Protect Data Sample Clauses

POPULAR SAMPLE Copied 1 times
Protect Data. 3.1 Develop and follow procedures to ensure that data is protected throughout its entire information lifecycle (from creation, transformation, use, storage and secure destruction) regardless of the media used to store the data (i.e., tape, disk, paper, etc.). 3.2 Experian data is classified Confidential and must be secured to in accordance with the requirements mentioned in this document at a minimum. 3.3 Procedures for transmission, disclosure, storage, destruction and any other information modalities or media should address all aspects of the lifecycle of the information. 3.4 Encrypt all Experian data and information when stored electronically on any system including but not limited to laptops, tablets, personal computers, servers, databases using strong encryption such AES 256 or above. 3.5 Experian data must not be stored locally on smart tablets and smart phones such as iPads, iPhones, Android based devices, etc. 3.6 When using smart tablets or smart phones to access Experian data, ensure that such devices are protected via device pass-code. 3.7 Applications utilized to access Experian data via smart tablets or smart phones must protect data while in transmission such as SSL protection and/or use of VPN, etc. 3.8 Only open email attachments and links from trusted sources and after verifying legitimacy. 3.9 When no longer in use, ensure that hard-copy materials containing Experian data are crosscut shredded, incinerated, or pulped such that there is reasonable assurance the hard-copy materials cannot be reconstructed. 3.10 When no longer in use, electronic media containing Experian data is rendered unrecoverable via a secure wipe program in accordance with industry-accepted standards for secure deletion, or otherwise physically destroying the media (for example, degaussing).
Protect Data. 3.1 Develop and follow procedures to ensure that data is protected throughout its entire information lifecycle (from creation, transformation, use, storage and secure destruction) regardless of the media used to store the data (i.e., tape, disk, paper, etc.) 3.2 All credit reporting agency data is classified as Confidential and must be secured to this requirement at a minimum. 3.3 Procedures for transmission, disclosure, storage, destruction and any other information modalities or media should address all aspects of the lifecycle of the information. 3.4 Encrypt all credit reporting agency data and information when stored on any laptop computer and in the database using AES or 3DES with 128-bit key encryption at a minimum. 3.5 Only open email attachments and links from trusted sources and after verifying legitimacy.
Protect Data. Develop and follow procedures to ensure that data is protected throughout its entire information lifecycle (from creation, transformation, use, storage and secure destruction) regardless of the media used to store the data (e.g., tape, disk, paper, etc.) • All Trust Data that is deemed confidential under Section 10 of this Agreement is to be treated as such and must be secured to this requirement at a minimum. • Procedures for transmission, disclosure, storage, destruction and any other information modalities or media should address all aspects of the lifecycle of the information. • Encrypt all data and information when stored on any laptop computer and in the database using three-key triple DES or AES with 256-bit key encryption at a minimum.
Protect Data. 3.1 Develop and follow procedures to ensure that data is protected throughout its entire information lifecycle (from creation, transformation, use, storage and secure destruction) regardless of the media used to store the data (i.e., tape, disk, paper, etc.) All credit reporting agency 3.2 data is classified as Confidential and must be secured to this requirement at a minimum.
Protect Data. 3.1 Develop and follow procedures to ensure that data is protected throughout its entire information lifecycle (from creation, transformation, use, storage and secure destruction) regardless of the media used to store the data (i.e., tape, disk, paper, etc.) 3.2 All credit reporting agency data is classified as confidential and must be secured to this requirement at a minimum. 3.3 Procedures for transmission, disclosure, storage, destruction and any other information modalities or media should address all aspects of the lifecycle of the information. 3.4 Encrypt all credit reporting agency data and information when stored on any laptop computer and in the database using AES or 3DES with 128-bit key encryption at a minimum. 3.5 Only open email attachments and links from trusted sources and after verifying legitimacy. 3.6 Monitor compliance with the obligations of this Addendum and immediately notify CSI if End-User suspects or knows of any unauthorized access or attempt to access the Credit Information Services. Such monitoring will include, without limitation, a review of each CRA invoice for the purpose of detecting any unauthorized activity. 3.7 Not ship hardware or software between End-User’s locations or to third parties without deleting all CSI End-User number(s), security codes, User IDs, passwords, End-User user passwords, and any consumer information 3.8 Access, use and store the Information Services (for purposes of this Addendum “Information Services” shall include without limitation all information and data provided or obtained through use of the Information Services) only at or from locations within the territorial boundaries of the United States, United States territories and Canada (the “Permitted Territory”). End-User may not access, use or store the Information Services at or from, or send the Information Services to, any location outside of the Permitted Territory without first obtaining CSI’s written permission.
Protect Data. (A) Develop and follow procedures to ensure that data is protected throughout its entire information lifecycle (from creation, transformation, use, storage and secure destruction) regardless of the media used to store the data (i.e., tape, disk, paper, etc.) (B) Alliance 2020, Inc. data is classified Confidential and must be secured to this requirement at a minimum. (C) Procedures for transmission, disclosure, storage, destruction and any other information modalities or media should address all aspects of the lifecycle of the information. (D) Encrypt all Alliance 2020, Inc. data and information when stored on any laptop computer and in the database using AES or 3DES with 128-bit key encryption at a minimum. (E) Only open email attachments and links from trusted sources and after verifying legitimacy.
Protect Data. CLIENT understands and agrees that they must implement and follow procedures to protect data. These measures include: ● Develop and follow procedures to ensure that data is protected throughout its entire information lifecycle (from creation, transformation, use, storage and secure destruction) regardless of the media used to store the data (i.e., tape, disk, paper, etc.) All Sapphire Check LLC data is classified as confidential and must be secured to this requirement at a minimum. Procedures for transmission, disclosure, storage, destruction and any other information modalities or media should address all aspects of the lifecycle of the information. ● Encrypt all Sapphire Check LLC data and information when stored on any laptop computer and in the database using AES or 3DES with 128­bit key encryption at a minimum. ● Only open email attachments and links from trusted sources and after verifying legitimacy.

Related to Protect Data

  • Proprietary Data NASDAQ OMX grants to Subscriber a nonexclusive, non-transferable license during the term of the Agreement to receive and use the Information transmitted to it by Distributor and thereafter, to use such Information as permitted under the terms of this Agreement and/or the NASDAQ OMX Requirements. Subscriber acknowledges and agrees that NASDAQ OMX has proprietary rights to the Information that originates on or derives from markets regulated or operated by NASDAQ OMX, and compilation or other rights to Information gathered from other sources. Subscriber further acknowledges and agrees that NASDAQ OMX 's third-party information providers have exclusive proprietary rights to their respective Information. In the event of any misappropriation or misuse by Subscriber or anyone who accesses the Information through Subscriber, NASDAQ OMX or its third-party information providers shall have the right to obtain injunctive relief for its respective materials. Subscriber will attribute source as appropriate under all the circumstances.

  • Third Party Proprietary Data The Disclosing Party's Third Party Proprietary Data, if any, will be identified in a separate technical document.