Security and Confidentiality of Data Sample Clauses

The Security and Confidentiality of Data clause establishes the obligation of parties to protect sensitive information from unauthorized access, disclosure, or misuse. It typically requires implementing appropriate technical and organizational measures, such as encryption, access controls, and staff training, to safeguard data throughout its lifecycle. This clause is essential for ensuring compliance with privacy laws and industry standards, and it helps prevent data breaches and the resulting legal or reputational harm.
Security and Confidentiality of Data. 2.3.1 The Data Processor shall carry out the Processing in compliance with the Data Protection Legislation. 2.3.2 The Data Processor shall implement (and assist the Customer to implement) technical and organizational measures to safe guard the Data from unauthor- ized or unlawful Processing or accidental loss, destruction, or damage and acknowledges that it has implemented appropriate technical and organizational measures to prevent unauthorized or unlawful Processing, accidental loss, de- struction, damage or disclosure of the Data. 2.3.3 The Data Processor shall ensure that each of its employees, agents or sub- contractors are made aware of its obligations with regard to the security and protection of the Data and shall require that they: a) enter into binding obligations with the Data Processor in order to maintain an appropriate obligation of confidentiality and the levels of security and protection provided for in this Agreement. b) Process the Data solely on instructions from Customer; and c) is appropriately reliable, qualified and trained in relation to their Processing of Data. 2.3.4 The Data Processor shall not divulge the Data whether directly or indirectly to any person, firm, or company without the written consent of Customer, except to those of its employees who are engaged in the Processing of the Data and are subject to the binding obligations referred in 2.3.3 2.3.5 In the event that the Data Processor subcontracts any part of the Processing to a third party in accordance with 2.3.4 the Data Processor shall ensure that a written contract on the same terms as this Agreement is entered into by the subcontractor and that any subcontractor provides the Data Processor with a plan of the technical and organizational means it has adopted to prevent unau- thorized or unlawful Processing or accidental loss or destruction of the Data. The Data Processor will remain responsible for all acts and omissions of sub- contractor as if they were its own. 2.3.6 The Data Processor will Process the Data only on behalf of Customer and in compliance with Customer’s documented instructions and this Agreement or any other written agreement between the parties and if the Data Processor cannot provide such compliance for whatever reason the Data Processor will in- form Customer promptly of its inability to comply, in which case Customer shall be entitled to suspend the Processing of the Data and/or terminate this Agree- ment and the contract to which this Agreement ...
Security and Confidentiality of Data. 22.6.1. The Data Processor shall use its best endeavours to safeguard the Data from unauthorised or unlawful processing or accidental loss, destruction or damage and acknowledges that it has implemented technical and organisational measures to prevent unauthorised or unlawful processing or accidental loss or destruction of the Data. 22.6.2. The Data Processor shall ensure that each of its employees, agents or subcontractors are made aware of its obligations with regard to the security and protection of the Data and shall require that they enter into binding obligations with the Data Processor in order to maintain the levels of security and protection provided for in this Agreement. 22.6.3. The Data Processor shall not divulge the Data whether directly or indirectly to any person, firm or company without the express consent of the Data Controller except to those of its employees, agents and subcontractors who are engaged in the processing of the Data.
Security and Confidentiality of Data. The Southwest Wisconsin Workforce Development Board and its partner agencies agree to comply with the following measures to protect the confidentiality of any information provided under this Agreement and to protect such information against unauthorized access or disclosure. A. Duty of Non-Disclosure and Security Precautions Data Recipient will utilize all procedures and security mechanisms necessary to prevent unauthorized access to or disclosure of workforce information, and specifically agrees that it will: 1. Use the data only for purposes authorized by law and this Agreement. 2. Not disclose the data without prior written approval of DWD via its authorized representatives. 3. Limit paper documentation (reports, screen prints, etc.) containing workforce information of a confidential or personal identifiable (PII) nature. 4. Store paper information in a place physically secure from access by unauthorized persons. 5. Store and process the data in an electronic format in a way that is secure from access by unauthorized persons. 6. Take precautions to ensure that only authorized personnel have access to the computer systems in which the data is stored. 7. Make the data accessible only to staff of the Data Recipient who require it in the official performance of their job duties, and for the specific purposes stated in this Agreement. All data will be kept in the strictest confidence and will be made available to staff of Data Recipient on a “need-to-know” basis. 8. Instruct all persons with access to the data on the confidentiality requirements of this Agreement, and the sanctions for unauthorized disclosure of information. Training shall precede any request for access, and refresher training shall be conducted once a year. a. Training may be accomplished by providing employees with confidentiality and security policy materials, such as those provided by DWD DET, and requiring that those materials be read. b. Training shall be documented by requiring each employee to sign an acknowledgement and verification stating that they have received and read the materials, understand them, and agree to comply with them. This acknowledgement is to be updated annually. c. The acknowledgement and verification shall be maintained by Data Recipient and will be made available upon request for monitoring purposes. 9. Inform staff with access under this Agreement of any new confidentiality or security requirements that it receives from DWD DET or other official sources (such ...
Security and Confidentiality of Data. The Data Processor shall only process data using those means The Data Controller has instructed The Data Processor to use. For example, if the Data Controller gives The Data Processor access to data stored on a particular database for the purpose of processing that data on the database, the Data Processor shall not remove the data from that database for processing purposes without the prior consent of The Data Controller.
Security and Confidentiality of Data a) The Processor and the Controller shall implement appropriate technical and organisational measures to ensure a level appropriate to the risks that are presented by the data processing in particular from accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to personal transmitted, stored or otherwise processed. b) Both the Controller and Processor shall take into account the following when determining the measures: i) the state of the art, and ii) the cost of implementation of the measures, and iii) the nature, scope context and purposes of processing, and iv) the risk of varying likelihood and severity for the rights and freedoms of individual Data Subjects c) The Controller and Processor agree that the security measures taken in accordance with Clause 6 (a) of this Agreement after assessment with the requirements of the GDPR are appropriate to protect Data against accidental or unlawful destruction or accidental loss, alteration, unauthorised disclosure or access, in particular where the Processing involves the transmission of Data over a network, and against all other unlawful forms of Processing, and that these measures ensure a level of security appropriate to the risks presented by the Processing and the nature of the Data to be protected having regard to the state of the art and the cost of their implementation; shall ensure a level of security appropriate to the risk, d) The measures taken shall include amongst others the following items, where appropriate, from the non- exhaustive list below: i) the pseudonymisation and encryption of Data
Security and Confidentiality of Data 

