Data Security Standards Clause Samples

Data Security Standards. This clause applies to you if you collect payment data directly from a cardholder or store any cardholder data. In addition to the other provisions of this agreement, you acknowledge and agree:
Data Security Standards. You shall: 20.1.15.1. comply with the Data Security Standards. 20.1.15.2. produce to Elavon evidence of compliance with the Data Security Standards on ▇▇▇▇▇▇’s request, save where you are a PCI Level 3 or Level 4 Customers that subscribes to a Solution (as described further in Schedule 2. 20.1.15.3. procure that all Third Party Vendors from whom you receive Value Added Services or Terminals and any agents, sub-contractors or third parties used by you, comply with the Data Security Standards, together with any additional data security standards of the PCI SSC. 20.1.15.4. in the event that you become aware of or suspect any security breach or compromise of Cardholder or Transaction data or information by you or any Third Party Vendors from whom you receive Value Added Services or Terminals and any agents, sub-contractors or third parties used by you (whether or not you have complied with the Data Security Standards): 20.1.15.4.1. immediately (and in any event within 24 hours) notify Elavon of your awareness or suspicion, identify and resolve the cause of the security breach or compromise in question, co-operate, provide any assistance and act on the reasonable instructions of ▇▇▇▇▇▇ (which may include the procurement, at your cost and within the timescales we stipulate, of any forensic report from a third party recommended by us or the Card Schemes, and compliance with all recommendations suggested in such report to improve your data security); 20.1.15.4.2. reasonably procure that where Cardholder or Transaction data or information is stored for you by a Third Party Vendor or your agent, sub-contractor or any third party used by you, that such Third Party Vendor or agent, sub-contractor or third party also co-operates with us and acts on our reasonable instructions as set out in section 20.1.15.4.1 above; 20.1.15.4.3. ensure and procure that ▇▇▇▇▇▇ has the right to review and comment on any forensic investigation report prepared by a forensic investigator (as set out in section 20.1.15.4.1 above), before it is submitted to the Card Schemes; and 20.1.15.4.4. be responsible for your own actions, omissions or failures to act, those of your Affiliates, officers, directors, shareholders, employees and agents, including any Third Party Vendors or agent or sub-contractor or third party with whom you contract to perform services for you in relation to compliance with this section. 20.1.15.5. in the event that we reasonably suspect (including where we are informed by...
Data Security Standards. Contractor must comply with the Data Security Requirements set out in this section and the Washington OCIO Security Standard, 141.10, which will include any successor, amended, or replacement regulation (▇▇▇▇▇://▇▇▇▇.▇▇.▇▇▇/policies/141-securing-information-technology-assets/14110- securing-information-technology-assets.) The Security Standard 141.10 is hereby incorporated by reference into this Agreement.
Data Security Standards. You shall: 20.1. 15.1. comply with the Data Security Standards.
Data Security Standards. If applicable to the services provided, the Contractor shall implement appropriate measures to ensure the confidentiality and security of all data handled on behalf of the District. These measures shall include protections against anticipated threats or hazards to the integrity or security of such information, prevention of unauthorized access or disclosure, and any other actions necessary to prevent substantial harm to the District or to any individual whose information is in the Contractor’s custody. When applicable, the Contractor shall also comply with the District’s Data Security Standards, as set forth in Exhibit C, which is attached hereto and incorporated herein. All information received or accessed in the course of performing this Agreement shall be treated in strict accordance with these standards.
Data Security Standards. Receiving Party shall comply with the Data Security Requirements set out in Exhibit A and the Washington OCIO Security Standard, 141.10 (▇▇▇▇▇://▇▇▇▇.▇▇.▇▇▇/policies/141-securing- information-technology-assets/14110-securing-information-technology-assets).
Data Security Standards. Varicent shall use, process, retain, and disclose Customer Data only as necessary for the specific purpose of providing the Cloud Service and in compliance with Varicent’s data security standards and procedures set forth at: ▇▇▇▇▇://▇▇▇.▇▇▇▇▇▇▇▇.▇▇▇/legal_documents (the “Data Security Standards”) and applicable Law. Varicent shall not sell Personal Data. Customer acknowledges that (a) Varicent may modify the Data Security Standards from time to time at Varicent’s sole discretion and (b) such modifications shall supersede prior versions; provided that such modified Data Security Standards shall be, except to the extent required to comply with applicable Law, no less protective of the Customer Data than the Data Security Standards in place as of the Effective Date.
Data Security Standards. Contractor agrees to comply with the District’s Data Security Standards set forth in Exhibit C, which is attached hereto and incorporated herein, in the performance of the services. Contractor further agrees that it shall treat all information received through the performance of this ☐ Agreement in strict accordance with the standards. Not Applicable if checked.
Data Security Standards. 19.1 The Sponsored Merchant must comply with the Data Security Standards and PCI-DSS requirements, and successfully complete the protocols for the Data Security Standards within a reasonable time frame stipulated by Macquarie or the Card Schemes. 19.2 The Sponsored Merchant must ensure appropriate security measures are in place to achieve and maintain at least Payment Card Industry (PCI) certification as it relates to the provision of goods or services by the Sponsored Merchant, and the transmission of all transaction information. 19.3 The Sponsored Merchant acknowledges and agrees that Macquarie and/or any of its suppliers or representatives may be required by any laws, regulations, guidelines or standards or a regulator to intercept communications over the networks used to process transactions and/or monitor its usage of such networks and communications sent over them.
Data Security Standards. When involved in the provision of Products or Services that include the management, maintenance, storage and transfer of Customer Data, Infotrust agrees that it will: (a) align with the following standards relating to information security management which are published by the International Organisation for Standardisation (ISO) and the International Electrotechnical Commission (IEC), as updated from time to time: (i) ISO/IEC 27000 — Information technology - Security Techniques- Information security management systems — Overview and vocabulary; (ii) ISO/IEC 27001 — Information technology - Security Techniques - Information security management systems — Requirements; and (iii) ISO/IEC 27002 — Code of practice for information security management.