Data Security Sample Clauses

Data Security. The Provider agrees to utilize administrative, physical, and technical safeguards designed to protect Student Data from unauthorized access, disclosure, acquisition, destruction, use, or modification. The Provider shall adhere to any applicable law relating to data security. The provider shall implement an adequate Cybersecurity Framework based on one of the nationally recognized standards set forth set forth in Exhibit “F”. Exclusions, variations, or exemptions to the identified Cybersecurity Framework must be detailed in an attachment to Exhibit “H”. Additionally, Provider may choose to further detail its security programs and measures that augment or are in addition to the Cybersecurity Framework in Exhibit “F”. Provider shall provide, in the Standard Schedule to the DPA, contact information of an employee who XXX may contact if there are any data security concerns or questions.
AutoNDA by SimpleDocs
Data Security. The Provider agrees to abide by and maintain adequate data security measures, consistent with industry standards and technology best practices, to protect Student Data from unauthorized disclosure or acquisition by an unauthorized person. The general security duties of Provider are set forth below. Provider may further detail its security programs and measures in Exhibit “F” hereto. These measures shall include, but are not limited to:
Data Security. The Contractor will maintain the security of State of Florida data including, but not limited to, maintaining a secure area around any displayed visible data and ensuring data is stored and secured when not in use. The Contractor and subcontractors will not perform any of the services from outside of the United States, and the Contractor will not allow any State of Florida data to be sent by any medium, transmitted, or accessed outside the United States due to Contractor’s action or inaction. In the event of a security breach involving State of Florida data, the Contractor shall give notice to the Customer and the Department within one business day. “Security breach” for purposes of this section will refer to a confirmed event that compromises the confidentiality, integrity, or availability of data. Once a data breach has been contained, the Contractor must provide the Department with a post-incident report documenting all containment, eradication, and recovery measures taken. The Department reserves the right in its sole discretion to enlist a third party to audit Contractor’s findings and produce an independent report, and the Contractor will fully cooperate with the third party. The Contractor will also comply with all HIPAA requirements and any other state and federal rules and regulations regarding security of information.
Data Security. The Provider agrees to utilize administrative, physical, and technical safeguards designed to protect Student Data from unauthorized access, disclosure, acquisition, destruction, use, or modification. The Provider shall adhere to any applicable law relating to data security. The provider shall implement an adequate Cybersecurity Framework based on one of the nationally recognized standards set forth in Exhibit “F”. Exclusions, variations, or exemptions to the identified Cybersecurity Framework must be detailed in an attachment. Additionally, Provider may choose to further detail its security programs and measures that augment or are in addition to the Cybersecurity Framework in Exhibit “F”. Provider shall provide, in the Standard Schedule to the DPA, contact information of an employee who XXX may contact if there are any data security concerns or questions.
Data Security. The Operator agrees to abide by and maintain adequate data security measures, consistent with industry standards and technology best practices, to protect Data from unauthorized disclosure or acquisition by an unauthorized person. The general security duties of Operator are set forth below. Operator shall further detail its security programs and measures in Exhibit F. These measures shall include, but are not limited to:
Data Security. The Contractor agrees to abide by and maintain adequate data security measures, consistent with standards and best practices within the educational technology industry, and to protect Student Data from unauthorized disclosure or acquisition by an unauthorized person. These measures shall include, but are not limited to:
Data Security. 2.1. We shall implement technical and organizational measures and safeguards that ensure the adequate protection of Customer Data, confidentiality, integrity, availability and resilience of processing systems and services and shall implement a process for regularly testing, assessing and evaluating the effectiveness of technical and organizational measures for ensuring the security of the Processing, as further specified at xxxxx://xxx.xxxxxxx.xxx/trust-center/. It shall be Your responsibility to familiarize Yourself with these measures and to assess whether they ensure a level of security appropriate to the risk.
AutoNDA by SimpleDocs
Data Security. Seller shall take all appropriate legal, organizational and technical measures to protect against unlawful and unauthorized processing of Personal Data or Apple Confidential Information ("Confidential Data"). Seller shall maintain reasonable operating standards and security procedures, and shall use its best efforts to secure Confidential Data through the use of appropriate physical and logical security measures including, but not limited to, appropriate network security and encryption technologies, and the use of reasonable user identification or password control requirements, including multiple-factor authentication, strong passwords, session time-outs, and other security procedures as may be issued from time to time by Apple. If requested by Apple at any time during the term of this Agreement, Seller shall provide Apple with a copy of Seller’s then current security policy. Seller shall promptly notify Apple if Seller knows or has reason to believe there has been any misuse, compromise, loss, or unauthorized disclosure or acquisition of, or access to, Confidential Data (“Information Security Breach”). Upon any discovery of an Information Security Breach, Seller will investigate, remediate, and mitigate the effects of the Information Security Breach, and provide Apple with assurances reasonably satisfactory to Apple that such Information Security Breach will not recur. Seller shall provide at Apple’s request information related to any such Information Security Breach, including but not limited to, vulnerabilities or flaws, start or end date, date of discovery, and specific actions taken to contain and/or mitigate. If any Information Security Breach occurs as a result of an act or omission of Seller or Seller Parties, Seller will, at Seller’s sole expense, undertake remedial measures (including notice, credit monitoring services, fraud insurance and the establishment of a call center to respond to customer inquiries) in accordance with Apple’s instructions.
Data Security. Section 3 (Data Security) of Article V (Data Provisions) of the SDPA is hereby amended by adding “industry standard” after “utilize” in the first sentence.
Data Security. The Provider agrees to maintain a comprehensive information security program that is reasonably designed to protect the security, privacy, confidentiality, and integrity of student personal information and makes use of appropriate administrative, technological, and physical safeguards. The general security duties of Provider are set forth below. These duties shall include, but are not limited to:
Time is Money Join Law Insider Premium to draft better contracts faster.