DATA SECURITY AND PROTECTION Sample Clauses
The Data Security and Protection clause establishes the obligations of parties to safeguard sensitive information from unauthorized access, loss, or misuse. It typically requires the implementation of appropriate technical and organizational measures, such as encryption, access controls, and regular security assessments, to protect data handled under the agreement. This clause is essential for ensuring compliance with privacy laws and industry standards, and it helps mitigate the risk of data breaches and associated liabilities.
POPULAR SAMPLE Copied 15 times
DATA SECURITY AND PROTECTION. The Contractor will hold County Information, as defined below, in the strictest confidence and will comply with all applicable County security and network resources policies, as well as all local, state and federal laws and regulatory requirements concerning data privacy and security. The Contractor must develop, implement, maintain, continually monitor and use appropriate administrative, technical and physical security measures to control access to and to preserve the confidentiality, privacy, integrity and availability of all electronically maintained or transmitted information received from or created or maintained on behalf of the County. For purposes of this provision, and as more fully described in this Contract and in the County’s Non-Disclosure and Data Security Agreement (NDA), “County Information” includes, but is not limited to, electronic information; documents; data; images; financial records; personally identifiable information; personal health information (PHI); personnel, educational, voting, registration, tax and assessment records; information related to public safety; County networked resources; and County databases, software and security measures that are created, maintained, transmitted or accessed to perform the Work under this Contract.
DATA SECURITY AND PROTECTION. The Contractor shall hold FW Information in the strictest confidence and comply with all applicable FW security and network resources policies as well as all local, state and federal laws or regulatory requirements concerning data privacy and security. The Contractor shall develop, implement, maintain, continually monitor and use appropriate administrative, technical and physical security measures to preserve the confidentiality, privacy, integrity and availability of all electronically maintained or transmitted FW Information received from, created or maintained on behalf of FW and strictly control access to FW Information. For purposes of this provision, and as more fully described in this Contract and FW’s Non-Disclosure and Data Security Agreement (“NDA”), “FW Information” (also referred to as “FW Data” or “data”) includes, but is not limited to, electronic information, documents, data, images, and records including, but not limited to, financial records, personally identifiable information, Personal Health Information (PHI), personnel, educational, registration, tax or assessment records, information related to public safety, FW networked resources, and FW databases, software and security measures which is created, maintained, transmitted or accessed to perform the work under this Contract.
DATA SECURITY AND PROTECTION. 16.1 The Service Provider shall:
(a) implement and maintain the security and business continuity procedures set out in Schedule 3 and ensure that at all times it has in place appropriate security procedures to prevent the unauthorised disclosure, destruction, damage, loss or alteration of Data, including any procedures or changes to the procedure set out in Schedule 3 notified from time to time by the Network Operators’ Representative; and
(b) take such steps as all or any of the Network Operators may reasonably require to enable them to comply with their obligations under the Data Protection ▇▇▇ ▇▇▇▇, as amended from time to time (the DPA), and any other applicable statutory obligations relating to Data and, upon request from any Network Operator, shall provide that Network Operator with such information as it may require to satisfy itself that the Service Provider has taken such steps.
16.2 The Service Provider shall reconstitute any Data which is lost, destroyed or damaged to the extent it is reasonably able from any backups of the Data which it has access to. The Service Provider shall bear the reasonable costs of such reconstitution to the extent the Data was lost, destroyed or damaged as a result of its negligence or breach of its obligations under this Agreement. Each Network Operator shall assist the Service Provider to the extent it is reasonably able by providing and procuring that Users and any other relevant third parties provide the Service Provider with such back up copies of the Data as may exist.
16.3 The Parties acknowledge that the Service Provider shall be the data processor (as defined under the DPA) of each Network Operator in respect of its processing (as defined under the DPA) (processing) of Data. Accordingly, the Service Provider shall have no liability whatsoever to any person (including, without limitation, to any data subject, as defined under the DPA) in respect of any processing of Data carried out under this Agreement by the Service Provider in its capacity as data processor of each Network Operator.
DATA SECURITY AND PROTECTION. 12.1 The Client undertakes to ensure that appropriate technical and organisational measures are adopted by it against unauthorised or unlawful processing of personal data or personal information and against accidental loss or destruction of, or damage to the personal data or personal information.
12.2 During the ordinary course of dealings between the Parties and in connection with the performance of this Agreement, the Parties acknowledge that each Party may need to Process (as defined under the Data Protection Law) Personal Data (as defined under the Data Protection Law) belonging to or supplied by the other Party or from authorized third parties or any other persons from time to time by electronic or paper-based means.
