Security and Compliance Clause Samples

The Security and Compliance clause establishes the obligations of parties to adhere to specific security standards and legal requirements related to data protection and regulatory compliance. Typically, this clause requires parties to implement appropriate technical and organizational measures to safeguard sensitive information, and to comply with applicable laws such as data privacy regulations or industry-specific standards. Its core function is to ensure that all parties maintain a secure environment and meet legal obligations, thereby reducing the risk of data breaches and regulatory penalties.
Security and Compliance. Service Provider represents that the information provided by or on behalf of Service Provider in response to Customer’s Vendor Controls Assessment Questionnaire, Software Security Assessment and any other information provided with respect to the Service Provider Systems and Security is complete, truthful, and accurate. Service Provider is responsible for the security of Service Provider Systems and any Information. Service Provider agrees that beginning on the earlier of the effective date of the Agreement, when services commence under the Agreement, or when Service Provider has access to Information, and continuing as long as Service Provider controls, accesses, possesses, stores, transmits or otherwise processes Information, Service Provider shall employ and maintain reasonable, appropriate and adequate Security to: (a) protect all Information from unauthorized use, alteration, access or disclosure, and loss, theft, and damage, and to protect and ensure the confidentiality, integrity and availability of Information; and (b) prevent a Security Breach. In addition, such Security shall meet or exceed all Industry Standards. Service Provider shall comply with all Privacy and Security Laws. The Security that Service Provider is required to employ and maintain pursuant to this section shall include, but not be limited to, the safeguards and controls listed in Schedule A attached hereto and incorporated herein by reference. In the event of any conflict between Service Provider’s obligation to employ and maintain reasonable, appropriate and adequate Security set forth herein, its obligation to meet Industry Standards for Security set forth herein, or any other security-related obligation in the Agreement, Service Provider shall comply with the obligation that provides the most protective and rigorous Security. Prior to making any changes that may materially impact Service Provider’s ability to comply with this Schedule, Service Provider shall provide Customer with written notice of such contemplated changes, including a reasonable description of the anticipated impact of such changes, within a reasonable timeframe in advance of implementation.
Security and Compliance. AWS Managed Services offers a step-by-step process for extending your security, identity, and compliance perimeter to the cloud, including the critical tasks of Active Directory integration and compliance certification mapping to SOC, PCI, HIPAA, NIST, CIS, ISO and GDPR. Our rigour and controls help to enforce your corporate and security infrastructure policies, and enable you to develop solutions and applications using your preferred development approach. • Accelerate Migration to the Cloud. AWS Managed Services provides an enterprise-ready, proven operating environment, enabling you to migrate production workloads in days versus months. Working with Partners and AWS Professional Services, AMS leverages the minimum viable refactoring approach of making only necessary modifications to your applications to meet security and compliance requirements. AMS then takes responsibility for operating your cloud environment post migration, such as analyzing alerts and responding to incidents, enabling your internal resources to focus on the more strategic areas of your business. • Remove Innovation Barriers. Enterprise DevOps is the convergence of modern development best practices (i.e. DevOps) and existing IT process frameworks (i.e. ITIL ®) to give you speed and agility while maintaining governance, security, and compliance control. AMS enables Enterprise DevOps by packaging AWS IaaS services into a secure, compliant development platform that works with most enterprise workloads – not just cloud-native or heavily refactored workloads. AMS-powered Enterprise DevOps helps your development teams focus on their applications and innovate faster. The key operational benefits include: • Provisioning Management (Automated and Self-Service). AWS Managed Services enables you to deploy your cloud infrastructure quickly and easily, and simplifies the on-demand provisioning of commonly used pre-defined cloud stacks. With an infrastructure framework designed to meet your application needs, comprising of AMS’ automation and integration with your existing ITSM service catalog, it allows you to stand up applications quickly in either test or production environments through a self-service portal. Customers can provision AWS resources on AMS in several ways: 1) submit provisioning and configuration Change Types, 2) deploy AMS-provided security hardened AMIs inclusive of the customer application, 3) deploy full Stacks using CloudFormation templates, 4) deploy via their integrated ITSM...
Security and Compliance. MMCM adheres to all applicable digital signature laws and security protocols, ensuring compliance with relevant legal and regulatory frameworks, including the Information Technology Act of India and global standards where applicable. Unless the Agreement is executed with a digital signature, clicking "I Agree" shall constitute your electronic signature and acceptance of the membership terms, which shall be legally binding upon you.
