Hosted Data Sample Clauses

The "Hosted Data" clause defines the types of data that a service provider stores, processes, or manages on behalf of a client within a hosted or cloud-based environment. This clause typically outlines what constitutes hosted data, such as files, databases, or user information uploaded to the provider’s systems, and may specify the responsibilities for data security, access, and compliance. Its core practical function is to clearly delineate the scope of data covered by the agreement, ensuring both parties understand their obligations and reducing the risk of disputes over data handling.
Hosted Data. During the Subscription Term, PTC or its subcontractors will perform daily backup of changed Hosted Data files, each of which will be stored for at least seven (7) days from the date of backup unless a subsequent backup replaces it. Such daily backup as provided herein should not be considered a replacement for Subscriber having appropriate disaster or business recovery plans for the destruction, loss, interception or damage to Subscriber’s data, and Subscriber acknowledges that PTC’s liability under this Section 8 is expressly limited by Section 12 below. PTC shall treat all Hosted Data as confidential and shall only use such Hosted Data to (a) provide the Services, (b) aggregate information relating to transactions for statistical analysis and business measures of the performance of the Services, (c) monitor Subscriber’s and its Permitted Users’ use of the Services for security purposes, (d) enforce the terms of this Agreement, and (e) share with any PTC subcontractors who need to know such information in order to provide the Services, provided that they are bound by similar confidentiality obligations. For purposes of clarity, PTC’s obligation to keep such Hosted Data confidential shall not apply to information that (1) PTC learns of from another source or independently develops without reference to the Hosted Data and does not reveal to be included in Subscriber’s Hosted Data or (2) PTC is required to disclose by law (but only to the extent of such required disclosure). PTC may retain copies of Hosted Data solely for back-up purposes after termination or expiration of this Agreement, provided, however, that PTC shall not be obligated to retain any such copies of the Hosted Data for more than thirty days following termination of expiration of this Agreement.
Hosted Data. Subscriber may download the Hosted Data to Subscriber’s computer system by using the export function provided in the Hosted Software at any time during the Subscription Term and for up to thirty days after expiration or termination of this Agreement (except during any time period when the Services have been suspended pursuant to paragraph (e) below). Subscriber shall be responsible for downloading the Hosted Data within thirty days following termination or expiration of this Agreement and PTC shall have no obligation after such thirty day period to maintain or store or otherwise deliver the Hosted Data to Subscriber. Subscriber acknowledges that PTC may delete all Hosted Data after thirty days following any termination or expiration of this Agreement.
Hosted Data. With respect to Hosted Data, Jama will make reasonable efforts to avoid the loss of Hosted Data and will employ, at a minimum, industry standard security technologies and procedures. However, ▇▇▇▇ is not responsible for backup of Hosted Data processed or provided through the Hosted Solution. Licensee is ultimately and solely responsible for maintaining a back up of Hosted Data.
Hosted Data. Customer is advised that the storage of data on Platform serves exclusively and primarily the purpose of providing Cloud Services. Proper keeping and storage of books, records and documents is not guaranteed by the use of Platform and is the sole responsibility of Customer. Service Provider will ensure there are backups of customer data, however the customer is responsible for the data that is inputted into the systems.
Hosted Data. Thirty (30) days after termination, Edge Delta shall have no further obligation to Customer and will permanently delete or destroy Customer’s instance of the Service and all information and materials contained therein. 2.12
Hosted Data. Client will have the sole responsibility for the accuracy, quality, integrity, legality, reliability, and appropriateness of all data Client and its Users have input into the SAAS that is processed or stored by SNOVASYS and/or its service providers (“Hosted Data”).
Hosted Data. Through its Services, the Company provides technology hosting services used to host a variety of internet-based solutions, including websites and other internet- based communication and applications (including “mobile apps”). As a result, the Company’s hosting services store and transmit information about our customers, their business, as well as information collected by those businesses (the “Hosted Info”). Hosted Info may include personal information and other information that belongs to our customers’ own customers, website visitors, or other users. With respect to all Hosted Info, the Company is a passive recipient and takes no active part in collecting or storing any Hosted Info. Moreover, except in extraordinary cases, the Company does not purposefully access any Hosted Info. However, the Company and its agents may occasionally access Hosted Info through the delivery of services and support and such access shall be permissible for all purposes.
