Information Security and Data Privacy Sample Clauses

POPULAR SAMPLE Copied 1 times
Information Security and Data Privacy. (a) The Seller Entities have taken reasonable steps to safeguard the information technology systems utilized in their operation, including the implementation of procedures to ensure that such information technology systems are free from any disabling codes or instructions, timer, copy protection device, clock, counter or other limiting design or routing and any “back door,” “time bomb,” “trojan horse,” “worm,” “drop dead devices,” “virus,” or other software routines or hardware components that in each case permit unauthorized access or the unauthorized disablement or unauthorized erasure of data or other software by a third party, and to date there have been no successful unauthorized intrusions or breaches of the security of the information technology systems. The Seller Entities have dedicated the technical, administrative, budgetary and human resources reasonably necessary for maintenance of safe information security practices and to ensure compliance with all Laws related to data security. The Seller Entities have appropriate safeguards in place to oversee any vendors helping to safeguard the information technology systems utilized in the operation of the Company and the Company Subsidiaries. (b) Each Seller Entity has complied with, and is presently in compliance with, all applicable Laws and such Seller Entity’s respective policies applicable to data privacy, data security or personal information. No Seller Entity has experienced any incident in which personal information or other sensitive data was or may have been stolen or improperly accessed, and, to the Seller’s Knowledge, there are no facts suggesting the likelihood of the foregoing, including any breach of security or receipt of any notices or complaints from any Person regarding personal information or other data. No notice, action or assertion has been received by any Seller Entity within the last three (3) years or has been filed, commenced or, to the Seller’s Knowledge, threatened against any Seller Entity alleging any violation of any Laws relating to data security.
Information Security and Data Privacy. (a) In the collection and Processing by the Acquired Companies of any Personal Data, the Acquired Companies and their Personal Data Processors and Personal Data Suppliers are in compliance with and have always complied with all applicable Privacy Commitments. The Acquired Companies operate appropriate technical and organizational security measures to prevent the unlawful Processing of Personal Data and unauthorized access, accidental loss or destruction of or damage to Personal Data in its possession or control, which measures are in compliance in all material respects with the Privacy Commitments. Without limiting the foregoing, the Acquired Companies and their Personal Data Suppliers have collected all Personal Data fairly and lawfully including acquiring all necessary consents from Data Subjects and otherwise have all requisite legal authority to Process, use and hold Personal Data in the manner it is Processed by the Acquired Companies or by any Personal Data Processor on their behalf without breaching any of the Privacy Commitments. The Acquired Companies have at all times respected all Data Subject opt-outs and consent withdrawals. (b) To the extent that the Acquired Companies Process any financial account numbers (such as credit cards, bank accounts, PayPal accounts, debit cards), passwords, CCV data, or other related data, the Acquired Companies have implemented information security procedures, processes and systems that have at all times met all applicable Laws related to the Processing of cardholder data, including those established by applicable Governmental Entities, and the Payment Card Industry Standards Council (including the Payment Card Industry Data Security Standard). (c) The Acquired Companies have at all times presented a Privacy Policy which complies with Privacy Laws to Data Subjects prior to the collection of any Personal Data, and no such Privacy Policy is or has been inaccurate, misleading or deceptive. None of the Acquired Companies have made any statement to the general public regarding any of their information security practices applicable to any Personal Information other than those made in the Company Privacy Policies. None of the Acquired Companies have collected or received any Personal Data online from children under the age of thirteen (13) without (where legally required) verifiable parental consent or directed any of its websites to children under the age of thirteen (13) through which such Personal Data could be obtain...
Information Security and Data Privacy. Target and the Transferred Partnerships have used commercially reasonable efforts to safeguard the information technology systems controlled by Target and the Transferred Partnerships and utilized in their business, and as of the Effective Date, to the Knowledge of Target and Holdings, there have been no successful unauthorized intrusions or breaches of security of such information technology systems.
Information Security and Data Privacy. 7.17.1 The selected bidder will be responsible for providing secure systems. The selected bidder is expected to adhere to Information Security Management procedures as per acceptable standards with best practices. 7.17.2 The selected bidder shall be responsible for guarding the Systems against virus, malware, spyware and spam infections using the latest Antivirus corporate/Enterprise edition suites which include anti- malware, anti-spyware and anti-spam solution for the entire system. The vendor shall have to maintain strict privacy and confidentiality of all the data it gets access to.
Information Security and Data Privacy. The Company and its Subsidiary have used commercially reasonable efforts to safeguard the information technology systems controlled by the Company and its Subsidiary and utilized in their business, and as of the date hereof, to the Knowledge of the Company, there have been no successful unauthorized intrusions or breaches of security of such information technology systems, except where such intrusions or breaches would not have a Material Adverse Effect.
Information Security and Data Privacy 

Related to Information Security and Data Privacy

  • Information Security IET information security management practices, policies and regulatory compliance requirements are aimed at assuring the confidentiality, integrity and availability of Customer information. The UC ▇▇▇▇▇ Cyber-safety Policy, UC ▇▇▇▇▇ Security Standards Policy (PPM Section 310-22), is adopted by the campus and IET to define the responsibilities and key practices for assuring the security of UC ▇▇▇▇▇ computing systems and electronic data.

