Security Data Clause Samples

The 'Security; Data' clause establishes the obligations and standards for protecting data and maintaining information security within the context of an agreement. It typically requires parties to implement appropriate technical and organizational measures to safeguard sensitive or personal data from unauthorized access, loss, or breaches. For example, this may include encryption, access controls, or regular security audits. The core function of this clause is to ensure that data is handled responsibly and securely, thereby reducing the risk of data breaches and ensuring compliance with relevant data protection laws.
POPULAR SAMPLE Copied 1 times
Security Data. The following prevails over anything to the contrary in the Content and Data Protection section of the base Cloud Service terms between the parties: IBM will prepare and utilize de-identified and/or aggregate information collected from the Cloud Service (called "Security Data"). The Security Data will not identify the Client, or an individual except as provided in (d) below. Client herein additionally agrees that IBM may use and/or copy the Security Data only for the following purposes: a. publishing and/or distributing the Security Data (e.g., in compilations and/or analyses related to cybersecurity); b. developing or enhancing products or services; c. conducting research internally or with third parties; and d. lawful sharing of confirmed third party perpetrator information.
Security Data. Client shall be responsible for maintaining the security and integrity of its own network and Internet connections and for scanning files coming from or sent to the System for viruses or other harmful code. Client shall be responsible for the accuracy and adequacy of the data that it furnishes or transmits to DM in connection herewith. All Client data which Client furnishes or transmits to DM under this Agreement shall be in a format and in accordance with any other reasonable requirements specified by DM.
Security Data. During the course of performing the Security Services Arista may will receive, view or obtain access to and use certain Customer Data, including without limitation, the personal information of Customer's employees, vendors, customers or agents as well as data on Customer’s system’s processes, procedures and internal controls (collectively, the "Security Data") for the purposes of carrying out the Security Services. Customer acknowledges and agrees that Customer has the authority to consent to Arista's use of, and access to, the Security Data, and has obtained any authorizations and releases from Customer's employees, contractors, vendors, customers, representatives or agents required to provide an informed consent for Arista's use of the Security Data for the provision of the Services.
Security Data. The following information is used for security purposes only and can be changed at any time via the Options menu on your Internet Banking Account.
Security Data. 7.1 PayRight agrees to use reasonable firewalls and other security measures and processes to protect Customer Data against unauthorized use and access in accordance with generally accepted industry standards. However, Customer acknowledges and agrees that applications, systems and data that are made available over the Internet are inherently insecure against motivated individuals and Provider shall have no obligation or liability for any breach of such firewalls or security measures as a result of same. 7.2 All Customer Data shall be the property of Customer or the Patient End User, as the case may be. Customer shall be solely responsible for the accuracy, quality, integrity, legality, reliability and correctness of all Customer Data provided by Customer and its Authorized Users and for updating the Customer Data as necessary. PayRight shall not have any obligation to monitor, edit or verify the Customer Data or to verify any Patient End User Data provided by a Patient End User, including payment information. PayRight shall not disclose the Customer Data to any third party other than Authorized Users and as otherwise necessary for the purpose of providing the Service, including to payment processors, eligibility partners, statement providers and merchants. PayRight may access Customer’s and any Authorized User’s account to respond to or investigate service or technical problems or as required by applicable law. PayRight agrees that it shall use the Customer Data only as required for the purposes of the Service and as otherwise set forth herein. Customer and the Authorized Users shall be responsible for maintaining backup copies of Customer Data. 7.3 Customer hereby agrees and grants the right to PayRight to use, store, process, display and transmit Customer Data as necessary for provision of the Service. Customer is responsible for obtaining and maintaining any Patient End User consents and authorizations that may be required for Customer’s use of the Service and PayRight’s use of Patient End User Data in connection with its provision of the Service. Customer further agrees that PayRight may aggregate, analyze and use Customer Data (excluding PHI unless de-identified in accordance with the BAA and excluding other personally- identifiable information and cardholder transaction data) (“Aggregate Data”) including for purposes of improving, developing and enhancing PayRight’s products and services, market research, creation, distribution or sale of market data...
Security Data 

