Security and Business Continuity Clause Samples
POPULAR SAMPLE Copied 1 times
Security and Business Continuity. The Coinbase Entities have implemented and will maintain a reasonable information security program that includes policies and procedures that are reasonably designed to safeguard the Coinbase Entities’ electronic systems and Client’s Confidential Information from, among other things, unauthorized access or misuse. In the event of a Data Security Incident (defined below), the applicable Coinbase Entity shall promptly notify Client and such notice shall include the following information: (a) the timing and nature of the Data Security Incident; (b) the information related to Client that was compromised; (c) when the Data Security Incident was discovered; and (d) any remedial actions that have been taken and that the applicable Coinbase Entity plans to take. “
Security and Business Continuity. The Coinbase Entities have implemented and will maintain a reasonable information security program (as summarized in the Security Addendum attached hereto) that includes policies and procedures that are reasonably designed to safeguard Coinbase Entities’ electronic systems and Client’s Confidential Information from, among other things, unauthorized access or misuse. In the event of a Data Security Event (defined below), the applicable Coinbase Entity shall promptly (subject to any legal or regulatory requirements) notify Client in writing at the email addresses listed in Section 33 and such notice shall include the following information: (i) the timing and nature of the Data Security Event, (ii) the information related to Client that was compromised, including the names of any individuals’ acting on Client’s behalf in his or her corporate capacity whose personal information was compromised, (iii) when the Data Security Event was discovered, and (iv) remedial actions that have been taken and that the applicable Coinbase Entity plans to take. “
Security and Business Continuity. Coinbase’s information security standards and business continuity standards shall at minimum comply with the terms addressing information security, data protection and business continuity standards as set forth in Addendum No. 2.
Security and Business Continuity. The Coinbase Entities shall not have any liability, obligation, or responsibility whatsoever for any damage or interruptions caused by any computer viruses, spyware, scareware, Trojan horses, worms, or other malware that may affect computer or other equipment, or any phishing, spoofing, or other attack, unless such damage or interruption directly resulted from the Coinbase Entities’ gross negligence, fraud, or willful misconduct. Client agrees to access and use the PB Services through the Coinbase PB Site to review any Orders, deposits, or withdrawals or required actions to confirm the authenticity of any communication or notice from the Coinbase Entities.
Security and Business Continuity. Health Gorilla shall employ commercially reasonable efforts to ensure that all Services are free from any known cyberattack, including but not limited to bots, viruses, worms, Trojan horses, spyware, adware, and other malicious code. Health Gorilla will not knowingly use the Services to disrupt Customer’s computer systems or network equipment and/ or other hardware. Health Gorilla shall maintain and keep current a disaster recovery plan.
Security and Business Continuity. Supplier shall, throughout term of the applicable Order plus the exit period, maintain and comply with: (i) a business continuity plan; and (ii) a written information security programme of administrative, technical and physical safeguards that are appropriate for Supplier’s size and complexity, the nature and scope of Supplier’s activities, and the sensitivity of the data that Supplier is handling, and which meets such standards as may be set out or referenced in Supplier’s or any of its Affiliate’s response to any IT security, risk assessment or due diligence questionnaire(s) (and any follow-up questions) issued, from time to time, by ▇▇▇▇▇▇ ▇▇▇▇▇▇▇ or any of its Affiliates in relation to the Services. Supplier shall promptly, fully and accurately respond to all such questionnaires (and follow-up questions). Supplier shall ensure that such security programme is designed, in accordance with appropriate industry standards (for a supplier to the financial services sector), to ensure the security and confidentiality of ▇▇▇▇▇▇ ▇▇▇▇▇▇▇’▇ Confidential Information (including in its disposal) against anticipated threats and hazards, including unauthorized access, destruction, loss, corruption, misuse and improper alteration; and protect against harm to the integrity, availability and resilience of the Services. Supplier shall ensure that such security programme includes, as a minimum: (a) IT and cyber security controls (including, to the extent the Products and/or Services consist of or include technology: access and privilege management and reviews; regular password updating; logging of user activities; prompt application of security patches; screening of the Products and/or Services using anti-Virus software; ensuring the Products and/or Services do not contain any protocol permitting unauthorized access or surreptitious monitoring; and use of a firewall); (b) practices to detect and resolve security vulnerabilities as quickly as possible; and (c) a security breach management plan. Supplier shall ensure that its business continuity plan is designed to ensure the continuity of provision of the Services, without interruption or deterioration, notwithstanding the occurrence of any event or circumstances that would otherwise affect continuity of service provision. Supplier shall, at least annually, test Supplier’s security breach management plan and business continuity plan. On request, ▇▇▇▇▇▇ ▇▇▇▇▇▇▇ shall have the right to participate in testing with Supplier.
