Common use of Data Security and Computer Access Clause in Contracts

Data Security and Computer Access. The roles and responsibilities of the Parties with respect to the security and control of Customer Data shall be set forth in Attachment 2-G to Exhibit 2. Supplier shall comply with Customer's information security policies, standards and procedures as set forth in Exhibit 12 (collectively, the "Data Safeguards"). Supplier shall modify the Services to comply with any changes in the Data Safeguards communicated to Supplier Party by Customer Party. Supplier shall perform such modification (and shall perform such modification as a Non-Chargeable Change, to the extent applicable, otherwise Customer shall pay for the performance of such modification pursuant to the Change Control Procedures and the issue escalation procedures set forth in Article 5 of Exhibit 9). If Supplier discovers or is notified of a failure to comply with the Data Safeguards, or of a breach or attempted breach of Customer's information security, Supplier Party shall promptly (but, in any event, within 24 hours): (1) notify Customer Party; and (2) if Supplier was responsible for the failure, breach or attempted breach, (a) investigate and cure such failure, breach or attempted breach and (b) provide satisfactory assurance to Customer Party that such failure, breach or attempted breach will not recur. Information relating to any such failure, breach or attempted breach shall be deemed the Confidential Information of Customer and shall not be disclosed by Supplier other than in accordance with this Agreement.

Appears in 2 contracts

Sources: Master Services Agreement (Broadridge Financial Solutions, Inc.), Information Technology Services Agreement (Broadridge Financial Solutions, Inc.)

Data Security and Computer Access. The roles and responsibilities of the Parties with respect to the security and control of Customer Data shall be set forth in Attachment 2-G to Exhibit 2. Supplier shall comply with Customer's the information security policies, standards and procedures as set forth in Exhibit 12 (collectively, the "Data Safeguards"). Supplier shall modify the Services to comply with any changes in the Data Safeguards communicated to Supplier Party by Customer Party. Supplier shall perform such modification (and shall perform such modification as a Non-Chargeable Change, to the extent applicable, otherwise Customer shall pay for the performance of such modification pursuant to the Change Control Procedures and the issue escalation procedures set forth in Article 5 of Exhibit 9)[****]. If Supplier discovers or is notified of a failure to comply with the Data Safeguards, or of a breach or attempted breach of Customer's ’s information security, Supplier Party shall promptly immediately (but, in any event, within 24 hours): [****]): (1) notify Customer Party; and (2) if to the extent Supplier was responsible for the failure, breach or attempted breach, (a) investigate investigate, deliver to Customer Party the results of the investigation and a corrective action plan, and cure such failure, breach or attempted breach and (b) provide satisfactory assurance to Customer Party that such failure, breach or attempted breach will not recur. Information relating to any such failure, breach or attempted breach shall be deemed the Confidential Information of Customer and shall not be disclosed by Supplier other than in accordance with this Agreement.

Appears in 1 contract

Sources: Sis Services Agreement (Broadridge Financial Solutions, Inc.)

Data Security and Computer Access. The roles and responsibilities of the Parties with respect to the security and control of Customer Data shall be set forth in Attachment 2-G to Exhibit 2. Supplier shall comply with Customer's ’s information security policies, standards and procedures as set forth in Exhibit 12 (collectively, the "Data Safeguards"). Supplier shall modify the Services to comply with any changes in the Data Safeguards communicated to Supplier Party by Customer Party. Supplier shall perform such modification (and shall perform such modification as a Non-Chargeable Change, to the extent applicable, otherwise Customer shall pay for the performance of such modification pursuant to the Change Control Procedures and the issue escalation procedures set forth in Article 5 of Exhibit 9). If Supplier discovers or is notified of a failure to comply with the Data Safeguards, or of a breach or attempted breach of Customer's ’s information security, Supplier Party shall promptly (but, in any event, within 24 hours): (1) notify Customer Party; and (2) if Supplier was responsible for the failure, breach or attempted breach, (a) investigate and cure such failure, breach or attempted breach and (b) provide satisfactory assurance to Customer Party that such failure, breach or attempted breach will not recur. Information relating to any such failure, breach or attempted breach shall be deemed the Confidential Information of Customer and shall not be disclosed by Supplier other than in accordance with this Agreement.

Appears in 1 contract

Sources: Information Technology Services Agreement (Broadridge Financial Solutions, Inc.)