  • Data Security and Privacy Except as would not, individually or in the aggregate, reasonably be expected to be material to the business of the Company Group, taken as a whole, the Company and each of its Subsidiaries (i) is in compliance with all Data Security Requirements and (ii) has taken commercially reasonable steps consistent with standard industry practice by companies of similar size and maturity, and in compliance in all material respects with all Data Security Requirements to protect (A) the confidentiality, integrity, availability and security of its Business Systems that are involved in the Processing of Personally Identifiable Information, in the conduct of the business of the Company and its Subsidiaries as currently conducted; and (B) Personally Identifiable Information Processed by or on behalf of the Company or such Subsidiary or on their behalf from unauthorized use, access, disclosure, theft and modification. Except as would not, individually or in the aggregate, reasonably be expected to be material to the business of the Company Group, taken as a whole, (i) there are, and since January 1, 2022, have been, no pending complaints, investigations, inquiries, notices, enforcement proceedings, or Actions by or before any Governmental Authority and (ii) since January 1, 2022, no fines or other penalties have been imposed on or written claims, notice, complaints or other communications have been received by the Company or any Subsidiary, relating to any Specified Data Breach or alleging non-compliance with any Data Security Requirement. The Company and each of its Subsidiaries have not, since January 1, 2022, (1) experienced any Specified Data Breaches, or (2) been involved in any Legal Proceedings related to or alleging any violation of any Data Security Requirements by the Company Group or any Specified Data Breaches, each except as would not be material to the business of the Company Group, taken as a whole. The consummation of the transactions contemplated by this Agreement will not cause the Company Group to breach any Data Security Requirement, except as would not reasonably be expected to be material to the business of the Company Group, taken as a whole.

  • Data Privacy and Security Laws The Company is, and at all prior times was, in material compliance with all applicable state and federal data privacy and security laws and regulations in the United States, including, without limitation, the Health Insurance Portability and Accountability Act of 1996 (“HIPAA”) as amended by the Health Information Technology for Economic and Clinical Health Act, and all applicable provincial and federal data privacy and security laws and regulations in Canada, including without limitation the Personal Information Protection and Electronic Documents Act (S.C. 2000, c. 5) (“PIPEDA”); and the Company has taken commercially reasonable actions to prepare to comply with, and have been and currently are in compliance with, the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679) (collectively, the “Privacy Laws”). To ensure compliance with the Privacy Laws, the Company has in place, comply with, and take appropriate steps reasonably designed to ensure compliance in all material respects with their policies and procedures relating to data privacy and security and the collection, storage, use, disclosure, handling, and analysis of Personal Data (the “Policies”). “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) Protected Health Information as defined by HIPAA; (iv) “personal information”, “personal health information”. and “business contact information” as defined by PIPEDA; (v) “personal data” as defined by GDPR; and (vi) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. The Company has at all times made all disclosures to users or customers required by applicable laws and regulatory rules or requirements, and none of such disclosures made or contained in any Policy have, to the knowledge of the Company, been inaccurate or in violation of any applicable laws and regulatory rules or requirements in any material respect. The Company further certifies: (i) it has not received notice of any actual or potential liability under or relating to, or actual or potential violation of, any of the Privacy Laws, and has no knowledge of any event or condition that would reasonably be expected to result in any such notice; (ii) is currently conducting or paying for, in whole or in part, any investigation, remediation, or other corrective action pursuant to any Privacy Law; or (iii) is a party to any order, decree, or agreement that imposes any obligation or liability under any Privacy Law.

  • INFORMATION SECURITY SCHEDULE All capitalized terms not defined in this Information Security Schedule (this “Security Schedule”) shall have the meanings ascribed to them in the Transfer Agency and Service Agreement by and between DST and each of the funds listed on Exhibit A thereto (each such fund, or series thereof, severally, and not jointly, the “Fund”) dated March 1, 2022 (the “Agreement”). DST and Fund hereby agree that DST shall maintain and comply with an information security policy (“Security Policy”) that satisfies the requirements set forth below; provided, that, because information security is a highly dynamic space (where laws, regulations and threats are constantly changing), DST reserves the right to make changes to its information security controls at any time and at the sole discretion of DST in a manner that it believes does not materially reduce the protection it applies to Fund Data. From time to time, DST may subcontract services performed under the Agreement (to the extent provided for under the Agreement) or provide access to Fund Data or its network to a subcontractor or other third party; provided, that, such subcontractor or third party implements and maintains security measures DST believes are at least as stringent as those described in this Security Schedule. For the purposes of this Schedule “prevailing industry practices and standards” refers to standards among financial institutions, including mutual funds, and third parties providing financial services to financial institutions.

  • Security and Privacy Security and privacy policies for the Genesys Cloud Service addressing use of Customer Data, which are incorporated by reference and may be updated from time to time in accordance with Section 10.12 of the Agreement, are located at ▇▇▇▇▇://▇▇▇▇.▇▇▇▇▇▇▇▇▇▇▇.▇▇▇/articles/purecloud-security-compliance/.