Data Security Policy Clause Samples

A Data Security Policy clause establishes the requirements and standards for protecting sensitive information handled by the parties to an agreement. It typically outlines the technical and organizational measures that must be implemented, such as encryption, access controls, and regular security audits, and may specify compliance with relevant laws or industry standards. By clearly defining these obligations, the clause helps prevent data breaches and ensures that both parties understand their responsibilities for safeguarding confidential or personal data.
Data Security Policy. Where it believes unauthorised and/or inappropriate use of the service’s information system or unacceptable or inappropriate behaviour may be taking place, the School will invoke its disciplinary procedure. If the School suspects that the system may be being used for criminal purposes or for storing unlawful text, imagery or sound, the matter will be brought to the attention of the relevant law enforcement organisation.
Data Security Policy. By using the website, apps, and services of Micro Benefits Limited (“Provider”), you, the Customer (“Customer”), acknowledge and agree that the Customer is and will remain the exclusive owner of all data provided to Provider (“Customer Data”) under this Data Security Policy (“Data Security Policy”). Provider will access, use, or otherwise handle Customer Data to perform the Services (“Hosted Services”) under the applicable SaaS Subscription Order Form (“SaaS Order Form”) or to perform other obligations expressly authorized under the Software as a Service Agreement (“SaaS Agreement”) and, in the case of users of the Provider’s apps, the End User License Agreement (“▇▇▇▇”). Except as expressly authorized under the SaaS Agreement and/or ▇▇▇▇, Provider will not collect, use, store or transmit any Customer Data unless Customer Data is encrypted, aggregated, anonymized, pseudonymized, or sanitized so that third parties viewing said data sets cannot ascribe the Customer Data to the Customer or individuals. Provider will keep and maintain Customer Data using such degree of care as is appropriate to avoid unauthorized use or disclosure of Customer Data. Provider will implement and maintain reasonable administrative, technical and physical safeguards to protect Customer Data, as appropriate to the nature and scope of Provider’s activities and Services. Provider will, on an ongoing basis, ensure that its information security program and safeguards are designed, maintained, updated and adjusted, as necessary, to protect against reasonably foreseeable internal and external risks to the security, confidentiality and integrity of Customer Data. Provider will only allow authorized persons with a need to handle Customer Data to perform Services or other obligations under this Agreement to access or handle Customer Data, and Provider will remain responsible for any handling of Customer Data within its custody or control by its Representatives. If Provider becomes aware, or reasonably believes, that Customer Data may have been accessed or acquired by an unauthorized party, Provider will promptly notify the Customer via the Customer’s primary business email contact(s). 1. Introduction 2. Change details [Insert full details of proposed Change]
Data Security Policy. Rev360 and Developer shall employ industry best practices, both technically and procedurally (including appropriate firewall technology), to protect Identified Data from unauthorized physical and electronic access. Developer shall limit access to Identified Data to those staff members with a well-defined business need. Developer shall provide and maintain user access controls to ensure that only authorized Developer employees have the ability to access Identified Data in accordance with this Agreement. Rev360 and Developer shall maintain adequate technical and procedural access controls and system security requirements and devices, in
Data Security Policy implement policy to review all active users to ensure all terminated users access are removed upon termination date.
Data Security Policy. The CITF Data Security Policy is included in Appendix C, below. The Data Security policy is intended to apply to CITF Researchers and to external Researchers that access CITF data. 5. Data access 5.1. Overview of CITF Data Access Tiers TIER 1: