Data Privacy and Security Sample Clauses
The Data Privacy and Security clause establishes the obligations of parties to protect personal and sensitive information from unauthorized access, use, or disclosure. Typically, this clause requires adherence to relevant data protection laws, implementation of security measures such as encryption or access controls, and prompt notification in the event of a data breach. Its core function is to safeguard confidential data, ensuring compliance with legal standards and minimizing the risk of data misuse or loss.
POPULAR SAMPLE Copied 40 times
Data Privacy and Security. Bank will implement and maintain a written information security program, in compliance with all federal, state and local laws and regulations (including any similar international laws) applicable to Bank, that contains reasonable and appropriate security measures designed to safeguard the personal information of the Funds’ shareholders, employees, trustees and/or officers that Bank or any Subcustodian receives, stores, maintains, processes, transmits or otherwise accesses in connection with the provision of services hereunder. In this regard, Bank will establish and maintain policies, procedures, and technical, physical, and administrative safeguards, designed to (i) ensure the security and confidentiality of all personal information and any other confidential information that Bank receives, stores, maintains, processes or otherwise accesses in connection with the provision of services hereunder, (ii) protect against any reasonably foreseeable threats or hazards to the security or integrity of personal information or other confidential information, (iii) protect against unauthorized access to or use of personal information or other confidential information, (iv) maintain reasonable procedures to detect and respond to any internal or external security breaches, and (v) ensure appropriate disposal of personal information or other confidential information. Bank will monitor and review its information security program and revise it, as necessary and in its sole discretion, to ensure it appropriately addresses any applicable legal and regulatory requirements. Bank shall periodically test and review its information security program. Bank shall respond to Customer’s reasonable requests for information concerning Bank’s information security program and, upon request, Bank will provide a copy of its applicable policies and procedures, or in Bank’s discretion, summaries thereof, to Customer, to the extent Bank is able to do so without divulging information Bank reasonably believes to be proprietary or Bank confidential information. Upon reasonable request, Bank shall discuss with Customer the information security program of Bank. Bank also agrees, upon reasonable request, to complete any security questionnaire provided by Customer to the extent Bank is able to do so without divulging sensitive, proprietary, or Bank confidential information and return it in a commercially reasonable period of time (or provide an alternative response that reasonably addresses the poin...
Data Privacy and Security. (a) There is (and since January 1, 2018 there has been) no material Proceeding pending or, to the Company’s knowledge, threatened against or involving any Group Company initiated by any Person (including (i) the United States Federal Trade Commission, any state attorney general or similar state official, (ii) any other Governmental Entity, foreign or domestic or (iii) any regulatory or self-regulatory entity) alleging that any Processing of Personal Data by or on behalf of a Group Company is or was in violation of any privacy Laws.
(b) Since January 1, 2018, (i) there has been no unauthorized access to, or unauthorized use, disclosure, or Processing of Personal Data in the possession or control of any Group Company or any of its contractors with regard to any Personal Data obtained from or on behalf of a Group Company, (ii) there have been no unauthorized intrusions or breaches of security into any Company IT Systems, and (iii) none of the Group Companies has notified or been required to notify any Person of any (A) loss, theft or damage of, or (B) other unauthorized or unlawful access to, or use, disclosure or other Processing of, Personal Data, except, in each case of clauses (i), (ii), and (iii), as would not have a Company Material Adverse Effect.
(c) Each Group Company owns or has a license or other right to use the Company IT Systems as necessary to operate the business of each Group Company as currently conducted. All Company IT Systems are (i) free from any defect, bug, virus or programming, design or documentation error and (ii) in sufficiently good working condition to effectively perform all information technology operations necessary for the operation of the Business (except for ordinary wear and tear), except in each case of clauses (i) and (ii), as is not and would not reasonably be expected to be, individually or in the aggregate, material to the Group Companies, taken as a whole. Since January 1, 2018, there have not been any material failures, breakdowns or continued substandard performance of any Company IT Systems that have caused a material failure or disruption of the Company IT Systems other than routine failures or disruptions that have been remediated in the ordinary course of business.
Data Privacy and Security. Supplier shall comply with the Data Privacy and Security Addendum terms contained in Exhibit C, attached hereto and made a part hereof.
Data Privacy and Security. (a) Each Group Company does not knowingly collect or process Personal Data contrary to law, to each Group Company’s knowledge. The Company has safeguards in place that are sufficient to protect Personal Data and confidential information in the Company’s possession or control from unauthorized access by third Persons and to ensure that the operation of the businesses of each Group Company (including with respect to employee matters) are in compliance with all Privacy and Security Requirements in all material respects.
(b) There are no pending Proceedings, nor has there been any Proceedings against any Group Company initiated by (i) any Person; (ii) the United States Federal Trade Commission, any state attorney general or similar state official; (iii) any other Governmental Entity or (iv) any regulatory or self-regulatory entity, in each case, alleging that any Processing of Personal Data by or on behalf of a Group Company is in violation of any applicable Privacy Laws.
(c) Since the Lookback Date, (i) there has been no material unauthorized access, use, acquisition or disclosure of Personal Data, or confidential business information in the possession or control of any Group Company or, to the Company’s knowledge, any third party service provider on behalf of any Group Company, and (ii) to the Company’s knowledge, there have been no unauthorized intrusions into or Security Breaches of any Group Company systems networks, communication equipment or other technology necessary for the operations of the Group Companies’ business. The Group Companies have not experienced any material successful unauthorized access to, use or modification of, or interference with Company IT Systems since the Lookback Date and none of the Group Companies is aware of any written or, to the knowledge of the Company, oral notices or complaints from any Person regarding such a Security Breach or incident. None of the Group Companies has received any written complaints, claims, demands, inquiries or other notices, including a notice of investigation, from any Person (including any Governmental Entity or self-regulatory authority) regarding any of the Group Companies’ Processing of Personal Data or compliance with applicable Privacy and Security Requirements. Since the Lookback Date, none of the Group Companies have provided or have been obligated to provide notice under any Privacy and Security Requirements to regarding any Security Breach or unauthorized access to or use of any Company ...
Data Privacy and Security. Data Privacy. "
Data Privacy and Security. (i) The Company and each of its Subsidiaries complies, and during the past three years has complied, in all material respects, with all Privacy and Information Security Requirements. Neither the Company nor any of its Subsidiaries have been notified in writing of, or is the subject of, any complaint or proceeding or to the Company’s knowledge, any, regulatory investigation related to Processing of Personal Data by any Governmental Entity or payment card association, regarding any actual or possible violations of any Privacy and Information Security Requirement by or with respect to the Company or any of its Subsidiaries.
(ii) The Company and each of its Subsidiaries employs commercially reasonable organizational, administrative, physical and technical safeguards that comply in all material respects with all Privacy and Information Security Requirements to protect Company Data within its custody or control and requires the same of all vendors under contract with the Company that Process Company Data on its behalf. The Company and each of its Subsidiaries have provided all requisite notices and obtained all required consents, and satisfied all other requirements (including but not limited to notification to Governmental Entities), necessary for the Processing (including international and onward transfer) of all Personal Data in connection with the conduct of the business as currently conducted and in connection with the consummation of the transactions contemplated hereunder.
(iii) To the knowledge of the Company, neither the Company nor any of its Subsidiaries has suffered a security breach with respect to any of the Company Data and to the Company’s knowledge, there has been no unauthorized or illegal use of or access to any Company Data. Neither the Company nor any of its Subsidiaries has notified, or been required to notify, any Person of any information security breach involving Personal Data. To the Company’s knowledge, the Company Systems have had no material errors or defects that have not been fully remedied and contain no code designed to disrupt, disable, harm, distort or otherwise impede in any manner the legitimate operation of such Company Systems (including what are sometimes referred to as “viruses”, “worms”, “time bombs” or “back doors”) that have not been removed or fully remedied. Neither the Company nor any of its Subsidiaries have experienced within the past three years any material disruption to, or material interruption in, the conduct...
Data Privacy and Security. (a) The Company and each of its Subsidiaries are, and since January 1, 2019, have been in material compliance with all Privacy and Data Security Requirements. To the Knowledge of the Company, all Subprocessors are, and since January 1, 2019 have been in, material compliance with all Privacy and Data Security Requirements.
(b) None of the Personal Information in the possession, custody, or control of the Company or any of its Subsidiaries, received by the Company or any of its Subsidiaries, or otherwise Processed by or on behalf of the Company or any of its Subsidiaries, has been collected by, or provided to the Company or any of its Subsidiaries by a third party, in material violation of any Privacy and Data Security Requirement.
(c) The execution, delivery, and performance of this Agreement and the consummation of the transactions contemplated hereby, including the transfer of all Personal Information and confidential information in the possession, custody, or control of the Company and each of its Subsidiaries (including Personal Information and confidential information held or Processed by any Subprocessor), do not and will not: (i) materially conflict with or result in a material violation or breach of any Privacy and Data Security Requirement (as currently existing or as existing at any time during which any Personal Information was collected or Processed by or for the Company or any of its Subsidiaries); or (ii) require the consent of or notice to any Person concerning such Person’s Personal Information or confidential information. Neither the Company nor any of its Subsidiaries are subject to any Privacy and Data Security Requirements or other legal obligations that, following the Closing, would prohibit the Company, any of the Company’s Subsidiaries, or Parent from receiving, using, or otherwise Processing Personal Information in substantially the same manner in which the Company or any of its Subsidiaries Processed such Personal Information prior to the Closing.
