Data Security Requirements Sample Clauses

Data Security Requirements. A. Data Transport. When transporting Confidential Information electronically, including via email, the data will be protected by:
AutoNDA by SimpleDocs
Data Security Requirements. D.1 USBFS must have well-documented procedures for information backup with validity checked on a periodic interval.
Data Security Requirements. Attachment E shall only apply if the Contractor serves 150 or more DSHS clients for the entity as a whole. COUNTY RETAINS THIS FORM Individual contractors and service providers must complete and sign
Data Security Requirements. Exhibit A shall only apply to the County if the County possesses 150 or more DSHS records across all programs or services throughout their organization, or transmits more than 5 records at one time.
Data Security Requirements. Company agrees at all times to comply with the applicable security requirements set forth in the User Manuals, as the same may be revised from time to time, as well as the data protection/security requirements imposed under federal, state and local laws, rules and regulations.
Data Security Requirements. Website Payments Pro, Advanced Credit and Debit Card Payments and Virtual Terminal enable you to accept payments online directly from debit and credit cards, which are payment instruments whose security depends on controlling the disclosure of Card Data. A person who has sufficient Card Data can send or receive a card payment charged to the cardholder’s account without necessarily having the cardholder’s authorisation for the payment. To prevent your Shared Customers from having their Card Data misused, you must keep Card Data secret at all times. The General Data Protection Regulation also requires you to keep a Shared Customer’s personal data secure. PayPal strongly recommends that you obtain the services of a competent professional expert in information security to advise you and assist in securing your website and any other points of sale. Principles of Data Security
Data Security Requirements. Without limiting Contractor’s obligation of confidentiality as further described in this Contract, Contractor must establish, maintain, and enforce a data privacy program and an information and cyber security program, including safety, physical, and technical security and resiliency policies and procedures, that comply with the requirements set forth in this Contract and, to the extent such programs are consistent with and not less protective than the requirements set forth in this Contract and are at least equal to applicable best industry practices and standards (NIST 800-53). Contractor also shall provide technical and organizational safeguards against accidental, unlawful, or unauthorized access or use, destruction, loss, alteration, disclosure, transfer, commingling, or processing of such information that ensure a level of security appropriate to the risks presented by the processing of County Data. Contractor personnel and/or subcontractor personnel and affiliates approved by County to perform work under this Contract may use or disclose County personal and confidential information only as permitted in this Contract. Any other use or disclosure requires express approval in writing by the County of Orange. No Contractor personnel and/or subcontractor personnel or affiliate shall duplicate, disseminate, market, sell, or disclose County personal and confidential information except as allowed in this Contract. Contractor personnel and/or subcontractor personnel or affiliate who access, disclose, market, sell, or use County personal and confidential information in a manner or for a purpose not authorized by this Contract may be subject to civil and criminal sanctions contained in applicable federal and state statutes. Contractor shall take all reasonable measures to secure and defend all locations, equipment, systems, and other materials and facilities employed in connection with the Services against hackers and others who may seek, without authorization, to disrupt, damage, modify, access, or otherwise use Contractor systems or the information found therein; and prevent County data from being commingled with or contaminated by the data of other customers or their users of the Services and unauthorized access to any of County data. Contractor shall also continuously monitor its systems for potential areas where security could be breached. In no case shall the safeguards of Contractor’s data privacy and information and cyber security program be less string...
AutoNDA by SimpleDocs
Data Security Requirements. At all times during the Term, Vivint will (i) host, maintain and store Vivint Solar Data in a manner consistent with its hosting, maintenance and storage of its own data of a similar nature in the twelve (12) months prior to the Effective Date and (ii) exercise the same level of care with respect to the security of the Vivint Solar Data that it applies to its own data of a similar nature, and in no event less than a reasonable standard of care.
Data Security Requirements. (a) The Sellers are in compliance in all material respects with all Data Protection Requirements to which the Business is subject with respect to the protection and security of Personal Data and confidential information of Sellers’ vendors, while such Personal Data or confidential information was or is in the possession or under the control of Sellers or its authorized agents and vendors.
Time is Money Join Law Insider Premium to draft better contracts faster.