Data and System Security Clause Samples

Data and System Security. To prevent unauthorised access to systems or personal data, I will not leave any information system unattended without first logging out or securing/locking access.
Data and System Security. The Parties acknowledge that network and data security is a shared responsibility. Each Party shall comply with such data and system security measures (including transmission and interface standards) as may be agreed with the other Party from time to time.
Data and System Security. (A) the ▇▇▇▇▇-▇▇▇▇▇ ▇▇▇▇▇▇ Act; (B) the regulations of the National Credit Union Administration (“NCUA”) contained in 12 CFR (Code of Federal Regulations) part 748 and its Appendix AGuidelines for Safeguarding Member Information and B – Guidance on Response Programs for Unauthorized Access to Member Information and Member Notice; and (C) the Fair and Accurate Credit Transactions Act Pub. Law 108-159 as it pertains to the destruction/disposal of records (16 CFR 682) and 12 CFR part 749 – Records Preservation Program and Record Retention.
Data and System Security. 5.1 The Requestor Organization agrees to establish appropriate administrative, technical, and physical safeguards when accessing the Enclave to protect the security of the Study Data and Linked Data, and to prevent unauthorized use or access to it. 5.2 The Requestor Organization, Principal Investigator, Compliance Officer, and all Users agree to access Study Data and Linked Data in the Enclave. 5.3 The Requestor Organization agree that representatives of NIA or Department of Health and Human Services (DHHS) Office of the Inspector General may access the data and files specified in Data Documentation and information derived from these data/file(s) for the purpose of confirming compliance with the terms of this Agreement. Other Federal staff and the NIA Data Linkage Contractor shall not have access to Study Data unless given written permission by the Requestor Organization Representative, Compliance Officer, or Principal Investigator. 5.4 The Parties mutually agree that the individual named as Compliance Officer on the Signature Page below will be the person responsible for the observance of all conditions of use and for establishment and maintenance of security arrangements as specified in this Agreement to prevent unauthorized use. 5.5 NIA has designated the default Compliance Officer to be the Principal Investigator.
Data and System Security