12.3 By entering into this Agreement, the Parties expressly and explicitly acknowledge and consent to the Processing of such Personal Data by each Party for the purpose of performance of this Agreement and for all other purposes that are necessary, incidental or related to the performance of this Agreement, including Processing of such Personal Data within and, where necessary, outside jurisdiction, and the transfer and disclosure of such Personal Data to third parties authorised by each Party within and, where necessary, outside jurisdiction, provided that these third parties undertake to keep such Personal Data confidential, or to any persons, authorities or regulators to whom the Parties are compelled, permitted or required under the law to be disclosed to.
12.4 Failure to supply any of the Personal Data requested may result in a Party being unable to provide his products/services or its obligations or continue with any transaction or dealing with the other Party.
12.5 To the extent that a Party has disclosed (or will disclose) its employees’, agent’s or other third parties’ Personal Data to the other Party, the disclosing Party warrants and represents that it has obtained (or will obtain) the relevant individual's consent to disclose such Personal Data to the other Party in accordance with this Clause and for the purpose of the performance of this Agreement, and for all other purposes that are necessary, incidental or related to the performance of this Agreement.
12.6 The Parties warrant and represent that all Personal Data disclosed or to be disclosed to the other Party is accurate and complete, and that none of it is misleading or out of date as of the date of this Agreement. The Parties shall promptly update each Party in the event...
DATA SECURITY AND PROTECTION. 4.1 The Parties acknowledge that for the purposes of the Data Protection Legislation, the Customer is the Data Controller and Eckoh is the Data Processor of the Personal Data.
4.2 ▇▇▇▇▇ and the Customer hereby agree to comply with their obligations in relation to Personal Data as set out in Schedule 5.
4.3 The Customer is entitled, on giving at least thirty (30) days’ notice to ▇▇▇▇▇, to inspect or appoint representatives to inspect all facilities, equipment, records, documents and electronic data relating to the Processing of Personal Data by ▇▇▇▇▇ under this clause 4 and Schedule 5. Any audit will be conducted so as not to disrupt ▇▇▇▇▇’s day to day operations and will be subject to the Customer covering ▇▇▇▇▇’s reasonable costs and complying with all security, confidentiality and safety requirements notified by ▇▇▇▇▇.
4.4 The requirement under clause 4.3 to give notice will not apply if an audit is required by a Regulatory Body in relation to the Processing of Personal Data or the Customer reasonably believes in good faith that Eckoh is in material breach of any of its obligations under this clause 4 or Schedule 5.
4.5 This clause 4 shall survive the termination of this Agreement and shall continue for a period of one (1) year following the destruction or return of all Personal Data Processed by ▇▇▇▇▇ under this Agreement.
DATA SECURITY AND PROTECTION. The Contractor shall hold FW Information in the strictest confidence and comply with all applicable FW security and network resources policies as well as all local, state and federal laws or regulatory requirements concerning data privacy and security. The Contractor shall develop, implement, maintain, continually monitor and use appropriate administrative, technical and physical security measures to preserve the confidentiality, privacy, integrity and availability of all electronically maintained or transmitted FW Information received from, created or maintained on behalf of FW and strictly control access to FW Information. For purposes of this provision, and as more fully described in this Contract and FW’s Non-Disclosure and Data Security Agreement (“NDA”), “FW Information” (also referred to as “FW Data” or “data”) includes, but is not limited to, electronic information, documents, data, images, and records including, but not limited to, financial records, personally identifiable information, Personal Health Information (PHI), personnel, educational, registration, tax or assessment records, information related to public safety, FW networked resources, and FW databases, software and security measures which is created, maintained, transmitted or accessed to perform the work under this Contract.
a) F W’s Non-Disclosure and Data Security Agreement (NDA). The Contractor shall require that an authorized Contractor designee, and all key employees, agents or subcontractors working on-site at FW facilities or otherwise performing non-incidental work under this Contract, sign the NDA (attached as an Exhibit hereto) prior to performing any work or permitting access to FW networked resources, application systems or databases under this Contract. Copies of the signed NDAs shall be available to the FW Project Officer upon request.
DATA SECURITY AND PROTECTION. Each Party represents and warrants that it has implemented and maintains appropriate administrative, physical and technical safeguards to protect the confidentiality, integrity and security of Confidential Information, including personal identifiable information and other sensitive data. To the extent that either Party will receive, use, process or handle personal identifiable information (“Personal Information”) in fulfilling the terms of this MOU, each Party will ensure that such use is in accordance with all applicable laws and that the Personal Information is appropriately secured in all forms and used only for the purposes for which such Personal Information was received. In the event that the Disclosing Party discloses to the Receiving Party any Personal Information relating to the Disclosing Party’s customers or any other third parties, the Disclosing Party represents and warrants that such Personal Information does not infringe any rights of any third party, including copyright, trademark, right of publicity or privacy and that the Disclosing Party has obtained all required rights or permissions necessary to provide such Personal Information to the Receiving Party for the intended use.
