Security and Password Sample Clauses

POPULAR SAMPLE Copied 1 times
Security and Password. YOU shall be provided with a password to access the SOFTWARE. YOU are not allowed to share and reveal this password to any unauthorised third party.
Security and Password. YOU shall be provided with a password to access the SOFTWARE. YOU are not allowed to share and reveal this password to any unauthorised third party. You are responsible for keeping your device and your online learning programme account safe and secure, and you must notify the respective centre promptly of any unauthorized use or security breach of your online learning programme account.
Security and Password. 6.1 You hereby agree and warrant, and shall procure that each User complies with the following: i. the Password shall only be used by your Users on your behalf under this ▇▇▇▇; ii. neither you nor any User shall give, disclose or make available any Password to any other person for such person's use ("unauthorised use") and that you and each User shall maintain the confidentiality of any Password; and iii. if for any reason any Password is no longer secure or may be accessible to or in the possession of any person other than a User authorised by LegalperfecT (or, in the case of any Password issued to or used by any User only for such User's use of the GhostWare, any person other than such User), you shall immediately notify LegalperfecT thereof, whereupon LegalperfecT shall use its best endeavours to replace such Password within twenty four (24) hours after receipt of such notification. 6.2 In order to ensure the security and reliable operation of the Website and GhostWare for all end users of GhostWare, LegalperfecT hereby reserves the right to take whatever action LegalperfecT considers necessary to preserve the security and reliability of the Website and/or GhostWare from time to time, LegalperfecT acting reasonably. 6.3 You agree that there are technological measures and software contained in GhostWare designed to monitor your compliance with the terms of this ▇▇▇▇, including but not limited to monitoring your use of GhostWare and preventing GhostWare from being used save as permitted under this ▇▇▇▇. To the extent necessary and to the extent allowed by law, you hereby agree and authorise LegalperfecT to use and install such technological measures and software onto your computers and/or computer network upon installation of GhostWare as contemplated in this ▇▇▇▇. 6.4 Save under 14, LegalperfecT will not provide any back-up of any data. You must therefore ensure that you back-up your own data regularly.
Security and Password. You are solely responsible for maintaining the confidentiality of Your password and account, if any, and for any and all statements made and acts or omissions that occur through the use of Your password and/or account. Therefore, You must take steps to ensure that others do not gain access to Your password and/or account. Our personnel will never ask You for Your password. You may not transfer or share Your account with anyone, and We reserve the right to immediately terminate Your account if You do transfer or share Your account.

Related to Security and Password

  • Security and Privacy Security and privacy policies for the Genesys Cloud Service addressing use of Customer Data, which are incorporated by reference and may be updated from time to time in accordance with Section 10.12 of the Agreement, are located at ▇▇▇▇▇://▇▇▇▇.▇▇▇▇▇▇▇▇▇▇▇.▇▇▇/articles/purecloud-security-compliance/.

  • Data Security and Privacy Except as would not, individually or in the aggregate, reasonably be expected to be material to the business of the Company Group, taken as a whole, the Company and each of its Subsidiaries (i) is in compliance with all Data Security Requirements and (ii) has taken commercially reasonable steps consistent with standard industry practice by companies of similar size and maturity, and in compliance in all material respects with all Data Security Requirements to protect (A) the confidentiality, integrity, availability and security of its Business Systems that are involved in the Processing of Personally Identifiable Information, in the conduct of the business of the Company and its Subsidiaries as currently conducted; and (B) Personally Identifiable Information Processed by or on behalf of the Company or such Subsidiary or on their behalf from unauthorized use, access, disclosure, theft and modification. Except as would not, individually or in the aggregate, reasonably be expected to be material to the business of the Company Group, taken as a whole, (i) there are, and since January 1, 2022, have been, no pending complaints, investigations, inquiries, notices, enforcement proceedings, or Actions by or before any Governmental Authority and (ii) since January 1, 2022, no fines or other penalties have been imposed on or written claims, notice, complaints or other communications have been received by the Company or any Subsidiary, relating to any Specified Data Breach or alleging non-compliance with any Data Security Requirement. The Company and each of its Subsidiaries have not, since January 1, 2022, (1) experienced any Specified Data Breaches, or (2) been involved in any Legal Proceedings related to or alleging any violation of any Data Security Requirements by the Company Group or any Specified Data Breaches, each except as would not be material to the business of the Company Group, taken as a whole. The consummation of the transactions contemplated by this Agreement will not cause the Company Group to breach any Data Security Requirement, except as would not reasonably be expected to be material to the business of the Company Group, taken as a whole.

