Information Security and Privacy Sample Clauses

Information Security and Privacy. 1.1. Consultant understands and agrees that, in the performance of the services under this Agreement, Consultant may have access to private or confidential information owned or controlled by City and that such information may contain confidential or proprietary details, the disclosure of which to third parties may be damaging to City.
AutoNDA by SimpleDocs
Information Security and Privacy. Information security is concerned with ensuring that only data is protected against unauthorised use. When such information is personally identifiable or sensitive, privacy concerns must be addressed in respect to collection, storage, usage and retention. Security must be considered for processes on the management and control plane where outcomes of such processes result in permissions to access data plane. Cross-layer management and control potentially includes commercially sensitive (e.g. number of users accessing a content resource), personally identifiable (e.g. Xxxxx is interested in comedy films) and sensitive information (x.x. Xxxx visited location X, Y and Z between 10:00 and 11:00).
Information Security and Privacy. 4.1 Where the User is required to make use of a username, password or other security mechanism in order to use the software, the User shall notify Med-e-Mass in writing of any unauthorised or fraudulent use of such username, password or security mechanism. The User indemnifies and shall hold Med-e-Mass and its representatives harmless, from any claims, losses, damages and expenses caused by any unauthorised or fraudulent use of the User’s username, password or security mechanism.
Information Security and Privacy. 2.1. Contractor shall implement robust information security measures to protect all information utilized for the AI based solution, including but not limited to personal, confidential, or sensitive information. Contractor shall adhere to applicable information protection laws and regulations.
Information Security and Privacy. In accordance with Massachusetts regulation 201 CMR 17.00, if Contractor receives, stores, maintains, processes, or otherwise is permitted access to personal information through its provision of services under this Agreement, it shall comply with the provisions in the addendum attached hereto as Exhibit C.
Information Security and Privacy. 9.1 This contract is for services that require Contractor Personnel to have access to FDIC facilities and/or FDIC information (“access” includes access to FDIC information in hard copy (paper) format or electronic format via FDIC information systems). Therefore, Contractor shall adhere to the following:
Information Security and Privacy. 2.1. Vendor will install and maintain a VPN connection for use in troubleshooting and updating the payment application hardware and operating system.
AutoNDA by SimpleDocs
Information Security and Privacy. 9.1 Privacy. Customer shall execute the Data Processing Addendum (“DPA”) available here and incorporated herein by this reference. Failure by Customer to execute the DPA may be grounds for Aircall to terminate the Services and/or the Agreement immediately and with no liability to Aircall. Aircall takes its Customer’s privacy seriously and shall use information provided by Customer in accordance with the terms contained herein and in the Site’s privacy policy available at https:/ xxxxxxx.xx/xxxxxxx/ (the “Aircall Privacy Policy”). The Customer acknowledges and agrees that it may place any inquiry or other type of communication related to information security and/or privacy (including, but not limited to, requests for personal data access or deletion) at xxxxxxx@xxxxxxx.xx or at Aircall’s customer support portal. Such inquiries will be handled by Aircall in accordance with the applicable laws.
Information Security and Privacy. (a) Each party acknowledges that each other party may be required to comply with the information security standards required by the Xxxxx-Xxxxx-Xxxxxx Act (15 U.S.C. 6801, 6805(b)(1)), as amended, and the regulations issued thereunder (12 C.F.R. Part 40) (collectively, the “GLB Act”) or with other statutory or regulatory requirements (collectively, “Privacy Laws”) as well as its internal information security program for information protection. If applicable, each party shall make commercial best efforts to assist each other party to so comply and to conform to its own policies for information protection with applicable Privacy Laws, as amended from time to time. At the request of another party to this Agreement, the other parties hereto shall make commercially reasonable modifications to its information security program or to the procedures and practices thereunder to conform to such requesting party’s security requirements as they exist from time to time.
Information Security and Privacy. (a) The Company acknowledges that the Purchaser is required to comply with the information security standards required by the Xxxxx-Xxxxx-Xxxxxx Act (15 U.S.C. 6801, 6805(b)(1)), as amended, and the regulations issued thereunder (12 C.F.R. Part 40) (collectively, the “GLB Act”) and with other statutory and regulatory requirements (collectively, “Privacy Laws”) as well as its internal information security program for information protection. If applicable, the Company shall make commercially reasonable efforts to assist the Purchaser to so comply and to conform to its own policies for information protection with applicable Privacy Laws, as amended from time to time. At the Purchaser’s request, the Company shall make commercially reasonable modifications to its information security program or to the procedures and practices thereunder to conform to the Purchaser’s security requirements as they exist from time to time.
Time is Money Join Law Insider Premium to draft better contracts faster.