Security Principle Sample Clauses

Security Principle. The Data Receiver shall take necessary technical and managerial measures to ensure the security of personal data, preventing data leakage, misuse, or illegal access.
Security Principle a) The Data Importer and, during the transfer, also the Data Exporter shall establish and maintain administrative, physical and technical Measures sufficient to ensure the confidentiality, integrity and availability of the Personal Data covered by this Agreement; in particular, protection against Personal Data Security Breaches. In determining an appropriate level of security, the parties shall take due account of the state of the art, the costs of implementation, the nature, scope, context and purposes of the processing, and the risks posed by the processing to the Data Subjects. In fulfilling its obligations under this paragraph, the Data Importer shall implement, at a minimum, the administrative, physical and technical Measures set out in Annex C to this Agreement. The Data Importer shall carry out periodic checks to ensure that these measures continue to provide an adequate level of security. b) In the event of a breach of security of Personal Data processed by the Data Importer under this Agreement, the Data Importer shall take appropriate measures to remedy the breach and, in particular, measures to mitigate the adverse effects. c) The Data Importer shall also notify the Data Exporter within seventy-two (72) hours of becoming aware of the Security Breach. Such notification shall include a description of the nature of the Breach (including, where possible, the categories and approximate number of Data Subjects and Personal Data records affected), the likely consequences, and the measures taken or proposed to remedy the Security Breach, including, where appropriate, measures to mitigate its possible adverse effects. d) When and to the extent that all information cannot be provided at the same time, the initial notification shall provide the information currently available and, as it becomes available, additional information shall be provided without undue delay. e) The Data Importer shall cooperate with the Data Exporter and assist the Data Exporter in fulfilling its obligations under the applicable Law, especially as regards notification to the competent Supervisory Authority and to the Data Subjects concerned, taking into account the nature of the processing and the information available to the Data Importer.

Related to Security Principle

  • Security Practices Dell has implemented corporate information security practices and standards that are designed to safeguard the Dell’s corporate environment and to address: (1) information security; (2) system and asset management; (3) development; and (4) governance. These practices and standards are approved by the Dell CIO and undergo a formal review on an annual basis.

  • Security Procedure The Client acknowledges that the Security Procedure it has designated on the Selection Form was selected by the Client from Security Procedures offered by State Street. The Client agrees that the Security Procedures are reasonable and adequate for its wire transfer transactions and agrees to be bound by any payment orders, amendments and cancellations, whether or not authorized, issued in its name and accepted by State Street after being confirmed by any of the selected Security Procedures. The Client also agrees to be bound by any other valid and authorized payment order accepted by State Street. The Client shall restrict access to confidential information relating to the Security Procedure to authorized persons as communicated in writing to State Street. The Client must notify State Street immediately if it has reason to believe unauthorized persons may have obtained access to such information or of any change in the Client’s authorized personnel. State Street shall verify the authenticity of all instructions according to the Security Procedure.

  • Security Protocols Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.

  • Security Procedures The Fund shall comply with data access operating standards and procedures and with user identification or other password control requirements and other security procedures as may be issued from time to time by State Street for use of the System on a remote basis and to access the Data Access Services. The Fund shall have access only to the Fund Data and authorized transactions agreed upon from time to time by State Street and, upon notice from State Street, the Fund shall discontinue remote use of the System and access to Data Access Services for any security reasons cited by State Street; provided, that, in such event, State Street shall, for a period not less than 180 days (or such other shorter period specified by the Fund) after such discontinuance, assume responsibility to provide accounting services under the terms of the Custodian Agreement.

  • Security Policies To the extent the Contractor or its subcontractors, affiliates or agents handles, collects, stores, disseminates or otherwise deals with State Data, the Contractor will have an information security policy that protects its systems and processes and media that may contain State Data from internal and external security threats and State Data from unauthorized disclosure, and will have provided a copy of such policy to the State. The Contractor shall provide the State with not less than thirty (30) days advance written notice of any material amendment or modification of such policies.