Service Locations and Security Clause Samples

The 'Service Locations and Security' clause defines the requirements and standards for where services will be performed and the security measures that must be maintained at those locations. It typically specifies whether services are to be delivered on the client's premises, remotely, or at a third-party site, and outlines the physical and digital security protocols that must be followed, such as access controls, surveillance, or data protection measures. This clause ensures that both parties understand and agree on the operational environment and safeguards, thereby reducing risks related to unauthorized access, data breaches, or non-compliance with security policies.
Service Locations and Security. 29 SECTION 10.1 Rights of Access to NDPS Service Locations.......... .....29 SECTION 10.2 NDPS Service Locations....................................29 SECTION 10.3
Service Locations and Security. Section 11
Service Locations and Security. (a) Vendor shall not [*], without Customer's prior written approval, which shall not be unreasonably withheld. (b) As part of the Services, Vendor shall maintain and enforce at the Service Locations safety and security procedures that are at least (i) equal to industry standards for such Service Locations and (ii) as rigorous as those procedures in effect at the Service Locations as of the effective date. Vendor shall [*] Confidential portions omitted and filed separately with the Securities and Exchange Commission. comply with and maintain the safety and security procedures which are in effect at the Service Locations as of the Effective Date. (c) As part of the Services, Vendor shall implement and maintain security processes, procedures and techniques in accordance with industry standards designed to detect and prevent unauthorized access to any and all networks and systems which process Customer information, and shall implement and maintain virus protection and similar software and procedures in accordance with industry standards designed to detect and prevent software viruses and any corruption of such networks and systems and the data contained therein. (d) As part of the Services, Vendor shall immediately inform Customer of any breach in security or potential security issues, that either (i) has a material impact on the delivery of the Services, or (ii) may not be material in itself, but represents a single instance in a pattern of breaches which collectively are material. Vendor shall maintain tracking procedures sufficient to allow it to evaluate security breaches and determine whether they must be reported to Customer under the preceding sentence. (e) As part of the Services, Vendor shall provide access to and cooperate with Customer's internal and external auditors in respect to any audit or review of the Service Locations. Vendor will, within a reasonable time, correct any issues raised in an audit letter associated with items included in the scope of this Agreement.
Service Locations and Security 

Related to Service Locations and Security

  • Access and Security Customer shall employ all physical, administrative and technical controls, screening and security procedures and other safeguards necessary to: (a) securely administer the distribution and use of all Access Credentials and protect against any unauthorized access to or use of the Hosted Services; and (b) control the content and use of Customer Data, including the uploading or other provision of Customer Data for Processing by the Hosted Services.

  • Service Locations ▇. ▇▇▇▇▇▇ maintains various operational/service centers and locations in the United States and other jurisdictions. The services provided under this Agreement may be provided from one or more such locations. ▇.▇. ▇▇▇▇▇▇ may change the operational/service centers and locations as it deems necessary or appropriate for its business concerns.

  • Data and Security If Contractor is granted access to Court Data, Confidential Information or Court Work Locations in the performance of the Work;

  • Service Location The services shall be performed at all contracting and participating facilities of the Contractor.

  • Privacy and Security (a) Each of the Company and its Subsidiaries complies (and requires and monitors the compliance of applicable third parties) in all material respects with all applicable Laws relating to privacy or data security, and reputable industry practice, standards, self-governing rules and policies and their own published, posted and internal agreements and policies (which are in conformance with reputable industry practice) (all of the foregoing collectively, “Privacy Laws”) with respect to: (i) personally identifiable information (including name, address, telephone number, electronic mail address, social security number, bank account number or credit card number), sensitive personal information and any special categories of personal information regulated thereunder or covered thereby (“Personal Information”), whether any of same is accessed or used by the Company or any of its Subsidiaries or any of their respective business partners; and (ii) non-personally identifiable information, whether any of same is accessed or used by the Company or any of its Subsidiaries or any of their respective business partners. (b) Neither the Company nor any of its Subsidiaries uses, collects, or receives any Personal Information or sensitive non-personally identifiable information and does not become aware of the identity or location of, or identify or locate, any particular Person as a result of any receipt of such Personal Information, in a manner which would materially breach or violate any Privacy Laws and materially and adversely impact the business of the Company and its Subsidiaries, taken as a whole. (c) To the Company’s knowledge, Persons with which the Company or any of its Subsidiaries have contractual relationships have not breached any agreements or any Privacy Laws pertaining to Personal Information and to non-personally identifiable information. (d) To the Company’s knowledge, the Company and its Subsidiaries take all commercially reasonable steps to protect the operation, confidentiality, integrity and security of their respective business systems and websites and all information and transactions stored or contained therein or transmitted thereby against any unauthorized or improper use, access, transmittal, interruption, modification or corruption, and there have been no material breaches of same. Without limiting the generality of the foregoing, each of the Company and its Subsidiaries (i) uses industry standard encryption technology and (ii) has implemented a comprehensive security plan that (1) identifies internal and external risks to the security of the Company’s or its Subsidiaries’ confidential information and Personal Information and (2) implements, monitors and improves adequate and effective safeguards to control those risks.