(d) The Company and each of its Subsidiaries have at all times posted to each of their websites, mobile applications, and other online services and provided or otherwise made available to each data subject prior to Processing such data subject’s Personal Information an appropriate Company Privacy and Data Security Policy that materially complies with all Privacy and Data Security Requirements. No material disclosure or representation made or contained in any Company Privacy and Data Securi...
Data Privacy and Security. A. Personal Data and Customer Instructions. Under this Agreement, Apple, acting as a data processor on your behalf, may receive Personal Data if provided by You. By entering into this Agreement, You instruct Apple to process Your Personal Data, in accordance with applicable law:
(i) to provide the Service; (ii) pursuant to Your instructions as given through your use of the Services (including the web portal and other functionality of the Service); (iii) as specified under this Agreement; and (iv) as further documented in any other written instructions given by You and acknowledged by Apple as constituting instructions under this Agreement. Apple shall comply with the instructions described in this Section 3A unless prohibited by an applicable legal requirement from doing so, in which case Apple will inform You of that legal requirement before processing Personal Data (unless prohibited by that law from doing so on important grounds of public interest).
Data Privacy and Security. (a) The Company and its Subsidiaries have developed, implemented and maintained a written data protection, data privacy and cybersecurity program (the “Data Protection Program”) that is in material compliance with all applicable Privacy Requirements. To the knowledge of the Company, since January 1, 2019, the Company and its Subsidiaries have not experienced any material Security Incident. Since January 1, 2019, no Person has brought, or, to the knowledge of the Company, threatened in writing to bring, any Action against the Company or any of its Subsidiaries in relation to any actual or alleged Security Incident or violation or breach of any applicable Privacy Requirement.
(b) The Company and its Subsidiaries have, since January 1, 2019, complied in all material respects with all applicable Privacy Requirements with respect to the Processing of Company PII. The Company and its Subsidiaries are not and, since January 1, 2019, have not been subject to a Governmental Order of, or have received a written notice from, a Governmental Authority regarding actual or alleged non-compliance with or violation of any applicable Privacy Requirement. The Company and its Subsidiaries have taken commercially reasonable steps to ensure the reliability of their employees, representatives, consultants, contractors and agents that have access to Company PII, to train such individuals on all applicable Privacy Requirements and to ensure that all such employees, representatives, consultants, contractors and agents with the right to access such Company PII are under written obligations of confidentiality with respect to such Company PII.
(c) To the knowledge of the Company, each of the Company’s and its Subsidiaries’ third-party data suppliers, vendors, and partners that Process any Company PII on behalf of the Company or its Subsidiaries are in compliance in all material respects with applicable Privacy Requirements and there has been no material unauthorized or illegal Processing, or other material breach, violation or default (or event that, with or without the giving of notice or lapse of time, would constitute a material breach, violation or default) by any such supplier, vendor or other partner in connection with the Processing of Company PII. To the knowledge of the Company, no circumstances have arisen in which applicable Privacy Requirements would require the Company or its Subsidiaries to notify any Governmental Authority or affected individual of any Security Incident...
Data Privacy and Security. 7.1.1 With respect to any End-User Customer Information received, accessible, or accessed by Merchant, Merchant will comply with applicable law regarding the use of non-public personal information and the requirements of BlueSnap’s Privacy Policy as amended from time to time. Further, Merchant (i) will not use any End-User Customer Information for any other purpose other than those contemplated hereunder, (ii) has and will maintain reasonable and appropriate measures to protect the security and confidentiality of such End-User Customer Information, and (iii) will not, directly or through an affiliate, disclose or permit the disclosure of any End-User Customer Information to any other person that is not an affiliate or service provider, or an employee or agent of any such party with a demonstrable need to know such End User Customer Confidential Information in order to fulfill the obligations hereunder. Merchant shall take all available steps and precautions to prevent fraud, theft and/or misappropriation of End-User Customer Information.
7.1.2 Subject to each Merchant’s obligations of confidentiality or a duty to restrict dissemination of proprietary information arising from third party relationships or as otherwise imposed by law, ▇▇▇▇▇▇▇▇ will promptly notify BlueSnap as soon as commercially reasonable upon learning of any suspected or actual security breach, unauthorized disclosure, compromise of privacy involving End-User Customers’ Information or the actual loss or theft of any such personal information (“Security Incident”).