Related to Security Data

  • Protection of Customer Data The Supplier shall not delete or remove any proprietary notices contained within or relating to the Customer Data. The Supplier shall not store, copy, disclose, or use the Customer Data except as necessary for the performance by the Supplier of its obligations under this Contract or as otherwise Approved by the Customer. To the extent that the Customer Data is held and/or Processed by the Supplier, the Supplier shall supply that Customer Data to the Customer as requested by the Customer and in the format (if any) specified by the Customer in the Contract Order Form and, in any event, as specified by the Customer from time to time in writing. The Supplier shall take responsibility for preserving the integrity of Customer Data and preventing the corruption or loss of Customer Data. The Supplier shall perform secure back-ups of all Customer Data and shall ensure that up-to-date back-ups are stored off-site at an Approved location in accordance with any business continuity plan or otherwise. The Supplier shall ensure that such back-ups are available to the Customer (or to such other person as the Customer may direct) at all times upon request and are delivered to the Customer at no less than six (6) Monthly intervals (or such other intervals as may be agreed in writing between the Parties). The Supplier shall ensure that any system on which the Supplier holds any Customer Data, including back-up data, is a secure system that complies with the Security Policy and the Security Management Plan (if any) If at any time the Supplier suspects or has reason to believe that the Customer Data is corrupted, lost or sufficiently degraded in any way for any reason, then the Supplier shall notify the Customer immediately and inform the Customer of the remedial action the Supplier proposes to take. If the Customer Data is corrupted, lost or sufficiently degraded as a result of a Default so as to be unusable, the Customer may: require the Supplier (at the Suppliers expense) to restore or procure the restoration of Customer Data as required by the Customer, and the Supplier shall do so as soon as practicable but not later than five (5) Working Days from the date of receipt of the Customer’s notice; and/or itself restore or procure the restoration of Customer Data, and shall be repaid by the Supplier any reasonable expenses incurred in doing so as required by the Customer.

  • Security of Data a. Each of the parties shall: i. ensure as far as reasonably practicable, that Data is properly stored, is not accessible to unauthorised persons, is not altered, lost or destroyed and is capable of being retrieved only by properly authorised persons; ii. subject to the provisions of Sub-Clause 8.a. ensure that, in addition to any security, proprietary and other information disclosure provision contained in the Contract, Messages and Associated Data are maintained in confidence, are not disclosed or transmitted to any unauthorised person and are not used for any purpose other than that communicated by the sending party or permitted by the Contract; and iii. protect further transmission to the same degree as the originally transmitted Message and Associated Data when further transmissions of Messages and Associated Data are permitted by the Contract or expressly authorised by the sending party. b. The sending party shall ensure that Messages are marked in accordance with the requirements of the Contract. If a further transmission is made pursuant to Sub-Clause 3. a. iii. the sender shall ensure that such markings are repeated in the further transmission. c. The parties may apply special protection to Messages by encryption or by other agreed means, and may apply designations to the Messages for protective Interchange, handling and storage procedures. Unless the parties otherwise agree, the party receiving a Message so protected or designated shall use at least the same level of protection and protective procedures for any further transmission of the Message and its Associated Data for all responses to the Message and for all other communications by Interchange or otherwise to any other person relating to the Message. d. If either party becomes aware of a security breach or breach of confidence in relation to any Message or in relation to its procedures or systems (including, without limitation, unauthorised access to their systems for generation, authentication, authorisation, processing, transmission, storage, protection and file management of Messages) then it shall immediately inform the other party of such breach. On being informed or becoming aware of a breach the party concerned shall: i. immediately investigate the cause, effect and extent of such breach; ii. report the results of the investigation to the other party; and iii. use all reasonable endeavours to rectify the cause of such breach. e. Each party shall ensure that the contents of Messages that are sent or received are not inconsistent with the law, the application of which could restrict the content of a Message or limit its use, and shall take all necessary measures to inform without delay the other party if such an inconsistency arises.

  • Security Technology When the service is accessed using a supported web browser, Secure Socket Layer (“SSL”), or equivalent technology shall be employed to protect data from unauthorized access. The service security measures shall include server authentication and data encryption. Provider shall host data pursuant to the DPA in an environment using a firewall that is periodically updated according to industry standards.

  • Information Security Program (1) DTI shall implement and maintain a comprehensive written information security program applicable to the Personal Information ("Information Security Program") which shall include commercially reasonable measures, including, as appropriate, policies and procedures and technical, physical, and administrative safeguards that are consistent with industry standards, providing for (i) the security and confidentiality of the Personal Information, (ii) protection of the Personal Information against reasonably foreseeable threats or hazards to the security or integrity of the Personal Information, (iii) protection against unauthorized access to or use of or loss or theft of the Personal Information, and (iv) appropriate disposal of the Personal Information. Without limiting the generality of the foregoing, the Information Security Program shall provide for (i) continual assessment and re-assessment of the risks to the security of Personal Information acquired or maintained by DTI and its agents, contractors and subcontractors in connection with the Services, including but not limited to (A) identification of internal and external threats that could result in unauthorized disclosure, alteration or destruction of Personal Information and systems used by DTI and its agents, contractors and subcontractors, (B) assessment of the likelihood and potential damage of such threats, taking into account the sensitivity of such Personal Information, and (C) assessment of the sufficiency of policies, procedures, information systems of DTI and its agents, contractors and subcontractors, and other arrangements in place, to control risks; and (ii) appropriate protection against such risks. (2) The Information Security Program shall require encryption of any Personal Information in electronic format while in transit or in storage, and enhanced controls and standards for transport and disposal of physical media containing Personal Information. DTI shall, and shall require its agents, contractors and subcontractors who access or use Personal Information or Confidential Information to, regularly test key controls, systems and procedures relating to the Information Security Program ("ISP Tests"). DTI shall advise the Funds of any material issues identified in the ISP Tests potentially affecting the Information Security Program. (3) DTI shall comply with its Information Security Program.