Network and Data Security Clause Samples

The Network and Data Security clause establishes the obligations of parties to protect digital information and maintain secure network environments. Typically, it requires implementing industry-standard security measures, such as firewalls, encryption, and regular security audits, to safeguard sensitive data from unauthorized access or breaches. This clause is essential for minimizing the risk of data loss or cyberattacks, ensuring compliance with legal and regulatory requirements, and maintaining trust between parties handling confidential or personal information.
Network and Data Security. 1.1 Devices may be configured to include a variety of data security features. The set- up of such features shall be at the discretion of the Purchasing Entity, and all costs associated with their implementation must be conveyed by Contractor prior to Order placement. 1.2 Contractor will not be permitted to download, transfer, or access print data stored on the Device in either hard drive or chip memory. Only system management accessibility will be allowed. 1.3 Contractor shall ensure that delivery and performance of all Services shall adhere to the requirements and standards as outlined in each Participating State or Entity’s Participating Addendum.
Network and Data Security a) Devices may be configured to include a variety of data security features. The set-up of such features shall be at the discretion of the Purchasing Entity, and all costs associated with their implementation must be conveyed by Awarded Vendor(s) prior to Order placement. b) Awarded Vendor(s) will not be permitted to download, transfer, or access print data stored on the Device in either hard drive or chip memory. Only system management accessibility will be allowed. c) Awarded Vendor(s) shall ensure that delivery and performance of all Services shall adhere to the requirements and standards as outlined in each Participating State or Entity’s Participating Addendum.
Network and Data Security. 1.1 Devices may be configured to include a variety of data security features. The set- 1.2 Contractor will not be permitted to download, transfer, or access print data stored on the Device in either hard drive or chip memory. Only system management accessibility will be allowed. 1.3 Contractor shall ensure that delivery and performance of all Services shall adhere to the requirements and standards as outlined in each Participating State or Entity’s Participating Addendum.
Network and Data Security. 11.4.1 To the extent any Network-Data Communication occurs in connection with the use or performance of the Yahoo Services or in connection with the Development Cluster Services: (i) such Network-Data Communication will be limited solely to HortonWorks’ performance of its obligations or exercise of rights hereunder, and (ii) HortonWorks will (and will cause its Personnel to) comply with the terms set forth in Exhibit E (Information Security Terms).
Network and Data Security. Contractor shall maintain and implement commercially reasonable network and data security procedures and controls with respect to the Services and Deliverables provided under this Agreement and with respect to any data in systems owned or managed by Contractor or Subcontractors. Specifically, Contractor shall maintain and implement commercially reasonable organizational, administrative, technical, physical and logical safeguards designed to protect Contractor’s network, systems, databases, equipment, files, and locations against unlawful or unauthorized access or intrusion by third parties. State shall maintain and implement commercially reasonable security procedures and controls to protect its own data, including but not limited to the employment of adequate encrypting and/or camouflaging technologies, and in no event shall Contractor be liable for any damages or losses that could have been prevented by such measures.

Related to Network and Data Security

  • Data Security The Provider agrees to utilize administrative, physical, and technical safeguards designed to protect Student Data from unauthorized access, disclosure, acquisition, destruction, use, or modification. The Provider shall adhere to any applicable law relating to data security. The provider shall implement an adequate Cybersecurity Framework based on one of the nationally recognized standards set forth set forth in Exhibit “F”. Exclusions, variations, or exemptions to the identified Cybersecurity Framework must be detailed in an attachment to Exhibit “H”. Additionally, Provider may choose to further detail its security programs and measures that augment or are in addition to the Cybersecurity Framework in Exhibit “F”. Provider shall provide, in the Standard Schedule to the DPA, contact information of an employee who ▇▇▇ may contact if there are any data security concerns or questions.

