Data Security Policies Sample Clauses

Data Security Policies. The Researcher and the Researcher’s Institution (where applicable) must have an information technology (IT) policy in place that addresses at a minimum the following items:  Logging and auditing of access to data and the computer network, with the inability for data users to delete logs;  Password protection of the personal computer or laptop with minimum password requirements as follows: o Policy must be updated every 90 days o Be at least seven characters o Must contain both alpha and numeric characters o must contain one capital letter o May not be the same as an of an individual’s previous four passwords  Virus and malware protection of the computer network;  Proper firewalls in place;  Auditable data destruction procedure;  Secure data backup procedure; and  Strong encryption on any portable device which may store or provide access to MSSNG Data.
AutoNDA by SimpleDocs
Data Security Policies. We agree to be bound by Your policies regarding data security applicable to “Custodians” under the UNT System Information Security Regulation 6.100, UNT System Information Security Policy 8.100 and the portions of the UNT System Security Handbook (2016) in addition to applicable federal regulation regarding data and information security, including, but not limited to the Family Education Rights and Privacy Act (FERPA), the Health Insurance Portability and Accountability Act (HIPAA), and the Xxxxx-Xxxxx-Xxxxxx Act (GLBA). 7B YOUR LIMITATIONS You are subject to constitutional and statutory limitations on Your ability to enter into certain terms and conditions of the Agreement, which may include those terms and conditions relating to: liens on Your property; disclaimers and limitations of warranties; disclaimers and limitations of liability for damages; waivers, disclaimers, and limitations on legal rights, remedies, requirements, and processes; limitations of time in which to bring legal action; granting control of litigation or settlement to another party; liability for acts or omissions of third parties; payment of attorney’s fees; dispute resolution; and indemnities. Terms and conditions relating to these limitations will only be binding on You to the extent permitted by the Constitution and the laws of the State of Texas.
Data Security Policies. The Company has adopted and maintained commercially reasonable security policies with respect to all personally identifiable, customer and payment information collected, received, or processed by the Company. The Company has maintained and followed such security policies in compliance in all material respects with all Applicable Laws and all applicable industry guidelines, including the Payment Card Industry Data Security Standards, as applicable. No breach or violation of any such security policies has occurred or is threatened, and there has been no unauthorized or illegal use of or access to any such data or information.

Related to Data Security Policies

  • Security Policies IBM maintains privacy and security policies that are communicated to IBM employees. IBM requires privacy and security training to personnel who support IBM data centers. We have an information security team. IBM security policies and standards are reviewed and re-evaluated annually. IBM security incidents are handled in accordance with a comprehensive incident response procedure.

  • Security Policy As part of PCI DSS, the Card Organizations require that you have a security policy that covers the security of credit card information.

  • Safety Policy Each employer is required by law to have a safety policy and program. TIR will ask for and may require a copy of that policy and program.

  • SPAM POLICY You are strictly prohibited from using the Website or any of the Company's Services for illegal spam activities, including gathering email addresses and personal information from others or sending any mass commercial emails.

  • Data Security and Privacy 12.1 SERVICE PROVIDER acknowledges the importance of Data Security and agrees to adhere to the Terms and Conditions of the Data Security Policy of IIMC.

  • Privacy Policies Each party will make available a Privacy Policy that complies with Law. Xxxxxx’s Privacy Policy explains how and for what purposes Stripe collects, uses, retains, discloses and safeguards the Personal Data you provide to Stripe.

  • Data Security and Privacy Plan As more fully described herein, throughout the term of the Master Agreement, Vendor will have a Data Security and Privacy Plan in place to protect the confidentiality, privacy and security of the Protected Data it receives from the District. Vendor’s Plan for protecting the District’s Protected Data includes, but is not limited to, its agreement to comply with the terms of the District’s Bill of Rights for Data Security and Privacy, a copy of which is set forth below and has been signed by the Vendor. Additional components of Vendor’s Data Security and Privacy Plan for protection of the District’s Protected Data throughout the term of the Master Agreement are as follows:

  • Network Security and Privacy Liability Insurance During the term of this Contract, Supplier will maintain coverage for network security and privacy liability. The coverage may be endorsed on another form of liability coverage or written on a standalone policy. The insurance must cover claims which may arise from failure of Supplier’s security resulting in, but not limited to, computer attacks, unauthorized access, disclosure of not public data – including but not limited to, confidential or private information, transmission of a computer virus, or denial of service. Minimum limits: $2,000,000 per occurrence $2,000,000 annual aggregate Failure of Supplier to maintain the required insurance will constitute a material breach entitling Sourcewell to immediately terminate this Contract for default.

  • Information Security Program (1) DTI shall implement and maintain a comprehensive written information security program applicable to the Personal Information ("Information Security Program") which shall include commercially reasonable measures, including, as appropriate, policies and procedures and technical, physical, and administrative safeguards that are consistent with industry standards, providing for (i) the security and confidentiality of the Personal Information, (ii) protection of the Personal Information against reasonably foreseeable threats or hazards to the security or integrity of the Personal Information, (iii) protection against unauthorized access to or use of or loss or theft of the Personal Information, and (iv) appropriate disposal of the Personal Information. Without limiting the generality of the foregoing, the Information Security Program shall provide for (i) continual assessment and re-assessment of the risks to the security of Personal Information acquired or maintained by DTI and its agents, contractors and subcontractors in connection with the Services, including but not limited to (A) identification of internal and external threats that could result in unauthorized disclosure, alteration or destruction of Personal Information and systems used by DTI and its agents, contractors and subcontractors, (B) assessment of the likelihood and potential damage of such threats, taking into account the sensitivity of such Personal Information, and (C) assessment of the sufficiency of policies, procedures, information systems of DTI and its agents, contractors and subcontractors, and other arrangements in place, to control risks; and (ii) appropriate protection against such risks.

  • Contractor and Employee Security Precautions A. The security aspects of working at the Correctional Facility are critical. The following security precautions are part of the site conditions and are a part of this Contract. All persons coming on the site in any way connected with this Work shall be made aware of them, and it is the (General) Contractor’s responsibility to check and enforce them.

Time is Money Join Law Insider Premium to draft better contracts faster.