) of any unauthorized data sharing, breaches of data security, or inadvertent data releases that may compromise data confidentiality within 24 hours of when the incident is identified. As permitted by law, notifications should include any known information regarding the incident and a general description of the activities or process in place to define and remediate the situation fully. Within 3 business days of the DAC notification, the Requester agrees to submit to the DAC(s) a detailed written report including the date and nature of the event, actions taken or to be taken to remediate the issue(s), and plans or processes developed to prevent further problems, including specific information on timelines anticipated for action. The Requester agrees to provide documentation verifying that the remediation plans have been implemented. Repeated violations or unresponsiveness to NIH requests may result in further compliance measures affecting the Requester. NIH, or another entity designated by NIH may, as permitted by law, also investigate any data security incident or policy violation. Approved Users and their associates agree to support such investigations and provide information, within the limits of applicable local, state, tribal, and federal laws and regulations. In addition, Requester and Approved Users agree to work with the NIH to assure that plans and procedures that are developed to address identified problems are mutually acceptable and consistent with applicable law.

  • Data Security The Provider agrees to utilize administrative, physical, and technical safeguards designed to protect Student Data from unauthorized access, disclosure, acquisition, destruction, use, or modification. The Provider shall adhere to any applicable law relating to data security. The provider shall implement an adequate Cybersecurity Framework based on one of the nationally recognized standards set forth set forth in Exhibit “F”. Exclusions, variations, or exemptions to the identified Cybersecurity Framework must be detailed in an attachment to Exhibit “H”. Additionally, Provider may choose to further detail its security programs and measures that augment or are in addition to the Cybersecurity Framework in Exhibit “F”. Provider shall provide, in the Standard Schedule to the DPA, contact information of an employee who ▇▇▇ may contact if there are any data security concerns or questions.

  • Security and Safety A. The Contractor warrants it is and shall remain in compliance with all applicable local, state and federal laws, regulations, codes and ordinances relating to fire, construction, building, health, food service and safety, including but not limited to the Hotel and Motel Fire Safety Act of 1990, Public Law 101-391. The Judicial Council may terminate this Agreement, pursuant to the termination for cause provision set forth herein, without penalty or prejudice if the Contractor fails to comply with the foregoing requirements. B. The Contractor shall assure that each Attendee is advised of all the appropriate precautions that should be taken to provide for the Attendee’s safety while on the Property. The Contractor shall take every reasonable precaution to provide for the security of Attendees and their belongings. C. The Contractor shall immediately advise the Judicial Council’s staff of any known problems that involve the Attendees during the Program including, but not limited to, assaults, burglaries, accidents, and/or illnesses.