Hosted Data. (a) PTC shall take commercially reasonable steps, or cause such commercially reasonable steps to be taken, designed to prevent security breaches. Customer agrees that the Hosted Data will not include: (i) any information, or documents or technical data that are classified, Controlled Unclassified Information, ITAR controlled or otherwise have been determined by the United States Government or by a foreign government to require protection against unauthorized disclosure for reasons of national security (provided, however, that this restriction shall not apply with respect to ITAR controlled data if the Quote so specifies), and/or (ii) any data that is “protected health information, including any medical, demographic, visual or descriptive information that can be used to identify a particular patient/individual” and/or any other data subject to the U.S. “Health Insurance Portability & Accountability Act of 1996and regulations promulgated under that Act (collectively “HIPAA”). (b) PTC shall treat all Hosted Data as confidential and shall only use the Hosted Data to (i) provide the Services (including reporting to Customer on their use of the Services), (ii) monitor Customer’s use of the Services for security and technical support purposes and for validating Customer’s compliance and usage limitations, and for purposes of otherwise complying with PTC’s obligations to Customer, and (iii) share with any PTC subcontractors who need to know such information in order to provide the Services, provided that they are bound by similar confidentiality obligations. For purposes of clarity, PTC’s obligation to keep such Hosted Data confidential shall not apply to information that PTC is required to disclose by law (but only to the extent of such required disclosure). (c) All personal data received, or collected by PTC in connection with the performance of its obligations will be processed in accordance with the Data Processing Terms and Conditions available at ▇▇▇▇▇://▇▇▇.▇▇▇.▇▇▇/en/documents/policies and PTC’s privacy policy ▇▇▇▇▇://▇▇▇.▇▇▇.▇▇▇/en/documents/policies/privacy. Customer acknowledges that PTC is part of a global company with global operations, and that personal data may be processed outside Customer’s country. All such transfers of personal data shall be in accordance with applicable data privacy laws. Customer certifies that it has obtained any personal data provided to PTC in accordance with applicable data protection laws.
Hosted Data. If SubContractor hosts University Compliant Data or Business Sensitive Data, in or on SubContractor facilities, the following additional clauses apply. A. Contactor computers that host University Compliant Data or Business Sensitive Information shall be housed in secure areas that have adequate walls and entry control such as a card controlled entry or staffed reception desk. Only authorized personnel shall be allowed to enter and visitor entry will be strictly controlled. B. SubContractor shall design and apply physical protection against damage from fire, flood, earthquake, explosion, civil unrest, and other forms of natural or man-made disasters. SubContractor shall protect hosted systems with Uninterruptible Power Supply (UPS) devices sufficient to meet business continuity requirements. C. SubContractor shall backup systems or media stored at a separate location with incremental back-ups at least daily and full back-ups at least weekly. Incremental and full back-ups shall be retained for 15 days and 45 days respectively. SubContractor shall test restore procedures not less than once per year. D. SubContractor shall provide for reasonable and adequate protection on its network and system to include firewall and intrusion detection/prevention. E. SubContractor shall use strong encryption and certificate-based authentication on any server hosting on-line and e-commerce transactions with the University to ensure the confidentiality and non-repudiation of the transaction while crossing networks. F. The installation or modification of software on systems containing University Compliant Data or Business Sensitive Information shall be subject to formal change management procedures and segregation of duties requirements. G. SubContractor who hosts University Compliant Data or Business Sensitive Information shall engage an independent third-party auditor to evaluate the information security controls not less than every two (2) years. Such evaluations shall be made available to the University upon request. H. SubContractor shall require strong passwords for any user accessing personally identifiable information or data covered under law, regulation, or standard such as HIPAA, FERPA, or PCI. Strong passwords shall be at least eight characters long; contain at least one upper and one lower case alphabetic characters; and contain at least one numeric or special character.
Hosted Data. Unless otherwise agreed in writing, M-Files will make daily backup copies of the Hosted Data and retain one restore point per day for the last seven (7) days. If Hosted Data is deleted, lost, altered or damaged by Customer using Customer’s own user IDs or if Customer has otherwise by its own or its authorized action deleted, lost, altered or damaged Hosted Data, M-Files shall have the right to charge Customer for the work on the recovery of such Hosted Data on time and material basis in accordance with M-Files' then current price list.