Security and Compliance. Company reserves the right to view, monitor, and record Your activity on the Site without notice or permission from You. Company’s provision of the Site is subject to existing laws and legal process, and nothing contained herein shall restrict or reduce Company’s ability to comply with governmental, court, and law enforcement requests or requirements involving Your use of the Site or information provided to or gathered by Company with respect to such use. You represent and warrant that You are not: (a) located in a country that is subject to a U.S. government embargo; or (b) listed on any U.S. government list of prohibited or restricted parties. You hereby agree that (i) You will comply with all applicable sanctions and export control laws, and
Security and Compliance i. Maintaining security posture and hardening of all devices ii. Configuration of servers /devices as per latest SCD policy prescribed by the Bank iii. Support during audits (IS audit, CSR, RFIA etc.) and other security review activities iv. Closure of VA-PT incidents and regulatory/in- ternal/external audits & various other audit ob- servations v. Maintaining confidentiality and integrity of all information as per bank’s policy
Security and Compliance. 7.1. ▇▇▇▇▇▇ agrees to implement appropriate measures to ensure Security of Data Processing. Nimble regularly monitors compliance with these safeguards, and further agrees to regularly test, assess and evaluate the effectiveness of its Security of Data Processing. 7.2. Nimble shall provide Customer with reasonable assistance at Customer’s expense, where Customer believes the type of Processing performed by ▇▇▇▇▇▇ is likely to result in a high risk to the rights and freedoms of natural persons (e.g., systematic and extensive profiling, Processing sensitive Personal Data on a large scale and systematic monitoring on a large scale), and thus requires a data protection impact assessment and/or prior consultation with the relevant data protection authorities. Nimble shall provide such assistance upon Customer’s reasonable request and to the extent Customer does not otherwise have access to the relevant information, and to the extent such information is available to Nimble. 7.3. ▇▇▇▇▇▇ agrees to keep records of its Processing in compliance with Applicable Data Protection Laws and provide such records to Customer upon Customer’s reasonable request to assist Customer with complying with supervisory authorities' requests. Upon request from Customer and at Customer’s expense, ▇▇▇▇▇▇ agrees to reasonably cooperate with Customer for the purpose of verifying Nimble’s compliance with Applicable Data Protection Laws. 7.4. Nimble will promptly notify Customer, without undue delay, after ▇▇▇▇▇▇ becomes aware of any accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or unlawful access to any Customer’s Personal Data that is transmitted, stored or otherwise Processed by Nimble or its Sub-processors of which Nimble becomes aware. Nimble will use reasonable efforts to identify the cause of such Security Breach and shall promptly and without undue delay: (a) investigate the Security Breach and provide Customer with information about the Security Breach, including if applicable, such information a Data Processor must provide to a Data Controller under Applicable Data Protection Laws to the extent such information is reasonably available; and (b) take reasonable steps to mitigate the effects and to minimize any damage resulting from the Security Breach to the extent the remediation is within Nimble’s reasonable control. The obligations herein shall not apply to any breach that is caused by Customer. 7.5. Nimble shall notify Customer of Security Breac...
Security and Compliance. ProChain’s provision of the Services is subject to existing laws and legal process, and nothing contained herein shall restrict or reduce ProChain’s ability to comply with governmental, court, and law enforcement requests or requirements involving your use of the Services or information provided to or gathered by ProChain with respect to such use.
Security and Compliance. Each organisation will be responsible for ensuring that appropriate data security controls are in place appropriate to the nature and sensitivity of the material and its source, and their respective protective markings. These will include: • restricting access to the data to staff members on a ‘need to know’ only basis; • carrying out duties in accordance with statutory powers and responsibilities; • keeping information securely when not being accessed by these members of staff; and • storing data on a system with security controls that ensure only access is by necessary and relevant people.
Security and Compliance. Our prioritize data security and compliance with industry standards to protect sensitive information and ensure regulatory adherence, providing you with peace of mind regarding data privacy. User-Friendly Interface: Our software features an intuitive interface that is easy to use, allowing users to set up and manage notifications with minimal training, enhancing user adoption and efficiency. Customization Options: You can customize notification templates, workflows, and delivery methods to suit your organization's specific needs, ensuring that the solution aligns with your unique requirements. Reliable Support Services: We offer comprehensive support services, including training, implementation assistance, and ongoing technical support, to ensure a successful deployment and operation of the notification systems.
Security and Compliance. ‌ A. Contractor agrees to comply with all provisions of the then-current The State of Maryland security procedures, published by the Maryland Department of information Technology (DoIT) and which may be found at: ▇▇▇▇://▇▇▇▇.▇▇▇▇▇▇▇▇.▇▇▇/support/pages/securitypolicies.aspx or any successor URL(s), as are pertinent to Contractor's operation. Contractor further agrees to comply with all provisions of the relevant Authorized User's then-current security procedures as are pertinent to Contractor's operation and which have been supplied to Contractor by such Authorized User. Contractor shall also comply with all applicable federal, state and local laws and regulations. For any individual Authorized User location, security procedures may include but not be limited to: background checks, records verification, photographing, and fingerprinting of Contractor Personnel. Contractor may, at any time, be required to execute and complete, for each individual Contractor Personnel, additional forms which may include non-disclosure agreements to be signed by Contractor Personnel acknowledging that all Authorized User information with which such Contractor Personnel come into contact while at the Authorized User site is confidential and proprietary. Any unauthorized release of proprietary or Personal information by Contractor or Contractor Personnel shall constitute a breach of its obligations under this Section and the Contract. Contractor shall immediately notify DGS and Authorized User, if applicable, of any Breach of Unencrypted and Unredacted Personal Information, as defined in Md. STATE GOVERNMENT Code ▇▇▇. §§10-1301 to 10-1308, and other personal identifying information, such as insurance data or date of birth, provided by DGS or Authorized User to Contractor. Contractor shall provide DGS the opportunity to participate in the investigation of the Breach and to exercise control over reporting the unauthorized disclosure, to the extent permitted by law. Contractor shall indemnify, defend, and hold the State, DGS, the Authorized User, their officers, directors, employees and agents harmless from and against any and all fines, penalties (whether criminal or civil), judgments, damages and assessments, including reasonable expenses suffered by, accrued against, or charged to or recoverable from the State, the Authorized User, their officers, directors, agents or employees, on account of the failure of Contractor to perform its obligations pursuant this Section. B. DGS shal...