Data Security Sample Clauses

Data Security. The Provider agrees to utilize administrative, physical, and technical safeguards designed to protect Student Data from unauthorized access, disclosure, acquisition, destruction, use, or modification. The Provider shall adhere to any applicable law relating to data security. The provider shall implement an adequate Cybersecurity Framework based on one of the nationally recognized standards set forth set forth in Exhibit “F”. Exclusions, variations, or exemptions to the identified Cybersecurity Framework must be detailed in an attachment to Exhibit “H”. Additionally, Provider may choose to further detail its security programs and measures that augment or are in addition to the Cybersecurity Framework in Exhibit “F”. Provider shall provide, in the Standard Schedule to the DPA, contact information of an employee who LEA may contact if there are any data security concerns or questions.
Data Security. The Contractor will maintain the security of State of Florida data including, but not limited to, maintaining a secure area around any displayed visible data and ensuring data is stored and secured when not in use. The Contractor and subcontractors will not perform any of the services from outside of the United States, and the Contractor will not allow any State of Florida data to be sent by any medium, transmitted, or accessed outside the United States due to Contractor’s action or inaction. In the event of a security breach involving State of Florida data, the Contractor shall give notice to the Customer and the Department within one business day. “Security breach” for purposes of this section will refer to a confirmed event that compromises the confidentiality, integrity, or availability of data. Once a data breach has been contained, the Contractor must provide the Department with a post-incident report documenting all containment, eradication, and recovery measures taken. The Department reserves the right in its sole discretion to enlist a third party to audit Contractor’s findings and produce an independent report, and the Contractor will fully cooperate with the third party. The Contractor will also comply with all HIPAA requirements and any other state and federal rules and regulations regarding security of information.
Data Security. 2.1. We shall implement technical and organizational measures and safeguards that ensure the adequate protection of Customer Data, confidentiality, integrity, availability and resilience of processing systems and services and shall implement a process for regularly testing, assessing and evaluating the effectiveness of technical and organizational measures for ensuring the security of the Processing, as further specified at xxxxx://xxx.xxxxxxx.xxx/trust-center/. It shall be Your responsibility to familiarize Yourself with these measures and to assess whether they ensure a level of security appropriate to the risk.
Data Security. Seller shall take all appropriate legal, organizational and technical measures to protect against unlawful and unauthorized processing of Personal Data or Apple Confidential Information ("Confidential Data"). Seller shall maintain reasonable operating standards and security procedures, and shall use its best efforts to secure Confidential Data through the use of appropriate physical and logical security measures including, but not limited to, appropriate network security and encryption technologies, and the use of reasonable user identification or password control requirements, including multiple-factor authentication, strong passwords, session time-outs, and other security procedures as may be issued from time to time by Apple. If requested by Apple at any time during the term of this Agreement, Seller shall provide Apple with a copy of Seller’s then current security policy. Seller shall promptly notify Apple if Seller knows or has reason to believe there has been any misuse, compromise, loss, or unauthorized disclosure or acquisition of, or access to, Confidential Data (“Information Security Breach”). Upon any discovery of an Information Security Breach, Seller will investigate, remediate, and mitigate the effects of the Information Security Breach, and provide Apple with assurances reasonably satisfactory to Apple that such Information Security Breach will not recur. Seller shall provide at Apple’s request information related to any such Information Security Breach, including but not limited to, vulnerabilities or flaws, start or end date, date of discovery, and specific actions taken to contain and/or mitigate. If any Information Security Breach occurs as a result of an act or omission of Seller or Seller Parties, Seller will, at Seller’s sole expense, undertake remedial measures (including notice, credit monitoring services, fraud insurance and the establishment of a call center to respond to customer inquiries) in accordance with Apple’s instructions.
Data Security. Section 3 (Data Security) of Article V (Data Provisions) of the SDPA is hereby amended by addingindustry standard” after “utilize” in the first sentence.
Data Security. (i) Except as would not, individually or in the aggregate, have or may reasonably be expected to have a Material Adverse Effect, the Company and each of its subsidiaries have complied and are presently in compliance with all internal and external privacy policies, contractual obligations, industry standards, applicable laws, statutes, judgments, orders, rules and regulations of any court or arbitrator or other governmental or regulatory authority and any other legal obligations, in each case, relating to the collection, use, transfer, import, export, storage, protection, disposal and disclosure by the Company or any of its subsidiaries of personal, personally identifiable, household, sensitive, confidential or regulated data (“Data Security Obligations,” and such data, “Data”); (ii) the Company and its subsidiaries have not received any notification of or complaint regarding and are unaware of any other facts that, individually or in the aggregate, would reasonably indicate non-compliance with any Data Security Obligation; and (iii) there is no action, suit or proceeding by or before any court or governmental agency, authority or body pending or, to the knowledge of the Company and its subsidiaries, threatened against the Company or any of its subsidiaries alleging non-compliance with any Data Security Obligation.
Data Security. (1) Contractor shall comply with the Data Safeguards. Contractor shall implement and maintain a comprehensive information security program (“Contractor’s Information Security Program”) in accordance with the Data Safeguards. Contractor shall comply with all applicable privacy and data security laws, and other laws (including the California Rules of Court) and regulations relating to the protection, collection, use, and distribution of JBE data, which includes, but may not be limited to Confidential Information, as well as privacy and data security requirements and standards set forth in the JBE’s policies or procedures. To the extent that California Rule of Court 2.505 applies to this Agreement, Contractor shall provide access and protect confidentiality of court records as set forth in that rule and in accordance with this Agreement. In addition to the foregoing, Contractor represents and warrants that Contractor complies with, and throughout the term of this Agreement, Contractor and its performance of its obligations under this Agreement shall be in compliance with, the current NIST (National Institute of Standards and Technology) Special Publication 800-53, including without limitation any NIST 800-53 standards, guidelines, or requirements for security controls or data security protocols.