Related to Security and Confidentiality of Data

  • Security and Confidentiality Technical and organisational security measures must be taken by the data controller that are appropriate to the risks, such as against accidental or unlawful destruction or accidental loss, alteration, unauthorised disclosure or access, presented by the processing. Any person acting under the authority of the data controller, including a processor, must not process the data except on instructions from the data controller.

  • CONFIDENTIALITY OF DATA A. All financial, statistical, personal, technical, or other data and information relative to LOCAL AGENCY’s operations, which are designated confidential by LOCAL AGENCY and made available to CONSULTANT in order to carry out this contract, shall be protected by CONSULTANT from unauthorized use and disclosure. B. Permission to disclose information on one occasion, or public hearing held by LOCAL AGENCY relating to the contract, shall not authorize CONSULTANT to further disclose such information, or disseminate the same on any other occasion. C. CONSULTANT shall not comment publicly to the press or any other media regarding the contract or LOCAL AGENCY’s actions on the same, except to LOCAL AGENCY’s staff, CONSULTANT’s own personnel involved in the performance of this contract, at public hearings or in response to questions from a Legislative committee. D. CONSULTANT shall not issue any news release or public relations item of any nature, whatsoever, regarding work performed or to be performed under this contract without prior review of the contents thereof by LOCAL AGENCY, and receipt of LOCAL AGENCY’S written permission. E. Any subcontract entered into as a result of this contract shall contain all of the provisions of this Article.

  • Integrity and Confidentiality Escrow Agent will be required to (i) hold and maintain the Deposits in a secure, locked, and environmentally safe facility, which is accessible only to authorized representatives of Escrow Agent, (ii) protect the integrity and confidentiality of the Deposits using commercially reasonable measures and (iii) keep and safeguard each Deposit for one (1) year. ICANN and Registry Operator will be provided the right to inspect Escrow Agent’s applicable records upon reasonable prior notice and during normal business hours. Registry Operator and ICANN will be provided with the right to designate a third-­‐party auditor to audit Escrow Agent’s compliance with the technical specifications and maintenance requirements of this Specification 2 from time to time. If Escrow Agent receives a subpoena or any other order from a court or other judicial tribunal pertaining to the disclosure or release of the Deposits, Escrow Agent will promptly notify the Registry Operator and ICANN unless prohibited by law. After notifying the Registry Operator and ICANN, Escrow Agent shall allow sufficient time for Registry Operator or ICANN to challenge any such order, which shall be the responsibility of Registry Operator or ICANN; provided, however, that Escrow Agent does not waive its rights to present its position with respect to any such order. Escrow Agent will cooperate with the Registry Operator or ICANN to support efforts to quash or limit any subpoena, at such party’s expense. Any party requesting additional assistance shall pay Escrow Agent’s standard charges or as quoted upon submission of a detailed request.

  • Information and Confidentiality 6.1 Each party will provide all information within its control necessary to enable the other to discharge its obligations under this agreement. 6.2 Neither party shall, without the written consent of the other party, make use of for its own purposes or disclose or allow to be disclosed to any person, (except as may be required by law or by an authorised body in evaluating the work undertaken e.g. external audit), this Agreement or any material connected with it.

  • Publicity and Confidentiality 12.1 Publicity. Partner will keep confidential and will not disclose, market or advertise to third parties the terms of this Agreement (including the fees paid hereunder). Partner or Red Hat may reference its relationship with the other, in the normal course of business including during earnings calls, discussions with analysts, meetings with the press, customer briefings, general marketing activities and in regulatory filings. Neither Party will issue formal press releases or other similar activities referencing the other Party without the written consent of the other Party.