Information Security and Data Privacy Sample Clauses
POPULAR SAMPLE Copied 1 times
Information Security and Data Privacy. (a) The Seller Entities have taken reasonable steps to safeguard the information technology systems utilized in their operation, including the implementation of procedures to ensure that such information technology systems are free from any disabling codes or instructions, timer, copy protection device, clock, counter or other limiting design or routing and any “back door,” “time bomb,” “trojan horse,” “worm,” “drop dead devices,” “virus,” or other software routines or hardware components that in each case permit unauthorized access or the unauthorized disablement or unauthorized erasure of data or other software by a third party, and to date there have been no successful unauthorized intrusions or breaches of the security of the information technology systems. The Seller Entities have dedicated the technical, administrative, budgetary and human resources reasonably necessary for maintenance of safe information security practices and to ensure compliance with all Laws related to data security. The Seller Entities have appropriate safeguards in place to oversee any vendors helping to safeguard the information technology systems utilized in the operation of the Company and the Company Subsidiaries.
(b) Each Seller Entity has complied with, and is presently in compliance with, all applicable Laws and such Seller Entity’s respective policies applicable to data privacy, data security or personal information. No Seller Entity has experienced any incident in which personal information or other sensitive data was or may have been stolen or improperly accessed, and, to the Seller’s Knowledge, there are no facts suggesting the likelihood of the foregoing, including any breach of security or receipt of any notices or complaints from any Person regarding personal information or other data. No notice, action or assertion has been received by any Seller Entity within the last three (3) years or has been filed, commenced or, to the Seller’s Knowledge, threatened against any Seller Entity alleging any violation of any Laws relating to data security.
Information Security and Data Privacy. (a) In the collection and Processing by the Acquired Companies of any Personal Data, the Acquired Companies and their Personal Data Processors and Personal Data Suppliers are in compliance with and have always complied with all applicable Privacy Commitments. The Acquired Companies operate appropriate technical and organizational security measures to prevent the unlawful Processing of Personal Data and unauthorized access, accidental loss or destruction of or damage to Personal Data in its possession or control, which measures are in compliance in all material respects with the Privacy Commitments. Without limiting the foregoing, the Acquired Companies and their Personal Data Suppliers have collected all Personal Data fairly and lawfully including acquiring all necessary consents from Data Subjects and otherwise have all requisite legal authority to Process, use and hold Personal Data in the manner it is Processed by the Acquired Companies or by any Personal Data Processor on their behalf without breaching any of the Privacy Commitments. The Acquired Companies have at all times respected all Data Subject opt-outs and consent withdrawals.
(b) To the extent that the Acquired Companies Process any financial account numbers (such as credit cards, bank accounts, PayPal accounts, debit cards), passwords, CCV data, or other related data, the Acquired Companies have implemented information security procedures, processes and systems that have at all times met all applicable Laws related to the Processing of cardholder data, including those established by applicable Governmental Entities, and the Payment Card Industry Standards Council (including the Payment Card Industry Data Security Standard).
(c) The Acquired Companies have at all times presented a Privacy Policy which complies with Privacy Laws to Data Subjects prior to the collection of any Personal Data, and no such Privacy Policy is or has been inaccurate, misleading or deceptive. None of the Acquired Companies have made any statement to the general public regarding any of their information security practices applicable to any Personal Information other than those made in the Company Privacy Policies. None of the Acquired Companies have collected or received any Personal Data online from children under the age of thirteen (13) without (where legally required) verifiable parental consent or directed any of its websites to children under the age of thirteen (13) through which such Personal Data could be obtain...
Information Security and Data Privacy. Target and the Transferred Partnerships have used commercially reasonable efforts to safeguard the information technology systems controlled by Target and the Transferred Partnerships and utilized in their business, and as of the Effective Date, to the Knowledge of Target and Holdings, there have been no successful unauthorized intrusions or breaches of security of such information technology systems.
Information Security and Data Privacy. The Company and its Subsidiary have used commercially reasonable efforts to safeguard the information technology systems controlled by the Company and its Subsidiary and utilized in their business, and as of the date hereof, to the Knowledge of the Company, there have been no successful unauthorized intrusions or breaches of security of such information technology systems, except where such intrusions or breaches would not have a Material Adverse Effect.
Information Security and Data Privacy. 7.17.1 The selected bidder will be responsible for providing secure systems. The selected bidder is expected to adhere to Information Security Management procedures as per acceptable standards with best practices.
7.17.2 The selected bidder shall be responsible for guarding the Systems against virus, malware, spyware and spam infections using the latest Antivirus corporate/Enterprise edition suites which include anti- malware, anti-spyware and anti-spam solution for the entire system. The vendor shall have to maintain strict privacy and confidentiality of all the data it gets access to.
Information Security and Data Privacy. (a) The Company Group is, and has been for the past three years in compliance, in all material respects, with the following Laws, in each case solely to the extent applicable to the Company Group and solely to the extent related to the collection, use, disclosure, and protection of Personal Information: (i) the Fair Credit Reporting Act (FCRA) of 1970, as amended; (ii) the Controlling the Assault of Non-Solicited Pornography and Marketing Act (CAN-SPAM); (iii) the Privacy Act of 1974, as amended; (iv) the Right to Financial Privacy Act of 1978, as amended; (v) the Privacy Protection Act of 1980, as amended; (vi) the Electronic Communications Privacy Act (ECPA) of 1986, as amended; (vii) the Video Privacy Protection Act (VPPA) of 1988, as amended; (viii) the Telephone Consumer Protection Act (TCPA) of 1991, as amended; (ix) the Telecommunications Act of 1996, as amended; (x) HIPAA; (xi) the Children’s Online Privacy Protection Act (COPPA) of 1998, as amended; (xii) the Financial Modernization Act (▇▇▇▇▇-▇▇▇▇▇-▇▇▇▇▇▇ Act (GLBA)) of 2000, as amended; (xiii) state Laws governing the use of electronic communications, e.g., email, text messaging, telephone, paging and faxing; and (xiv) state, Federal, and international Laws governing the processing of Personal Information, state, Federal, and international Laws requiring privacy disclosures to consumers, state, Federal, and international Personal Information breach notification Laws, state, Federal, and international Laws investing individuals with rights in or regarding Personal Information about such individuals and the use of such Personal Information, and any state, Federal, and International Laws regarding the safeguarding of Personal Information, including encryption (collectively, “Information Security and Data Privacy Laws”).
(b) The Company Group has an external-facing privacy policy regarding the collection, use and disclosure of Personal Information in connection with the operation of the business and is and has been in material compliance with such privacy policy for the past three years. None of the Company Group’s privacy statements or disclosures contained in such privacy policy have been or are materially misleading or deceptive. The transactions contemplated by this Agreement will not violate any privacy statements, other consumer-facing disclosures, or Data Protection Requirements. Except as would not reasonably be expected to result in liability material to the Company Group, taken as a whole,...
Information Security and Data Privacy. In addition to the foregoing, Supplier shall comply, and cause its Personnel to comply, with the Security Requirements (Schedule 3).
Information Security and Data Privacy
