Privacy and Security Policies Sample Clauses

The Privacy and Security Policies clause defines the obligations and standards for handling personal and sensitive information within an agreement. It typically outlines how data must be collected, stored, processed, and protected, often referencing compliance with relevant laws such as GDPR or HIPAA. For example, it may require encryption of customer data or restrict access to authorized personnel only. The core function of this clause is to safeguard confidential information and ensure both parties adhere to legal and ethical standards, thereby reducing the risk of data breaches and regulatory penalties.
Privacy and Security Policies. Tribe shall develop, maintain, and enforce policies, procedures, and administrative, technical, and physical safeguards to ensure the privacy and security of the Protected Information.
Privacy and Security Policies. Contractor shall develop, maintain, and enforce policies, procedures, and administrative, technical, and physical safeguards to ensure the privacy and security of the Protected Information. Contractor’s policies and procedures must include but not be limited to the following (these policies and procedures below are examples of some of the types of policies and procedures that may be required to achieve compliance with HIPAA and other relevant law applicable to Contractor’s duties to safeguard Protected Information, Protected Health Information, and not public data accessed by Contractor under this Contract): A. Contractor shall develop, maintain, and enforce policies and procedures or usage rules for all devices with access to PHI or Protected Information. B. Contractor must provide training to employees on what devices employees can use for work purposes or services under this Contract. C. Contractor’s employees or agents (including but not limited to Contractor’s remote employees or employees who work from home) must have access to a shredder for the destruction of PHI or Protected Information. D. Contractor shall develop, maintain, and enforce policies and procedures or rules for remote work that involves access to PHI or Protected Information by Contractor’s employees (such as policies or procedures that require locked cabinets for paper copies of PHI or Protected Information and require sound separation for phone calls that involve collection or sharing of Protected Information or PHI, as well as policies and procedures that ensure up-to-date software for devices used for remote work).
Privacy and Security Policies. The CAC shall develop, maintain, and enforce policies, procedures, and administrative, technical, and physical safeguards to ensure the privac y and security of the Protected Information.
Privacy and Security Policies. Contractor shall develop, maintain, and enforce policies, procedures, and administrative, technical, and physical safeguards to ensure the privacy and security of the Protected Information.
Privacy and Security Policies. The CAC shall develop, maintain, and enforce policies, procedures, and administrative, technical, and physical safeguards to ensure the privacy and security of the Protected Information. The CAC’s policies and procedures must include but not be limited to the following (these policies and procedures below are examples of some of the types of policies and procedures that may be required to achieve compliance with HIPAA and other relevant law applicable to the CAC’s duties to safeguard Protected Information, Protected Health Information, and not public data accessed by the CAC under this Contract): A. The CAC shall develop, maintain, and enforce policies and procedures or usage rules for all devices with access to PHI or Protected Information. B. The CAC must provide training to employees on what devices employees can use for work purposes or services under this Contract. C. The CAC’s employees or agents (including but not limited to the CAC’s remote employees or employees who work from home) must have access to a shredder for the destruction of PHI or Protected Information. D. The CAC shall develop, maintain, and enforce policies and procedures or rules for remote work that involves access to PHI or Protected Information by the CAC’s employees (such as policies or procedures that require locked cabinets for paper copies of PHI or Protected Information and require sound separation for phone calls that involve collection or sharing of Protected Information or PHI, as well as policies and procedures that ensure up-to-date software for devices used for remote work).
Privacy and Security Policies 

Related to Privacy and Security Policies

  • Privacy and Security (a) Each of the Company and its Subsidiaries complies (and requires and monitors the compliance of applicable third parties) in all material respects with all applicable Laws relating to privacy or data security, and reputable industry practice, standards, self-governing rules and policies and their own published, posted and internal agreements and policies (which are in conformance with reputable industry practice) (all of the foregoing collectively, “Privacy Laws”) with respect to: (i) personally identifiable information (including name, address, telephone number, electronic mail address, social security number, bank account number or credit card number), sensitive personal information and any special categories of personal information regulated thereunder or covered thereby (“Personal Information”), whether any of same is accessed or used by the Company or any of its Subsidiaries or any of their respective business partners; and (ii) non-personally identifiable information, whether any of same is accessed or used by the Company or any of its Subsidiaries or any of their respective business partners. (b) Neither the Company nor any of its Subsidiaries uses, collects, or receives any Personal Information or sensitive non-personally identifiable information and does not become aware of the identity or location of, or identify or locate, any particular Person as a result of any receipt of such Personal Information, in a manner which would materially breach or violate any Privacy Laws and materially and adversely impact the business of the Company and its Subsidiaries, taken as a whole. (c) To the Company’s knowledge, Persons with which the Company or any of its Subsidiaries have contractual relationships have not breached any agreements or any Privacy Laws pertaining to Personal Information and to non-personally identifiable information. (d) To the Company’s knowledge, the Company and its Subsidiaries take all commercially reasonable steps to protect the operation, confidentiality, integrity and security of their respective business systems and websites and all information and transactions stored or contained therein or transmitted thereby against any unauthorized or improper use, access, transmittal, interruption, modification or corruption, and there have been no material breaches of same. Without limiting the generality of the foregoing, each of the Company and its Subsidiaries (i) uses industry standard encryption technology and (ii) has implemented a comprehensive security plan that (1) identifies internal and external risks to the security of the Company’s or its Subsidiaries’ confidential information and Personal Information and (2) implements, monitors and improves adequate and effective safeguards to control those risks.

  • Security Policies To the extent the Contractor or its subcontractors, affiliates or agents handles, collects, stores, disseminates or otherwise deals with State Data, the Contractor will have an information security policy that protects its systems and processes and media that may contain State Data from internal and external security threats and State Data from unauthorized disclosure, and will have provided a copy of such policy to the State. The Contractor shall provide the State with not less than thirty (30) days advance written notice of any material amendment or modification of such policies.

  • PERSONAL INFORMATION PRIVACY AND SECURITY CONTRACT 11 Any reference to statutory, regulatory, or contractual language herein shall be to such language as in 12 effect or as amended. 13 A. DEFINITIONS

  • Privacy Policies Each party will make available a Privacy Policy that complies with Law. ▇▇▇▇▇▇’s Privacy Policy explains how and for what purposes Stripe collects, uses, retains, discloses and safeguards the Personal Data you provide to Stripe.