Security and Data Protection Sample Clauses
POPULAR SAMPLE Copied 2 times
Security and Data Protection. Contractor is responsible for the security and protection of State data subject to and related to Cloud Services in this Contract. The terms, conditions, and provisions of this Security and Data Protection section take precedence and will prevail over any other terms, conditions, and provisions of the Contract, if in conflict. This Security and Data Protection section, including its sub-sections, survives the completion, termination, expiration, or cancellation of the Contract. For the purposes of this Security and Data Protection section, the following terms have the following meanings:
Security and Data Protection. 10.1 The Air Operator undertakes to comply with the valid data protection legislation applicable to its operations. The operator acts as the controller of the processed personal data.
Security and Data Protection. The content of your emails or online appointments will not be communicated with a third party except for the purposes of supervision of my work. In this instance, your identity will not be revealed, and the presenting issues are discussed in a general context, to help ensure I am working ethically and safely with clients. I strongly recommend that online clients use an encrypted email server for sending and receiving email exchanges when engaging with counselling, this helps to ensure that our communication will not be intercepted by a third party. A free and secure email provider is ▇▇▇.▇▇▇▇▇▇▇▇▇▇.▇▇▇ My protonmail address is: ▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇@▇▇▇▇▇▇▇▇▇▇▇.▇▇▇▇▇▇ contact after our initial communication would be via this email provider. In respect of online counselling via email,SMS, and webcam the UK police force and other international government authorities can ask for access to an individual’s email account or synchronous messaging account where there is suspicion of illegal activities. On this basis I am not able to guarantee confidentiality in circumstances which lead to access being granted. Where a complaint is made by a client to my professional bodyI reserve the right to breach confidentiality and to use my session notes in order to address any grievances which might occur within the OCST counselling practice. Wherever possible you will be informed of this. At the end of our counselling agreement copies of our exchanges will be stored securely offline for a period of 7 years and then destroyed by shredding after this time. I am a registered Data Controller and Data Processor and abide by the regulations imposed by such procedures. My registration number is:Z9440927.OCST has a policy for data processing and storage.The procedures in this document have been compiled in relation to GDPR (General Data Privacy Requlations) from May 26th 2018 onwards. As the Data Controller and data Processor I maintain and storebrief notes relating to your sessions. I will not share this data with someone other than yourself, unless required by a court of law. Under GDPR you have the right to request a copy of sessionrecords. Where requestedby you these will be within 30 days in electronic format, Under GDPR you have the right to ask for records to be amended if you feel they are inaccurate. If you wish to ask for an amendment or if you raise objection to any data kept by me, such objection will be stored with the original session notes. The Client agreement /assessment...
Security and Data Protection. 18.1 Each party shall for the duration of this Agreement comply with the provisions of the Data Protection Act 1998 (including the Data Protection Principles set out in that Act) and from 25th May 2018 the General Data Protection Regulation and any similar or analogous laws, regulatory requirements or codes of practice (the ‘Data Protection Legislation’) governing the use, storage or transmission of Customer’s Personal Data (for clarity, this is Personal Data provided by the Customer pursuant to the performance of this Agreement by the parties) and shall not do or permit anything to be done which might cause or otherwise result in breach of the same. For clarity this clause 18 is in addition to, and does not relieve, remove or replace, a party's obligations under the Data Protection Legislation.
18.2 Managed Ink acknowledges that for the purposes of the Data Protection Legislation, it is the Data Processor and the Customer is the Data Controller of any the Customer’s Personal Data provided to it by the Customer or obtained by it as part of its obligations under this Agreement. For clarity Data Controller, Data Processor, and Personal Data have the meanings as defined in the Data Protection Legislation. In its capacity as Data Processor, Managed Ink undertakes to use reasonable endeavours to keep the Customer’s Personal Data secure to ensure that the Customer is not in breach of its obligations under the current or any future Data Protection Legislation.
