Data Security Policy Sample Clauses

Data Security Policy. The CITF Data Security Policy is included in Appendix C, below. The Data Security policy is intended to apply to CITF Researchers and to external Researchers that access CITF data.
AutoNDA by SimpleDocs
Data Security Policy. Where it believes unauthorised and/or inappropriate use of the service’s information system or unacceptable or inappropriate behaviour may be taking place, the School will invoke its disciplinary procedure. If the School suspects that the system may be being used for criminal purposes or for storing unlawful text, imagery or sound, the matter will be brought to the attention of the relevant law enforcement organisation. I have read and understood the Staff ICT Acceptable Use Policy Agreement Signed Print Name Date Accepted By
Data Security Policy. Rev360 and Developer shall employ industry best practices, both technically and procedurally (including appropriate firewall technology), to protect Identified Data from unauthorized physical and electronic access. Developer shall limit access to Identified Data to those staff members with a well-defined business need. Developer shall provide and maintain user access controls to ensure that only authorized Developer employees have the ability to access Identified Data in accordance with this Agreement. Rev360 and Developer shall maintain adequate technical and procedural access controls and system security requirements and devices, in
Data Security Policy implement policy to review all active users to ensure all terminated users access are removed upon termination date.
Data Security Policy. By using the website, apps, and services of Micro Benefits Limited (“Provider”), you, the Customer (“Customer”), acknowledge and agree that the Customer is and will remain the exclusive owner of all data provided to Provider (“Customer Data”) under this Data Security Policy (“Data Security Policy”). Provider will access, use, or otherwise handle Customer Data to perform the Services (“Hosted Services”) under the applicable SaaS Subscription Order Form (“SaaS Order Form”) or to perform other obligations expressly authorized under the Software as a Service Agreement (“SaaS Agreement”) and, in the case of users of the Provider’s apps, the End User License Agreement (“XXXX”). Except as expressly authorized under the SaaS Agreement and/or XXXX, Provider will not collect, use, store or transmit any Customer Data unless Customer Data is encrypted, aggregated, anonymized, pseudonymized, or sanitized so that third parties viewing said data sets cannot ascribe the Customer Data to the Customer or individuals. Provider will keep and maintain Customer Data using such degree of care as is appropriate to avoid unauthorized use or disclosure of Customer Data. Provider will implement and maintain reasonable administrative, technical and physical safeguards to protect Customer Data, as appropriate to the nature and scope of Provider’s activities and Services. Provider will, on an ongoing basis, ensure that its information security program and safeguards are designed, maintained, updated and adjusted, as necessary, to protect against reasonably foreseeable internal and external risks to the security, confidentiality and integrity of Customer Data. Provider will only allow authorized persons with a need to handle Customer Data to perform Services or other obligations under this Agreement to access or handle Customer Data, and Provider will remain responsible for any handling of Customer Data within its custody or control by its Representatives. If Provider becomes aware, or reasonably believes, that Customer Data may have been accessed or acquired by an unauthorized party, Provider will promptly notify the Customer via the Customer’s primary business email contact(s). Appendix 4 Sample Form of Change of Control (CCN)

Related to Data Security Policy

  • Security Policy As part of PCI DSS, the Card Organizations require that you have a security policy that covers the security of credit card information.

  • Security Policies IBM maintains privacy and security policies that are communicated to IBM employees. IBM requires privacy and security training to personnel who support IBM data centers. We have an information security team. IBM security policies and standards are reviewed and re-evaluated annually. IBM security incidents are handled in accordance with a comprehensive incident response procedure.

  • Data Security The Provider agrees to utilize administrative, physical, and technical safeguards designed to protect Student Data from unauthorized access, disclosure, acquisition, destruction, use, or modification. The Provider shall adhere to any applicable law relating to data security. The provider shall implement an adequate Cybersecurity Framework based on one of the nationally recognized standards set forth set forth in Exhibit “F”. Exclusions, variations, or exemptions to the identified Cybersecurity Framework must be detailed in an attachment to Exhibit “H”. Additionally, Provider may choose to further detail its security programs and measures that augment or are in addition to the Cybersecurity Framework in Exhibit “F”. Provider shall provide, in the Standard Schedule to the DPA, contact information of an employee who XXX may contact if there are any data security concerns or questions.

  • Safety Policy Each employer is required by law to have a safety policy and program. TIR will ask for and may require a copy of that policy and program.

  • Data Security and Privacy 12.1 SERVICE PROVIDER acknowledges the importance of Data Security and agrees to adhere to the Terms and Conditions of the Data Security Policy of IIMC.

  • Data Security and Privacy Plan As more fully described herein, throughout the term of the Master Agreement, Vendor will have a Data Security and Privacy Plan in place to protect the confidentiality, privacy and security of the Protected Data it receives from the District. Vendor’s Plan for protecting the District’s Protected Data includes, but is not limited to, its agreement to comply with the terms of the District’s Bill of Rights for Data Security and Privacy, a copy of which is set forth below and has been signed by the Vendor. Additional components of Vendor’s Data Security and Privacy Plan for protection of the District’s Protected Data throughout the term of the Master Agreement are as follows:

  • SPAM POLICY You are strictly prohibited from using the Website or any of the Company's Services for illegal spam activities, including gathering email addresses and personal information from others or sending any mass commercial emails.

  • Recoupment Policy Executive agrees that Executive will be subject to any compensation clawback or recoupment policies that may be applicable to Executive as an employee of the Company, as in effect from time to time and as approved by the Board or a duly authorized committee thereof, to comply with the Xxxx-Xxxxx Xxxx Street Reform and Consumer Protection Act.

  • Network Security and Privacy Liability Insurance During the term of this Contract, Supplier will maintain coverage for network security and privacy liability. The coverage may be endorsed on another form of liability coverage or written on a standalone policy. The insurance must cover claims which may arise from failure of Supplier’s security resulting in, but not limited to, computer attacks, unauthorized access, disclosure of not public data – including but not limited to, confidential or private information, transmission of a computer virus, or denial of service. Minimum limits: $2,000,000 per occurrence $2,000,000 annual aggregate Failure of Supplier to maintain the required insurance will constitute a material breach entitling Sourcewell to immediately terminate this Contract for default.

  • Pet Policy 🞎 Pets are prohibited 🞎 Up to pets are permitted The following pet requirements apply [insert requirements including type, size and quantity,ifapplicable: ] The above-described pet policy is a material provision of this Lease. Violation of the pet policy may lead to damages, deposit, and/or fees or additional rent assessed to Tenant and constitutes a default under this Lease.

Time is Money Join Law Insider Premium to draft better contracts faster.