Information Security and Data Protection Sample Clauses

Information Security and Data Protection. Computershare shall comply with the provisions of Schedules 9 and 10 of the Side Agreement.
AutoNDA by SimpleDocs
Information Security and Data Protection. Each Party shall perform its obligations under this Agreement utilising security technologies and techniques in accordance with Applicable Laws and Good Industry Practice, including those relating to the prevention and detection of inappropriate use or access of Infrastructure or information including Personal Information and Confidential Information. Without limiting the generality of the foregoing, each Party shall implement and/or use network management and maintenance applications and tools and appropriate intrusion prevention, intrusion detection, identity management, and encryption technologies where reasonable and appropriate to do so. Each Party acknowledges the sensitive nature of the Personal Information to be exchanged under this Agreement and that where applicable some of the Personal Information may constitute Special Personal Information). Each Party shall ensure that its Staff shall not — Process the Personal Information in any manner or for any purpose other than to the extent strictly necessary to perform its obligations under this Agreement; and/or cause another Party to breach or contravene any applicable Data Protection Legislation or other Applicable Law. Each Party must notify the other Party immediately in the event of non-compliance or breach of any applicable Data Protection Legislation, who will in turn notify any affected Parties affected, in accordance with internal procedures. The Parties specifically record that all the Personal Information disclosed by a Party shall constitute Confidential Information of such Party. Each Party warrants and undertakes in favour of each of the other Parties that it shall at all times strictly comply with all Data Protection Legislation which may be in force from time to time. Without derogating from or limiting its further obligations in this Agreement, each Party further warrants that it shall ensure that all Infrastructure which it uses to provide, exchange or access any Personal Information, including all Infrastructure on which the Personal Information is Processed shall at all times be of a minimum standard required by Applicable Laws and Good Industry Practice. Neither Party shall transfer or Process any Personal Information of the other Party across the border of South Africa without the prior written consent of the Party and Data Subject who disclosed such Personal Information. Each Party shall take all reasonable and appropriate precautions necessary (having regard to Good Industry Pra...
Information Security and Data Protection. 3.1 Each Party shall perform its obligations under this Agreement utilising security technologies and techniques in accordance with Applicable Laws and Good Industry Practice, including those relating to the prevention and detection of inappropriate use or access of Infrastructure or information including Personal Information and Confidential Information.
Information Security and Data Protection. The following rules for information security and data protection related to the Service apply. • Assertion of absolute security in IT systems is impossible. The Provider is making every effort to maximize security level of users’ data and minimalize possible harm in the event of an incident. • The Provider will define and abide by an information security and data protection policy related to the service being provided. • The parties of the Agreement will meet all requirements of any relevant policy or procedure of the Provider10 and will comply with the applicable national legislations.
Information Security and Data Protection. The following rules for information security and data protection apply: ● The RP agrees to make every effort to maximise the security level of users’ data and minimise possible harm in the event of an incident. ● In the context of the GDPR regulations, the RP is having the role of the Data Controller and should take into account all the related requirements. ● The RP must define and abide by an Information Security and Data Protection policy related to the service being provided. The templates provided by the AARC Policy Development Kit (PDK)14 can be used as a basis. 12 xxxxx://xxxx.xxx.xx/wiki/Performance#Resource_infrastructure_Provider_performance 13 xxxxx://xxx.xxx.xx/ 14 xxxxx://xxxx-xxxxxxx.xx/policies/policy-development-kit/ ● The RP must enforce the EGI WISE Acceptable Usage Policies15. ● The RP shall comply with all principles set out by the GÉANT Data Protection Code of Conduct16 in its most current version, which will be made available to the RP by EGI Foundation upon request. ● This Information Security and Data Protection policy must meet all requirements of any relevant EGI policies or procedures17 and also must be compliant with the relevant national legislation. Regarding the EGI requirements, please refer to the following reference documentation: o EGI-doc-3015: e-Infrastructure Security Policy o EGI-doc-3601: Service Operations Security Policy o EGI-doc-2732: Policy on the Processing of Personal Data o EGI-doc-3600: Acceptable Use Policy and Conditions of Use o EGI-doc-2934: Security Traceability and Logging Policy o EGI-doc-2935: Security Incident Response Policy o EGI-doc-710: Security Incident Handling Procedure 8 Responsibilities
Information Security and Data Protection. The following rules for information security and data protection related to the Service apply. • Assertion of absolute security in IT systems is impossible. The Provider is making every effort to maximize security level of users’ data and minimalize possible harm in the event of an incident. • The Provider will define and abide by an information security and data protection policy related to the service being provided. • The parties of the Agreement will meet all requirements of any relevant policy or procedure of the Provider14 and will comply with the applicable national legislations. 13 xxxxx://xxxxxxxxx.xxx.xx/document/2748 14 xxxxx://xxx.xxx.xx/about/policy/policies_procedures.html 8 Responsibilities
Information Security and Data Protection. Humanity will implement and maintain reasonable administrative, physical and technical Information Security protocols and policies that are designed to prevent any unauthorized use, access, processing, destruction, loss, alteration, or disclosure of any of Customer’s data, including any employee-specific data supplied by Customer (“Customer Data”) as may be held or accessed by Humanity in its software. Humanity agrees that it will not sell, disclose, transfer, share or rent any Customer Data under any circumstances except, in each case, to an Affiliate of Humanity, as required,in connection with the Services. Additional information about Company security practices can be found at xxx.xxxxxxxx.xxx/xxxxxxxx.
AutoNDA by SimpleDocs
Information Security and Data Protection. The following rules for information security and data protection apply:  Assertion of absolute security in IT systems is impossible. The RC is making every effort to maximize security level of users’ data and minimalize possible harm in the event of an incident.  The RC must define and abide by an information security and data protection policy related to the service being provided.  This must meet all requirements of any relevant EGI policies or procedures13 and also must be compliant with the relevant national legislation.
Information Security and Data Protection. The Parties are responsible for safeguarding all information in accordance with all applicable federal and state laws and regulations, particularly Family Code § 17212, Welfare & Institutions Code § 11478.1, 26 USC § 6103, 42 USC § 654(26), Title 22 CFR §§ 111430 – 111440, and IRS Publication 1075.
Information Security and Data Protection. The following rules for information security and data protection apply: 12 xxxxx://xxxx.xxx.xx/wiki/Performance#Resource_infrastructure_Provider_performance  Assertion of absolute security in IT systems is impossible. The Provider is making every effort to maximize security level of users’ data and minimalize possible harm in the event of an incident.  The Provider must define and abide by an information security and data protection policy related to the service being provided.  This must meet all requirements of any relevant EGI policies or procedures13 and also must be compliant with the relevant national legislation.
Time is Money Join Law Insider Premium to draft better contracts faster.