Data Security Plan Sample Clauses
A Data Security Plan clause outlines the requirements and procedures for protecting sensitive data handled under an agreement. It typically mandates that the parties implement specific security measures, such as encryption, access controls, and regular audits, to safeguard information from unauthorized access or breaches. This clause ensures that both parties are clear on their obligations to maintain data confidentiality and integrity, thereby reducing the risk of data loss or misuse.
Data Security Plan. The Contractor shall deliver and maintain a security incident plan in accordance with the criteria set forth in the Contractor’s privacy and security policy and shall implement the procedures required under such security incident plan on the occurrence of a Security incident, in compliance with the requirements of Texas Business and Commerce Code § 521.053 (“Notification Required Following Breach of Security of Computerized Data”). This plan shall be delivered in writing to the OAG within 14 Business Days following the award of this contract (Please refer to Form G Data Security Plan Outline). The contractor shall report, in writing, to the OAG any Security Incident within 24 hours after discovery. The report shall identify the nature of the event, a list of the affected individuals and the types of data, and the mitigation and investigation efforts of the Contractor. It shall also include the stages of the data security plan that has been implemented along with the next steps to mitigate the current and future risks. The contractor shall provide investigation updates to the OAG daily.
Data Security Plan. Please provide responses to the questions below. If further space is required, please use the final page.
Data Security Plan. Within a reasonable time after the Effective Date, State Street will implement, maintain and update a data security plan with respect to BTC Data provided to it that is consistent with the standards set forth in Exhibit E (which will include both physical and electronic measures) or, following the Effective Date, such other generally accepted industry standards as are reasonably likely to be as protective of BTC Data as Exhibit E, which standards shall be applicable to the parts within State Street that have access to BTC Data. Any changes to the safeguards in Exhibit E that are specifically designated as safeguards that State Street has agreed to adopt specifically for the BTC Recipients will require prior review and approval from the affected BTC Recipients, which approval shall not be unreasonably withheld.
Data Security Plan. Within a reasonable time after the Effective Date, State Street will implement, maintain and update a data security plan with respect to BGI Data provided to it that is consistent with the standards set forth in Exhibit E (which will include both physical and electronic measures) or, following the Effective Date, such other generally accepted industry standards as are reasonably likely to be as protective of BGI Data as Exhibit E, which standards shall be applicable to the parts within State Street that have access to BGI Data. Any changes to the safeguards in Exhibit E that are specifically designated as safeguards that State Street has agreed to adopt specifically for the BGI Recipients will require prior review and approval from the affected BGI Recipients, which approval shall not be unreasonably withheld.
Data Security Plan. Within a reasonable time after the Service Commencement Date, ▇.▇. ▇▇▇▇▇▇ will implement, maintain and update (on an annual basis) a data security plan with respect to Customer Data provided to it that is consistent with the standards set forth in the Security Principles (which will include both physical and electronic measures) or, following the Service Commencement Date, such other generally accepted industry standards as are reasonably likely to be as protective of Customer Data as the Security Principles, which standards shall be applicable to the parts within ▇.▇. ▇▇▇▇▇▇ that have access to Customer Data. Any changes to the safeguards in the Security Principles will require prior review and approval from the Customer.