18.3 Without limitation to clauses 18.1 and 18.2, ▇▇▇▇▇▇▇ Ink agrees to:
18.3.1 to ensure a level of security appropriate to the nature of the Personal Data to be protected;
18.3.2 to take appropriate steps so that Managed Ink’s employees and subcontractors who have access to the Customer’s Personal Data comply with this clause 18;
18.3.3 to comply with the Customer’s reasonable instructions pursuant to the Data Protection Legislation in relation to the collection, processing and disposal of any of the Customer’s Personal Data
18.4 Without limitation to clauses 18.1 and 18.2 Managed Ink shall, in relation to any of the Customer’s Personal Data processed in connection with the performance by Managed Ink of its obligations under this Agreement:
18.4.1 process that Customer’s Personal Data only on the written instructions of the Customer which is to be provided within reasonable notice unless Managed Ink is required by the laws of any member of the European Union or by the laws of the European Union applicable...
Security and Data Protection. 14.1 Questionmark shall maintain information and physical security policies and procedures to protect the Customer Data consistent with good industry practice.
14.2 Questionmark represents that it is certified by a reputable third party against the ISO 27001 standard or a comparable successor standard, and that its production data centre used to deliver assessments is also audited against the SSAE 18 or ISO 27001 standards or comparable successor standards. On written request, Questionmark shall provide to Customer copies of its certificates and other reasonably requested documentation about its security.
14.3 Questionmark shall use reasonable efforts to respond to Customer questions regarding Questionmark’s security practices. Any reports, summaries thereof or information provided pursuant to this clause 14 is Confidential Information of Questionmark.
14.4 Questionmark shall use commercially reasonable efforts not to include in the Services any computer viruses, malware, disabling devices or contaminants the purpose of which is to damage Customer’s computer systems (“Contaminants”), the parties agreeing that any feature of the software that monitors the service configuration or disables access to the software at the end of the Term is not a Contaminant.
14.5 The parties shall comply with their respective obligations as detailed in Schedule 1.
Security and Data Protection. [For IT-related contracts, if you are a MNIT Consolidated agency, Contact MNIT at ▇▇▇.▇▇▇▇@▇▇▇▇▇.▇▇.▇▇ to determine if this section is necessary and to receive current language. For physical records contact your agency legal staff to determine if necessary and to receive current language.]
Security and Data Protection. The Administrator shall, at its cost and expense, implement, maintain and comply with information security and data protection procedures and safeguards consistent with industry standards for the Services provided hereunder. Such procedures and safeguards shall be designed in part, to ensure protection from loss and unauthorized disclosure of confidential information, including without limitation, all Trust Data and other Trust Confidential Information that is within the Administrator’s possession or control
Security and Data Protection. Grantee is responsible for the security and protection of protected information subject to and related to Cloud Services in accordance with this Agreement. For the purposes of this Security and Data Protection section, the following terms have the following meanings:
Security and Data Protection a. Contractor shall comply with all his/her obligations under the Personal Data Protection Act (“PDPA”) at his/her own cost.
b. Contractor shall only process, use or disclose Customer Personal Data (which refers to data about a customer who can be identified from that data alone, or from that data and other information which Contractor has or is likely to have access to) strictly for the purposes of fulfilling his/her obligations and providing the services under this Agreement.
c. Contractor shall protect Customer Personal Data in Contractor’s control or possession by making reasonable security arrangements to prevent unauthorized or accidental access, collection, use, disclosure, or copying of Customer Personal Data.
d. Contractor shall not retain Customer Personal Data (or any documents or records containing Customer Personal Data, electronic or otherwise) for any period of time longer than is necessary to perform the services and fulfil the obligations set out in this Agreement.
e. Contractor shall indemnify the Client against all actions, claims, demands, losses, damages, statutory penalties, expenses and cost (including legal costs on an indemnity basis) in respect of Contractor’s breach of this clause or any act, omission or negligence of Contract that causes or results in the Client being in breach of the PDPA.
Security and Data Protection. Taking into account the nature of the Processing, each party shall implement appropriate technical and organizational measures to ensure a level of security appropriate to the risk as set out under GDPR Article 32, and otherwise as set out under GDPR Articles 33-36 .