Protection and Handling of Data Sample Clauses

The "Protection and Handling of Data" clause establishes the obligations and standards for safeguarding and managing data exchanged or processed under an agreement. It typically outlines requirements for data security measures, restrictions on data access, and protocols for data storage, transfer, and disposal. For example, it may require parties to use encryption, limit data access to authorized personnel, or notify the other party in case of a data breach. The core function of this clause is to ensure the confidentiality, integrity, and proper use of sensitive information, thereby reducing the risk of data loss, misuse, or unauthorized disclosure.
Protection and Handling of Data. 26.1. Data Confidentiality - Contractor shall implement appropriate measures designed to ensure the confidentiality and security of Protected Information. Contractor will provide SBCC with written notice before disclosing information so that SBCC may seek an appropriate protective order or other remedy. Contractor shall exercise commercially reasonable efforts to keep the Protected Information confidential.
Protection and Handling of Data. ▇▇.▇. ▇▇▇▇ Confidentiality and Security - Contractor shall implement appropriate measures designed to ensure the confidentiality and security of protected information as required by law and the Data Sharing and Privacy Agreement attached hereto as Attachment A.
Protection and Handling of Data. A. Compliance with Laws and Sponsor Policies and Procedures. EDH will not knowingly permit any EDH’s personnel to have access to any Sponsor facility or any records or data of Sponsor if the person has been convicted of a crime in connection with: (1) computer-related or information technology crimes; (2) fraudulent practices, false pretenses and frauds, and credit card crimes; (3) forgery and counterfeiting; (4) violations involving checks and drafts; (5) misuse of medical records or personnel records; or (6) felony theft. EDH must, to the extent permitted by law, conduct a check of public records in all of the employee’s states of residence and employment for at least the last five (5) years in order to verify the above.
Protection and Handling of Data. (a) Data Confidentiality - Contractor shall implement appropriate measures designed to ensure the confidentiality and security of Protected Information, protect against any anticipated hazards or threats to the integrity or security of such information, protect against unauthorized access or disclosure of information, and prevent any other action that could result in substantial harm to SBOC or an individual identified with the data or information in Contractor’s custody.
Protection and Handling of Data. 3.1 Data Confidentiality and SecurityCONTRACTOR shall implement appropriate measures designed to ensure the confidentiality and security of Protected Information.
Protection and Handling of Data 

Related to Protection and Handling of Data

  • Information and Data ‌ Upon request of the Union, the Employer agrees to furnish the Union with the following information: budgets for the Board of Regents; budgets for each College; public information used in the preparation of budgets as provided by law such as salaries; minutes of meetings of the Board; policies of the Board of Regents which apply to faculty members. Voluminous information shall be made available for inspection or will be provided at reproduction cost.

  • Protection of Data The Contractor agrees to store Data on one or more of the following media and protect the Data as described: a. Hard disk drives. For Data stored on local workstation hard disks, access to the Data will be restricted to Authorized User(s) by requiring logon to the local workstation using a Unique User ID and Hardened Password or other authentication mechanisms which provide equal or greater security, such as biometrics or smart cards. b. Network server disks. For Data stored on hard disks mounted on network servers and made available through shared folders, access to the Data will be restricted to Authorized Users through the use of access control lists which will grant access only after the Authorized User has authenticated to the network using a Unique User ID and Hardened Password or other authentication mechanisms which provide equal or greater security, such as biometrics or smart cards. Data on disks mounted to such servers must be located in an area which is accessible only to authorized personnel, with access controlled through use of a key, card key, combination lock, or comparable mechanism. For DSHS Confidential Information stored on these disks, deleting unneeded Data is sufficient as long as the disks remain in a Secure Area and otherwise meet the requirements listed in the above paragraph. Destruction of the Data, as outlined below in Section 8 Data Disposition, may be deferred until the disks are retired, replaced, or otherwise taken out of the Secure Area. c. Optical discs (CDs or DVDs) in local workstation optical disc drives. Data provided by DSHS on optical discs which will be used in local workstation optical disc drives and which will not be transported out of a Secure Area. When not in use for the contracted purpose, such discs must be Stored in a Secure Area. Workstations which access DSHS Data on optical discs must be located in an area which is accessible only to authorized personnel, with access controlled through use of a key, card key, combination lock, or comparable mechanism. d. Optical discs (CDs or DVDs) in drives or jukeboxes attached to servers. Data provided by DSHS on optical discs which will be attached to network servers and which will not be transported out of a Secure Area. Access to Data on these discs will be restricted to Authorized Users through the use of access control lists which will grant access only after the Authorized User has authenticated to the network using a Unique User ID and Hardened Password or other authentication mechanisms which provide equal or greater security, such as biometrics or smart cards. Data on discs attached to such servers must be located in an area which is accessible only to authorized personnel, with access controlled through use of a key, card key, combination lock, or comparable mechanism.

  • DATA PROTECTION AND SECURITY 14.1 The Supplier must not remove any ownership or security notices in or relating to the Government Data. 14.2 The Supplier must make accessible back-ups of all Government Data, stored in an agreed off-site location and send the Buyer copies via secure encrypted method upon reasonable request. 1 ▇▇▇▇▇://▇▇▇.▇▇▇.▇▇/government/publications/ppn-0223-tackling-modern-slavery-in-government-supply-chains 14.3 The Supplier must ensure that any Supplier, Subcontractor, or Subprocessor system holding any Government Data, including back-up data, is a secure system that complies with the security requirements specified in the Order Form or otherwise in writing by the Buyer (where any such requirements have been provided). 14.4 If at any time the Supplier suspects or has reason to believe that the Government Data is corrupted, lost or sufficiently degraded, then the Supplier must immediately notify the Buyer and suggest remedial action. 14.5 If the Government Data is corrupted, lost or sufficiently degraded so as to be unusable the Buyer may either or both: 14.5.1 tell the Supplier to restore or get restored Government Data as soon as practical but no later than 5 Working Days from the date that the Buyer receives notice, or the Supplier finds out about the issue, whichever is earlier; and/or 14.5.2 restore the Government Data itself or using a third party. 14.6 The Supplier must pay each Party's reasonable costs of complying with clause 14.5 unless the Buyer is at fault.

  • DATA PROTECTION AND PRIVACY 14.1 In addition to Supplier’s obligations under Sections 6, 9, 10, and 15, Supplier will comply with this Section 14 when processing Accenture Personal Data. "Accenture Personal Data" means personal data owned, licensed, or otherwise controlled or processed by Accenture including personal data processed by Accenture on behalf of its clients. “Accenture Data” means all information, data and intellectual property of Accenture or its clients or other suppliers, collected, stored, hosted, processed, received and/or generated by Supplier in connection with providing the Deliverables to Accenture, including Accenture Personal Data.