Data Integrity Measures Clause Samples

POPULAR SAMPLE Copied 1 times
Data Integrity Measures. In connection with the Information Services made available to Buyer under this Agreement, NC and Buyer shall cooperate and implement reasonable firewalls (including as contemplated by Section 11), including, but not limited to, utilizing appropriate hardware and software necessary to maintain and ensure the integrity of Buyer’s data (including any Affiliate of Buyer) and NC’s or any of its contracting parties’ data (including any Affiliate of NC). NC acknowledges that it has provided Buyer with true, correct and complete copies of its systems security policies as of the date hereof. Buyer acknowledges that it has read and shall comply with such systems security policies.
Data Integrity Measures. In connection with the IT Services provided under this Agreement, the Promise Parties and LADMC shall mutually agree to implement reasonable and appropriate safeguards necessary to segregate (electronically or physically, as appropriate) data that is provided to the Promise Parties (including through the Supported Software Applications) by LADMC for purposes of receiving the IT Services (the “LADMC Data”) from other data stored within the Data Center or the Supported Software Applications. LADMC acknowledges that it has read and shall comply with the Promise Parties’ Systems Security Policy, attached hereto as Schedule 1.5 and incorporated herein by this reference.
Data Integrity Measures. During the Transition Services Term: (a) the Service Providers agree to maintain the security and integrity of the Service Recipients’ data stored on the Service Provider Network and supported by the Service Providers under this Transition Services Agreement (including without limitation, efforts not to introduce any virus or other malicious software into any computer equipment, software or data storage devices used by, or to be provided to, the Service Recipients), at the same level as provided to the Service Providers immediately prior to the Phase II Closing Date and (b) if the Service Providers discover or are notified of a breach, or a probable breach, of security relating to the Service Recipients’ data or information stored on the Service Provider Network and supported by the Service Providers under this Transitional Services Agreement, the Service Providers shall promptly notify such Service Recipient of such breach or probable breach.

Related to Data Integrity Measures

  • Security Measures Lessee hereby acknowledges that the rental payable to Lessor hereunder does not include the cost of guard service or other security measures, and that Lessor shall have no obligation whatsoever to provide same. Lessee assumes all responsibility for the protection of the Premises, Lessee, its agents and invitees and their property from the acts of third parties.

  • Safety Measures Awarded vendor shall take all reasonable precautions for the safety of employees on the worksite, and shall erect and properly maintain all necessary safeguards for protection of workers and the public. Awarded vendor shall post warning signs against all hazards created by the operation and work in progress. Proper precautions shall be taken pursuant to state law and standard practices to protect workers, general public and existing structures from injury or damage.

  • Safeguard Measures Neither Party shall take safeguard action against services and service suppliers of the other Party from the date of entry into force of this Agreement. Neither Party shall initiate or continue any safeguard investigations in respect of services and service suppliers of the other Party.

  • Emergency Measures Additional measures and/or other special requirements necessary during periods of critical fire-weather conditions shall be included in the fire prevention and presuppression plan.

  • Protective Measures We have implemented and will maintain appropriate technical and organisational measures in relation to the Services taking into account the state of the art, the costs of implementation, and the nature, scope, context and purposes of Processing, as well as the likelihood and severity of risk to the rights and freedoms of data subjects. This includes measures relating to the physical security of Our facilities used to deliver them, measures to control access rights to Our assets and relevant networks, and processes for testing these measures. In accordance with Our obligations under applicable law, We may undertake digital forensic investigations in relation to the use of the Services and Subscriptions. You are responsible for using, and ensuring that your Users use, the controls and advice provided by the Services correctly and consistently.