Data Security Policies and Procedures Sample Clauses

Data Security Policies and Procedures. Both parties shall establish data security policies and procedures to ensure compliance with this section that are designed to: (a) ensure the security and confidentiality of Customer Information; (b) protect against any anticipated threats or hazards to the security or integrity of such Customer Information; and (c) protect against unauthorized access to or uses of such Customer Information that could result in substantial harm or inconvenience to any customer. Further, Seller agrees, at its own expense, that it shall transfer Confidential Information, especially Cardholder Account information, to Purchaser in a secure fashion, which includes, but is not limited to, transferring the data electronically and in an encrypted format. If data cannot be transferred electronically, Seller and Purchaser shall arrange for Purchaser’s representative to travel and collect the data file at Seller’s expense. Seller agrees to indemnify and hold Purchaser harmless from all claims, damages or expenses related to the loss or unauthorized access resulting from the transfer of such Confidential Information by Seller to Purchaser.
AutoNDA by SimpleDocs
Data Security Policies and Procedures. Both parties shall establish data security policies and procedures to ensure compliance with this section that are designed to: (a) ensure the security and confidentiality of Customer Information; (b) protect against any anticipated threats or hazards to the security or integrity of such Customer Information; and (c) protect against unauthorized access to or uses of such Customer Information that could result in substantial harm or inconvenience to any customer.
Data Security Policies and Procedures. Both parties shall establish data security policies and procedures to ensure compliance with this section that are designed to: (a) ensure the security and confidentiality of Customer Information; (b) protect against any anticipated threats or hazards to the security or integrity of such Customer Information; and (c) protect against unauthorized access to or uses of such Customer Information that could result in substantial harm or inconvenience to any customer. Further, Seller agrees, at its own expense, that it shall transfer Confidential Information, especially Cardholder Account information, to Purchaser in a secure fashion, which includes, but is not limited to, transferring the data electronically and in an encrypted format. If data cannot be transferred electronically, Seller and Purchaser shall arrange for Purchaser’s representative to travel and collect the data file at Seller’s expense. Seller agrees to indemnify and hold Purchaser harmless from all claims, damages or expenses related to the loss or unauthorized access that occurs during the transfer of such Confidential Information by Seller to Purchaser. Seller shall not have any obligation to indemnify and hold Purchaser harmless from all claims, damages or expenses related to the loss or unauthorized access of such Confidential Information that occurs after the transfer of such Confidential Information to Purchaser.
Data Security Policies and Procedures. Both parties shall have established data security policies and procedures in place to ensure compliance with Requirements of Law that are designed to: (1) ensure the security and confidentiality of Customer Information; (2) protect against any anticipated threats or hazards to the security or integrity of such Customer Information; and (3) protect against unauthorized access to or uses of such Customer Information that could result in substantial harm or inconvenience to any customer. Further, as the sole creditor of the Accounts, Elan shall have a Business Continuity Plan and Disaster Recovery Plan in place, which shall, at a minimum, conform to generally accepted industry standards.

Related to Data Security Policies and Procedures

  • Policies and Procedures i) The policies and procedures of the designated employer apply to the employee while working at both sites.

  • Overpayment Policies and Procedures Within 90 days after the Effective Date, Xxxxx shall develop and implement written policies and procedures regarding the identification, quantification and repayment of Overpayments received from any Federal health care program.

  • Violence Policies and Procedures The Employer agrees to have in place explicit policies and procedures to deal with violence. The policy will address the prevention of violence, the management of violent situations, provision of legal counsel and support to employees who have faced violence. The policies and procedures shall be part of the employee's health and safety policy and written copies shall be provided to each employee. Prior to implementing any changes to these policies, the employer agrees to consult with the Association.

  • Compliance Policies and Procedures To assist the Fund in complying with Rule 38a-1 of the 1940 Act, BBH&Co. represents that it has adopted written policies and procedures reasonably designed to prevent violation of the federal securities laws in fulfilling its obligations under the Agreement and that it has in place a compliance program to monitor its compliance with those policies and procedures. BBH&Co will upon request provide the Fund with information about our compliance program as mutually agreed.

  • Company Policies and Procedures 7.1.1 The Company will ensure that Employees are able to readily access Company policies and procedures that apply to the Employees.

  • Policy and Procedures If the resident leaves the facility due to hospitalization or a therapeutic leave, the facility shall not be obligated to hold the resident’s bed available until his or her return, unless prior arrangements have been made for a bed hold pursuant to the facility’s “Bed Reservation Policy and Procedure” and pursuant to applicable law. In the absence of a bed hold, the resident is not guaranteed readmission unless the resident is eligible for Medicaid and requires the services provided by the facility. However, the resident may be placed in any appropriate bed in a semi-private room in the facility at the time of his or her return from hospitalization or therapeutic leave provided a bed is available and the resident’s admission is appropriate and meets the readmission requirements of the facility.

  • COMPLIANCE WITH POLICIES AND PROCEDURES During the period that Executive is employed with the Company hereunder, Executive shall adhere to the policies and standards of professionalism set forth in the policies and procedures of the Company and IAC as they may exist from time to time.

  • Security Policies IBM maintains privacy and security policies that are communicated to IBM employees. IBM requires privacy and security training to personnel who support IBM data centers. We have an information security team. IBM security policies and standards are reviewed and re-evaluated annually. IBM security incidents are handled in accordance with a comprehensive incident response procedure.

  • Policies and Practices The employment relationship between the Parties shall be governed by this Agreement and the policies and practices established by the Company and the Board of Directors (hereinafter referred to as the “Board”). In the event that the terms of this Agreement differ from or are in conflict with the Company’s policies or practices or the Company’s Employee Handbook, this Agreement shall control.

  • Safety and Security Procedures Contractor shall maintain and enforce, at the Contractor Work Locations, industry-standard safety and physical security policies and procedures. While at each Court Work Location, Contractor shall comply with the safety and security policies and procedures in effect at such Court Work Location.

Time is Money Join Law Insider Premium to draft better contracts faster.