DATA SECURITY AND PROTECTION. 6.1 The Recipient must use best practice methods to keep all Data which is in the power, possession or control of the Recipient secure and protected from unauthorised access, misuse, damage, destruction, unauthorised disclosure or modification, or theft.
Appears in 5 contracts
Samples: Access and Sharing Agreement, Access and Sharing Agreement, Access and Sharing Agreement