Information Security and Data Processing Sample Clauses

The Information Security and Data Processing clause establishes the requirements and standards for protecting sensitive data and managing how information is processed within the scope of an agreement. It typically outlines the security measures that must be implemented, such as encryption, access controls, and regular audits, and may specify how personal or confidential data should be handled, stored, or transferred. This clause is essential for ensuring compliance with data protection laws and safeguarding against unauthorized access or data breaches, thereby reducing the risk of liability and maintaining trust between the parties.
Information Security and Data Processing a) At all times during the term of this Agreement, we will implement and maintain appropriate administrative, physical, technical and organizational safeguards and security measures designed to protect against anticipated threats to the security, confidentiality or integrity of Customer Content. We will, at a minimum, maintain the security of Customer Content in accordance with the Jamf Information Security Schedule that is available at ▇▇▇▇▇://▇▇▇.▇▇▇▇.▇▇▇/trust-center/legal. We may amend the Jamf Information Security Schedule with written notice to you, provided that we will not modify it in a way that materially degrades or lessens the security measures we take. b) We will only process Personal Data in accordance with the performance of this Agreement, your instructions and applicable law, including Data Protection Laws. If applicable, the terms of the Jamf Data Processing Agreement for Customers found at ▇▇▇▇▇://▇▇▇.▇▇▇▇.▇▇▇/trust-center/legal will govern our processing of any Personal Data. c) Customer represents and warrants that it will not provide Jamf any special categories of Personal Data as defined by GDPR, any protected health information (as that term is used in the Health Insurance Portability and Accountability Act of 1996 (HIPAA) or any data that is subject to the Payment Card Information Data Security Standards.
Information Security and Data Processing. Vendor will implement and maintain industry standard administrative, physical, and technical safeguards to prevent any collection, use or disclosure of, or access to Confidential Information (including customers’ Personal Data, as defined in the Data Processing Agreement incorporated into this Agreement) other than access expressly authorized under this Agreement. Vendor will comply with the Data Processing Agreement incorporated into this Agreement.
Information Security and Data Processing. 4.1 Security. DocuSign will use commercially reasonable technical and organizational measures designed to prevent unlawful or unauthorized access, use, alteration, or disclosure of Customer Data or other Customer content in accordance with the provisions of DocuSign’s Security Attachment for DocuSign CLM attached to this Service Schedule. .
Information Security and Data Processing. At all times during the term of this Agreement, Jamf shall implement and maintain appropriate administrative, physical, technical and organizational safeguards and security measures designed to protect against anticipated threats to the security, confidentiality or integrity of Customer Content. Jamf shall only process Personal Information on behalf of and in accordance with Customer’s instructions and applicable law, including Data Protection Laws. Jamf self-certifies and complies with the EU-US Privacy Shield Framework, as administered by the United States Department of Commerce and will maintain its self-certification. To the extent necessary, the Parties shall enter into an appropriate and mutually agreed upon written agreement to satisfy cross-border transfer obligations relating to Personal Information that complies with Data Protection Laws. The Parties agree that Jamf does not require (or request that) Customer provide Jamf any Personal Information to use the Software or to receive the benefit of the Services, and that it is Customer’s choice alone to enter any Personal Information into the Software for the purpose of managing its Devices. Customer also has and is encouraged to use alternative methods to identify Devices managed with the Software, including by providing anonymous identifiers (e.g. Apple Mac serial no. xxx-xxx) that do not include or constitute Personal Information. In no event will Customer provide to Jamf any special categories of Personal Information as defined by GDPR.
Information Security and Data Processing. SpiderOak will use, at a minimum, industry- standard technical and administrative security measures to transfer, store, and process Customer Data. These measures are designed to protect the integrity of Customer Data and guard against the unauthorized or unlawful access to, use, and processing of Customer Data. Customer agrees that SpiderOak may transfer, store, and process Customer Data in the United States and locations other than Customer’s country. To the extent that Customer Data is subject to European Union data protection laws and is processed by SpiderOak as a data processor acting on Customer’s behalf (as a data controller), SpiderOak will use and process such Customer Data as Customer instructs in order to provide the Services and fulfill SpiderOak’s obligations under the Agreement. “Stored Data” means files and other data submitted to the Services by Customer or End Users. “Account Data” means account and contact information submitted to the Services by Customer or End Users. “Customer Data” means Stored Data and Account Data.