DATA SECURITY AND PROTECTION. 6.1 The Recipient must use best practice methods to keep all Data which is in the power, possession or control of the Recipient secure and protected from unauthorised access, misuse, damage, destruction, unauthorised disclosure or modification, or theft.
6.2 Subject to clause 6.3 below, the Recipient must not distribute or release the Data to any third party, and must make sure that no one is allowed to take or send the Data to any location other than a location under the control of the Recipient without the Administering Institution’s prior written permission.
6.3 The Recipient may disclose the Data to:
(a) those of its employees, officers, students and contractors who:
(i) have a need to access the Data for the Purpose;
(ii) are named on the Application Form; and
(iii) who have agreed to use the Data in accordance with the terms of this Agreement (Authorised Users); and
(b) Authorised Collaborators, on condition that the Administering Institution has confirmed in writing to the Recipient that the Authorised Collaborator has executed an Australian Genomics Data Access and Sharing Agreement with Administering Institution which governs the Authorised Collaborator’s use of the Data for the Purpose.
6.4 The Recipient is responsible for monitoring and ensuring that all Authorised Users comply with the terms of this Agreement and will be liable for any breaches by Authorised Users.
6.5 The Recipient must immediately notify the Administering Institution if any Authorised User ceases to have a legitimate reason to continue to access the Data under the terms of this Agreement (whether due to cessation or transfer of employment, change of duties or project or any other reason).
6.6 If the Recipient wishes to disclose the Data to a person or third party who is not named on the Application Form as an Authorised User or Authorised Collaborator, the Recipient must re-submit the Application Form or otherwise obtain the Administering Institution’s prior written consent to such disclosure of the Data.
6.7 In the event that Recipient becomes aware of a Data Breach (or suspected Data Breach) or any other use or disclosure of the Data that is inconsistent with this Agreement, the Recipient must:
(a) notify Australian Genomics immediately by email to: ▇▇▇▇▇▇▇▇@▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇.▇▇▇.▇▇; and
(b) comply with the procedures set out in the Data Breach Policy, as applicable.
6.8 Without limiting the Recipient’s obligation to comply with the procedures set out in the Data Breach Po...
DATA SECURITY AND PROTECTION. 6.1 Each Party will process data (whether Contract Data, Party Data or Services Data), which may include personal data (such as the personal data of end users or a Party's staff), for the purposes of performing its obligations and exercising its rights under or in connection with this Agreement.
6.2 When acting as a data processor, the relevant Party shall:
(a) process Controller Data:
(i) only on the documented instructions of the data controller. For the purposes of this Agreement, those instructions are as set out in this Clause 6, the parts of the CDSP Service Description applicable to the UK Link User Services, or as otherwise notified in writing by the data controller to the data processor. The data processor reserves the right to charge the data controller for any material change or addition to the instructions set out in this Agreement; and
(ii) as required by European Union or English law applicable to the data processor, in which case the data processor shall first inform the data controller of the legal requirement, unless that law prohibits such prior notification;
(b) not engage any sub-processor if such engagement will have a material adverse effect on the data controller (and the relevant data controller hereby authorises the data processor to engage a sub-processor, provided such engagement will not have a material adverse effect on the data controller);
(c) not transfer any Controller Data to any country or territory outside the European Economic Area without obtaining the prior written consent of the data controller and provided that such transfer also complies with Data Protection Law;
(d) implement appropriate technical and organisational measures to ensure the security of the Controller Data, including protection against unauthorised or unlawful processing and against accidental loss, destruction or damage; and
(e) permit the data controller, or a third party auditor acting on the data controller's behalf and bound by a confidentiality agreement that is acceptable to the data processor, to conduct, at the data controller's cost, annual audits concerning the data processor’s compliance with this Agreement. The data controller is entitled to more frequent audits if this is required by Data Protection Law. The data processor may provide sufficient evidence of its compliance with these procedures in lieu of conducting any such audits. The CDSP's information security arrangements for the purposes of the DSC from time to time shall operate a...
DATA SECURITY AND PROTECTION. You shall be bound by the Cyber Security and Data Protection Terms and Conditions published/located at ▇▇▇▇▇://▇▇▇.▇▇▇▇▇▇.▇▇▇/our-business/suppliers (or such other website/webpage as may be determined by Axiata Group Berhad from time to time) which may be varied from time to time, which are incorporated by reference in these Axiata General Terms and Conditions.