  • Security and Data Transfers Party shall comply with all applicable State and Agency of Human Services' policies and standards, especially those related to privacy and security. The State will advise the Party of any new policies, procedures, or protocols developed during the term of this agreement as they are issued and will work with the Party to implement any required. Party will ensure the physical and data security associated with computer equipment, including desktops, notebooks, and other portable devices, used in connection with this Agreement. Party will also assure that any media or mechanism used to store or transfer data to or from the State includes industry standard security mechanisms such as continually up-to-date malware protection and encryption. Party will make every reasonable effort to ensure media or data files transferred to the State are virus and spyware free. At the conclusion of this agreement and after successful delivery of the data to the State, Party shall securely delete data (including archival backups) from Party’s equipment that contains individually identifiable records, in accordance with standards adopted by the Agency of Human Services. Party, in the event of a data breach, shall comply with the terms of Section 7 above.

  • Data Security and Privacy Plan As more fully described herein, throughout the term of the Master Agreement, Vendor will have a Data Security and Privacy Plan in place to protect the confidentiality, privacy and security of the Protected Data it receives from the District. Vendor’s Plan for protecting the District’s Protected Data includes, but is not limited to, its agreement to comply with the terms of the District’s Bill of Rights for Data Security and Privacy, a copy of which is set forth below and has been signed by the Vendor. Additional components of Vendor’s Data Security and Privacy Plan for protection of the District’s Protected Data throughout the term of the Master Agreement are as follows: (a) Vendor will implement all state, federal, and local data security and privacy requirements including those contained within the Master Agreement and this Data Sharing and Confidentiality Agreement, consistent with the District’s data security and privacy policy. (b) Vendor will have specific administrative, operational and technical safeguards and practices in place to protect Protected Data that it receives from the District under the Master Agreement. (c) Vendor will comply with all obligations contained within the section set forth in this Exhibit below entitled “Supplemental Information about a Master Agreement between Chazy Central Rural School District and [Name of Vendor].” Vendor’s obligations described within this section include, but are not limited to: (i) its obligation to require subcontractors or other authorized persons or entities to whom it may disclose Protected Data (if any) to execute written agreements acknowledging that the data protection obligations imposed on Vendor by state and federal law and the Master Agreement shall apply to the subcontractor, and (ii) its obligation to follow certain procedures for the return, transition, deletion and/or destruction of Protected Data upon termination, expiration or assignment (to the extent authorized) of the Master Agreement. (d) Vendor has provided or will provide training on the federal and state laws governing confidentiality of Protected Data for any of its officers or employees (or officers or employees of any of its subcontractors or assignees) who will have access to Protected Data, prior to their receiving access. (e) Vendor will manage data security and privacy incidents that implicate Protected Data and will develop and implement plans to identify breaches and unauthorized disclosures. Vendor will provide prompt notification to the District of any breaches or unauthorized disclosures of Protected Data in accordance with the provisions of Section 5 of this Data Sharing and Confidentiality Agreement.

  • Bill of Rights for Data Privacy and Security As required by Education Law Section 2-d, the Parents Bill of Rights for Data Privacy and Security and the supplemental information for the Service Agreement are included as Exhibit A and Exhibit B, respectively, and incorporated into this DPA. Contractor shall complete and sign Exhibit B and append it to this DPA. Pursuant to Education Law Section 2-d, the EA is required to post the completed Exhibit B on its website.