Information Security and Data Privacy Sample Clauses

POPULAR SAMPLE Copied 1 times
Information Security and Data Privacy. (a) The Seller Entities have taken reasonable steps to safeguard the information technology systems utilized in their operation, including the implementation of procedures to ensure that such information technology systems are free from any disabling codes or instructions, timer, copy protection device, clock, counter or other limiting design or routing and any “back door,” “time bomb,” “trojan horse,” “worm,” “drop dead devices,” “virus,” or other software routines or hardware components that in each case permit unauthorized access or the unauthorized disablement or unauthorized erasure of data or other software by a third party, and to date there have been no successful unauthorized intrusions or breaches of the security of the information technology systems. The Seller Entities have dedicated the technical, administrative, budgetary and human resources reasonably necessary for maintenance of safe information security practices and to ensure compliance with all Laws related to data security. The Seller Entities have appropriate safeguards in place to oversee any vendors helping to safeguard the information technology systems utilized in the operation of the Company and the Company Subsidiaries. (b) Each Seller Entity has complied with, and is presently in compliance with, all applicable Laws and such Seller Entity’s respective policies applicable to data privacy, data security or personal information. No Seller Entity has experienced any incident in which personal information or other sensitive data was or may have been stolen or improperly accessed, and, to the Seller’s Knowledge, there are no facts suggesting the likelihood of the foregoing, including any breach of security or receipt of any notices or complaints from any Person regarding personal information or other data. No notice, action or assertion has been received by any Seller Entity within the last three (3) years or has been filed, commenced or, to the Seller’s Knowledge, threatened against any Seller Entity alleging any violation of any Laws relating to data security.
Information Security and Data Privacy. (a) Each of the Acquired Companies and Company Subsidiaries are in compliance in all material respects with all applicable Privacy Commitments. The Acquired Companies and Company Subsidiaries operate appropriate technical and organizational security measures to protect Company Data against unauthorized access, accidental loss or destruction of or damage to Company Data in its possession or control, which measures are, to the Knowledge of the Stockholders, consistent with standards that are customary in the industry in which the Acquired Companies and Company Subsidiaries operates. (b) To the Knowledge of the Stockholders, none of the Acquired Companies or Company Subsidiaries have collected or received any Personal Data online from children under the age of thirteen (13) without (where legally required) verifiable parental consent or directed any of its websites to children under the age of thirteen (13) through which such Personal Data could be obtained. (c) None of the Acquired Companies or Company Subsidiaries Process Personal Information, except for name and contact information, relating to customers or client end users located in the EEA or UK. None of the Acquired Companies or Company Subsidiaries have transferred or permitted the transfer of Personal Data originating in the EEA or UK outside the EEA or UK, except where such transfers have complied with the requirements of Privacy Laws and the applicable Privacy Commitments. (d) None of the Acquired Companies or Company Subsidiaries sell, rent or otherwise make available to any Person any Personal Data, except in a manner that complies in all material respects with the applicable Privacy Commitments. The execution, delivery and performance of this Agreement and the transactions contemplated herein comply, and will comply, in all material respects, with all Privacy Commitments of Acquired Companies and Company Subsidiaries. (e) None of the Acquired Companies or Company Subsidiaries have received any written notice that it is or, to the Knowledge of the Stockholders, has been in breach of any Privacy Commitment to limit its use of, secure or otherwise safeguard Personal Data and no such breach has occurred within the applicable statute of limitations for a claim arising out of such a breach. (f) Except as disclosed on Section 3.12(f) of the Disclosure Schedule, to the Knowledge of the Stockholders, none of the Acquired Companies or Company Subsidiaries have experienced any unauthorized access to, delet...
Information Security and Data Privacy. The Company and its Subsidiary have used commercially reasonable efforts to safeguard the information technology systems controlled by the Company and its Subsidiary and utilized in their business, and as of the date hereof, to the Knowledge of the Company, there have been no successful unauthorized intrusions or breaches of security of such information technology systems, except where such intrusions or breaches would not have a Material Adverse Effect.
Information Security and Data Privacy. Target and the Transferred Partnerships have used commercially reasonable efforts to safeguard the information technology systems controlled by Target and the Transferred Partnerships and utilized in their business, and as of the Effective Date, to the Knowledge of Target and Holdings, there have been no successful unauthorized intrusions or breaches of security of such information technology systems.
Information Security and Data Privacy. In addition to the foregoing, Supplier shall comply, and cause its Personnel to comply, with the Security Requirements (Schedule 3).
Information Security and Data Privacy. 7.17.1 The selected bidder will be responsible for providing secure systems. The selected bidder is expected to adhere to Information Security Management procedures as per acceptable standards with best practices. 7.17.2 The selected bidder shall be responsible for guarding the Systems against virus, malware, spyware and spam infections using the latest Antivirus corporate/Enterprise edition suites which include anti- malware, anti-spyware and anti-spam solution for the entire system. The vendor shall have to maintain strict privacy and confidentiality of all the data it gets access to.
Information Security and Data Privacy 

Related to Information Security and Data Privacy

  • INFORMATION SECURITY SCHEDULE All capitalized terms not defined in this Information Security Schedule (this “Security Schedule”) shall have the meanings ascribed to them in the Transfer Agency and Service Agreement by and between DST and each of the funds listed on Exhibit A thereto (each such fund, or series thereof, severally, and not jointly, the “Fund”) dated March 1, 2022 (the “Agreement”). DST and Fund hereby agree that DST shall maintain and comply with an information security policy (“Security Policy”) that satisfies the requirements set forth below; provided, that, because information security is a highly dynamic space (where laws, regulations and threats are constantly changing), DST reserves the right to make changes to its information security controls at any time and at the sole discretion of DST in a manner that it believes does not materially reduce the protection it applies to Fund Data. From time to time, DST may subcontract services performed under the Agreement (to the extent provided for under the Agreement) or provide access to Fund Data or its network to a subcontractor or other third party; provided, that, such subcontractor or third party implements and maintains security measures DST believes are at least as stringent as those described in this Security Schedule. For the purposes of this Schedule “prevailing industry practices and standards” refers to standards among financial institutions, including mutual funds, and third parties providing financial services to financial institutions.