  • Privacy and Data Security (a) In the prior three (3) years, the Company and its Subsidiaries have been in compliance with Privacy Laws, and in all material respects with (i) Contracts (or portions thereof) between the Company or its Subsidiaries and other Persons relating to Personal Data and (ii) applicable written policies, public statements and other public representations relating to the Processing of Personal Data, inclusive of all disclosures required by applicable Privacy Laws (“Privacy and Data Security Policies,” and together with Privacy Laws and such Contracts, “Privacy Commitments”). The execution, delivery and performance by the Company of this Agreement to which the Company is or will be a party, and the consummation of the transactions contemplated hereby or thereby, are not reasonably expected to, directly or indirectly, result in a violation of any Privacy Commitments that would be materially adverse to the Company and its Subsidiaries, taken as a whole. (b) In the prior three (3) years, the Privacy and Data Security Policies have at all times been maintained and made available to individuals in accordance with reasonable industry practices and as required by Privacy Laws, are accurate and complete and are not misleading or deceptive (including by omission). The practices of the Company or its Subsidiaries with respect to the Processing of Personal Data conform in all material respects to the Privacy and Data Security Policies that govern such Personal Data. (c) There is (and in the prior three years there has been) no material Legal Proceeding pending or, to the Company’s knowledge, threatened against or involving the Company or its Subsidiaries initiated by any Person (including (i) the Federal Trade Commission, any state attorney general or similar state official, (ii) any other Governmental authority, foreign or domestic or (iii) any regulatory or self-regulatory entity) alleging that any Processing of Personal Data by or on behalf of the Company or its Subsidiaries is or was in violation of any Privacy Commitments. To the Company’s Knowledge, there are no facts, circumstances or conditions that would reasonably be expected to form the basis for any proceeding for any potential violation of any Privacy Commitments. (d) In the prior three (3) years, (i) there has been no unauthorized access to, or unauthorized use, disclosure, or Processing of Personal Data in the possession or control of the Company or its Subsidiaries or any of its contractors with regard to any Personal Data obtained from or on behalf of the Company or its Subsidiaries (“Security Incident”), (ii) there have been no unauthorized intrusions or breaches of security into any Company IT Systems, and (iii) none of the Company or any of its Subsidiaries has notified or been required to notify any Person of any (A) loss, theft or damage of, or (B) other unauthorized or unlawful access to, or use, disclosure or other Processing of, Personal Data, except, in each case of clauses (i), (ii), and (iii), as would not have a Company Material Adverse Effect. Each of the Company and its Subsidiaries has implemented commercially reasonable administrative, physical and technical safeguards, and ensures that its contractors processing Personal Data take such safeguards to protect the confidentiality, integrity and security of Personal Data against any Security Incident, including taking all reasonable steps to safeguard and back up Personal Data. (e) Each of the Company and its Subsidiaries owns or has a license or other right to use the Company IT Systems as necessary to operate the business of each the Company or its Subsidiaries as currently conducted. All Company IT Systems are (i) free from any defect, bug, virus or programming, design or documentation error and (ii) in sufficiently good working condition to effectively perform all information technology operations necessary for the operation of businesses of the Company and its Subsidiaries (except for ordinary wear and tear), except in each case of clauses (i) and (ii), as is not and would not reasonably be expected to be, individually or in the aggregate, material to the Company and its Subsidiaries, taken as a whole. In the prior three years, there have not been any material failures, breakdowns or continued substandard performance of any Company IT Systems that have caused a material failure or disruption of the Company IT Systems other than routine failures or disruptions that have been remediated in the Ordinary Course of Business. In the past three (3) years, there have been no (except to the extent completely remediated), and to the Company’s Knowledge, there are no material security deficiencies or vulnerabilities in the Company IT Systems.

  • Network Security The AWS Network will be electronically accessible to employees, contractors and any other person as necessary to provide the Services. AWS will maintain access controls and policies to manage what access is allowed to the AWS Network from each network connection and user, including the use of firewalls or functionally equivalent technology and authentication controls. AWS will maintain corrective action and incident response plans to respond to potential security threats.

  • Data Security Requirements Without limiting Contractor’s obligation of confidentiality as further described in this Contract, Contractor must establish, maintain, and enforce a data privacy program and an information and cyber security program, including safety, physical, and technical security and resiliency policies and procedures, that comply with the requirements set forth in this Contract and, to the extent such programs are consistent with and not less protective than the requirements set forth in this Contract and are at least equal to applicable best industry practices and standards (NIST 800-53).

  • Data Services In lieu of any other rates or discounts, the Customer will receive a discount equal to 15% for the following Data Services: Access: Standard VBS3 Guide local loop charges for DS-1 Access Service.