Common use of Data Privacy and Data Security Clause in Contracts

Data Privacy and Data Security. 11.1 Each Party will comply with its respective legal obligations under applicable Data Protection Legislation in its processing of any personal information exchanged under this Agreement and comply with any Data Processing Agreement (where this has been separately put in place). 11.2 At all times the Parties shall maintain adequate administrative, technical, and physical measures, controls, tools, systems, policies and procedures in accordance with good data security industry practice. 11.3 Supplier will notify invoX in writing about any security breach or cyber-attack affecting or which may affect any IT infrastructure or data or facilities owned, leased or used by Supplier, which may affect Supplier’s ability to supply Goods and/or Services or otherwise comply with its obligations under the Agreement without undue delay and in any event within 24 hours after Supplier becomes aware of or suspects that a security breach and/or cyber-attack has occurred. Such notification will be, in the first instance, sent by e-mail to the following e-mail address: ▇▇▇▇▇@▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇.▇▇▇ and immediately followed up by telephone to +▇▇ ▇▇ ▇▇▇▇ ▇▇▇▇.

Appears in 2 contracts

Sources: Terms and Conditions of Purchase, Terms and Conditions of Purchase

Data Privacy and Data Security. 11.1 Each Party will comply with its respective legal obligations under applicable Data Protection Legislation in its processing of any personal information exchanged under this Agreement and comply with any Data Processing Agreement (where this has been separately put in place). 11.2 At all times the Parties parties shall maintain adequate administrative, technical, and physical measures, controls, tools, systems, policies and procedures in accordance with good data security industry practice. 11.3 Supplier will notify invoX in writing about any security breach or cyber-attack affecting or which may affect any IT infrastructure or data or facilities owned, leased or used by Supplier, which may affect Supplier’s ability to supply Goods and/or Services or otherwise comply with its obligations under the Agreement without undue delay and in any event within 24 hours after Supplier becomes aware of or suspects that a security breach and/or cyber-attack has occurred. Such notification will be, in the first instance, sent by e-mail to the following e-mail address: ▇▇▇▇▇@▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇.▇▇▇ and immediately followed up by telephone to +▇▇ ▇▇ ▇▇▇▇ ▇▇▇▇.

Appears in 1 contract

Sources: Terms and Conditions of Purchase