Security and Business Continuity. The Coinbase Entities shall not have any liability, obligation, or responsibility whatsoever for any damage or interruptions caused by any computer viruses, spyware, scareware, Trojan horses, worms, or other malware that may affect computer or other equipment, or any phishing, spoofing, or other attack, unless such damage or interruption [***] resulted from the Coinbase Entities’ [***]. Client agrees to access and use the PB Services through the Coinbase PB Site [***].
Security and Business Continuity. 12.1 Unifiedpost will employ security measures in accordance with (i) the applicable industry standard. In this respect Unifiedpost shall use commercially reasonable efforts to have and continue to have adequate administrative, technical, and physical safeguards in place to ensure the security and confidentiality of Customer Data, to protect against anticipated threats or hazards to the integrity of such information and records, and to protect against the unauthorized access or use of such information and records.
12.2 In the event Unifiedpost would get knowledge of a data breach (regardless whether the nature relates to Personal Data or not) or of an (potential) event which threatens the integrity of the data, Unifiedpost will inform Customer as soon as reasonably possible and, in any event, no later than 2 Business Days after Unifiedpost gain knowledge of such data breach or threat to the data integrity.
12.3 Customer has and will retain sole responsibility for: (a) all Customer Data, including its content and use; (b) all information, instructions, and materials provided by or on behalf of Customer or any Authorized User in connection with the Services; (c) Customer's information technology infrastructure, including computers, software, databases, electronic systems (including database management systems), and networks, whether operated directly by Customer or through the use of third-party services ("Customer Systems"); (d) the security and use of Customer's and its Authorized Users' access credentials; and (e) all access to and use of the Services directly or indirectly by or through the Customer Systems or its or its Authorized Users.
12.4 Customer shall employ all physical, administrative, and technical controls, screening, and security procedures and other safeguards necessary to: (a) securely administer the distribution and use of all access credentials and protect against any unauthorized access to or use of the Services; and (b) control the content and use of Customer Data, including the uploading of such Customer Data onto the Services.
Security and Business Continuity.
9.1. LCH SA complies with the best security and business continuity practices commonly implemented by banking and financial institutions from time to time.
9.2. LCH SA has implemented and shall maintain the necessary actions and policies in order to guarantee the continuity and the security in its Services to Users at all times either on its primary site or back‐up sites.
9.3. The Users shall ensure that they have in place at all times appropriate business continuity arrangements, having regard to the nature of the Services. Business continuity arrangements shall include (i) the provision of off‐site continuity facilities at (a) separate location(s) from the main facilities of the Users and (ii) the implementation of a resilient network infrastructure, in compliance with their business continuity needs in order to enforce the system resiliency so as to allow them to continue benefiting from the Services and guarantee business continuity.
9.4. Notwithstanding the above provision, the Users undertake to comply with any specific security and business continuity requirements LCH SA may determine at any time. Such requirements may be as follows: restriction of use of the Clearing Access Solution (only within the Users’ premises), communication of the Users security policy related to Clearing Access Solutions or any components used to access the Clearing Solution, resiliency of the Clearing Access Solution on the Users primary site and back up site, obligation to proceed to real switch‐ over tests from the primary site to back‐up site). The above list shall not be construed as an exhaustive list. If need be such requirements will be attached to this Access Agreement in due time and a dedicated schedule will be drawn up.
9.5. Moreover, when a Clearing Member delegates its access to the Clearing Solution to a Clearing Access Solution Third Party Provider, LCH SA strongly recommends, and the Clearing Members expressly acknowledge that the network connection, which might be set up by the Clearing Member to the Clearing Access Solution, complies with minimum network security specifications as set out in Schedule 2.
Security and Business Continuity. The Coinbase Entities have implemented and will maintain a reasonable information security program that includes policies and procedures that are reasonably designed to safeguard the Coinbase Entities’ electronic systems and Client’s Confidential Information from, among other things, unauthorized access or misuse.