Security and Controls Sample Clauses

The Security and Controls clause establishes the requirements and standards for protecting data, systems, and information within the scope of the agreement. It typically outlines the technical and organizational measures that must be implemented, such as encryption, access controls, regular security assessments, and incident response procedures. This clause ensures that both parties maintain adequate safeguards to prevent unauthorized access, data breaches, or misuse, thereby reducing the risk of security incidents and ensuring compliance with relevant laws and industry standards.
Security and Controls. A. Service Organization Control Reports. Following completion of implementation of any applicable Services, ADP will, at Client's request and at no charge, provide Client with copies of any routine Service Organization Control 1 reports ("SOC 1 Reports") (or any successor reports thereto) directly related to the core ADP Products utilized to provide the Services provided hereunder for Client and already released to ADP by the public accounting firm producing the report. SOC 1 Reports are ADP Confidential Information and Client will not distribute or allow any third party (other than its independent auditors) to use any such report without the prior written consent of ADP. Client will instruct its independent auditors or other approved third parties to keep such report confidential and Client will remain liable for any unauthorized disclosure of such report by its independent auditors or other approved third parties.
Security and Controls. ▇▇▇ will establish and maintain procedures and safeguards designed to protect Client's information in JHA's possession equivalent to that used to protect JHA's own information. ▇▇▇ is not responsible for information while in transit or in possession of non-▇▇▇ parties.
Security and Controls. The Services provide the Customer with a number of controls, including security features and functionalities, that the Customer may use to retrieve, correct, delete or restrict Customer or End User Data. Without prejudice to Section 5.1, the Customer may use these controls as technical and organisational measures to assist in connection with its obligations under the GDPR, including its obligations relating to responding to requests from data subjects.
Security and Controls 

Related to Security and Controls

  • Security and Privacy Security and privacy policies for the Genesys Cloud Service addressing use of Customer Data, which are incorporated by reference and may be updated from time to time in accordance with Section 10.12 of the Agreement, are located at ▇▇▇▇▇://▇▇▇▇.▇▇▇▇▇▇▇▇▇▇▇.▇▇▇/articles/purecloud-security-compliance/.

  • Security and Safety A. The Contractor warrants it is and shall remain in compliance with all applicable local, state and federal laws, regulations, codes and ordinances relating to fire, construction, building, health, food service and safety, including but not limited to the Hotel and Motel Fire Safety Act of 1990, Public Law 101-391. The Judicial Council may terminate this Agreement, pursuant to the termination for cause provision set forth herein, without penalty or prejudice if the Contractor fails to comply with the foregoing requirements. B. The Contractor shall assure that each Attendee is advised of all the appropriate precautions that should be taken to provide for the Attendee’s safety while on the Property. The Contractor shall take every reasonable precaution to provide for the security of Attendees and their belongings. C. The Contractor shall immediately advise the Judicial Council’s staff of any known problems that involve the Attendees during the Program including, but not limited to, assaults, burglaries, accidents, and/or illnesses.

  • Data Security and Privacy Except as would not, individually or in the aggregate, reasonably be expected to be material to the business of the Company Group, taken as a whole, the Company and each of its Subsidiaries (i) is in compliance with all Data Security Requirements and (ii) has taken commercially reasonable steps consistent with standard industry practice by companies of similar size and maturity, and in compliance in all material respects with all Data Security Requirements to protect (A) the confidentiality, integrity, availability and security of its Business Systems that are involved in the Processing of Personally Identifiable Information, in the conduct of the business of the Company and its Subsidiaries as currently conducted; and (B) Personally Identifiable Information Processed by or on behalf of the Company or such Subsidiary or on their behalf from unauthorized use, access, disclosure, theft and modification. Except as would not, individually or in the aggregate, reasonably be expected to be material to the business of the Company Group, taken as a whole, (i) there are, and since January 1, 2022, have been, no pending complaints, investigations, inquiries, notices, enforcement proceedings, or Actions by or before any Governmental Authority and (ii) since January 1, 2022, no fines or other penalties have been imposed on or written claims, notice, complaints or other communications have been received by the Company or any Subsidiary, relating to any Specified Data Breach or alleging non-compliance with any Data Security Requirement. The Company and each of its Subsidiaries have not, since January 1, 2022, (1) experienced any Specified Data Breaches, or (2) been involved in any Legal Proceedings related to or alleging any violation of any Data Security Requirements by the Company Group or any Specified Data Breaches, each except as would not be material to the business of the Company Group, taken as a whole. The consummation of the transactions contemplated by this Agreement will not cause the Company Group to breach any Data Security Requirement, except as would not reasonably be expected to be material to the business of the Company Group, taken as a whole.

  • Security Controls Annually, upon Fund’s reasonable request, DST shall provide Fund’s Chief Information Security Officer or his or her designee with a summary of its corporate information security policy and an opportunity to discuss DST’s information security measures, and a high level and non-confidential summary of any penetration testing related to the provision of in-scope services . DST shall review its Security Policy annually.

  • Security and Charge 11.1 In consideration of the Seller agreeing to supply the Goods, the Client charges all of its rights, title and interest (whether joint or several) in any land, realty or other assets capable of being charged, owned by the Client either now or in the future, to secure the performance by the Client of its obligations under these terms and conditions (including, but not limited to, the payment of any money). 11.2 The Client indemnifies the Seller from and against all the Seller’s costs and disbursements including legal costs on a solicitor and own client basis incurred in exercising the Seller’s rights under this clause. 11.3 The Client irrevocably appoints the Seller and each director of the Seller as the Client’s true and lawful attorney/s to perform all necessary acts to give effect to the provisions of this clause 11 including, but not limited to, signing any document on the Client’s behalf.