Information Security and Privacy Programs Sample Clauses

Information Security and Privacy Programs a. Information Security Program. Contractor must maintain a company-wide Information Security Program designed to evaluate Risks to the Confidentiality, Availability, and Integrity of the County Information covered under this Contract. Contractor’s Information Security Program must include the creation and maintenance of Information Security Policies, standards, and procedures. Information Security Policies, standards, and procedures will be communicated to all Contractor employees in a relevant, accessible, and understandable form and will be regularly reviewed and evaluated to ensure operational effectiveness, compliance with all applicable laws and regulations, and addresses new and emerging Threats and Risks. Contractor must exercise the same degree of care in safeguarding and protecting County Information that the Contractor exercises with respect to its own Information and Data, but in no event less than a reasonable degree of care. Contractor will implement, maintain, and use appropriate administrative, technical, and physical security measures to preserve the Confidentiality, Integrity, and Availability of County Information. Contractor’s Information Security Program must: • Protect the Confidentiality, Integrity, and Availability of County Information in the Contractor’s possession or control; • Protect against any anticipated Threats or hazards to the Confidentiality, Integrity, and Availability of County Information; • Protect against unauthorized or unlawful access, use, disclosure, alteration, or destruction of County Information; • Protect against accidental loss or destruction of, or damage to, County Information; and • Safeguard County Information in compliance with any applicable laws and regulations which apply to the Contractor.
AutoNDA by SimpleDocs
Information Security and Privacy Programs 

Related to Information Security and Privacy Programs

  • PERSONAL INFORMATION PRIVACY AND SECURITY CONTRACT 11 Any reference to statutory, regulatory, or contractual language herein shall be to such language as in 12 effect or as amended.

  • Privacy and Personal Information The American Express Privacy Policy Statement sets out policies on management of personal information. In accordance with the Privacy Act, you can access personal information about you held by us, and advise if you think it is inaccurate, incomplete or out-of-date. To arrange access to personal information about you, request a copy of the American Express Privacy Policy Statement or enquire generally about privacy matters, write to – The Privacy Officer, American Express Australia Limited, GPO Box 1582, Sydney NSW 2001. In this section ‘personal information’ means information about you, including your financial circumstances and the use and administration of the program. You agree that, subject to the Privacy Act, we and our agents may do the following:

  • Information Security Program (1) DTI shall implement and maintain a comprehensive written information security program applicable to the Personal Information ("Information Security Program") which shall include commercially reasonable measures, including, as appropriate, policies and procedures and technical, physical, and administrative safeguards that are consistent with industry standards, providing for (i) the security and confidentiality of the Personal Information, (ii) protection of the Personal Information against reasonably foreseeable threats or hazards to the security or integrity of the Personal Information, (iii) protection against unauthorized access to or use of or loss or theft of the Personal Information, and (iv) appropriate disposal of the Personal Information. Without limiting the generality of the foregoing, the Information Security Program shall provide for (i) continual assessment and re-assessment of the risks to the security of Personal Information acquired or maintained by DTI and its agents, contractors and subcontractors in connection with the Services, including but not limited to (A) identification of internal and external threats that could result in unauthorized disclosure, alteration or destruction of Personal Information and systems used by DTI and its agents, contractors and subcontractors, (B) assessment of the likelihood and potential damage of such threats, taking into account the sensitivity of such Personal Information, and (C) assessment of the sufficiency of policies, procedures, information systems of DTI and its agents, contractors and subcontractors, and other arrangements in place, to control risks; and (ii) appropriate protection against such risks.

  • Identifying Information and Privacy NOTIFICATION (a) Identification Number(s). Every invoice or New York State Claim for Payment submitted to a New York State agency by a payee, for payment for the sale of goods or services or for transactions (e.g., leases, easements, licenses, etc.) related to real or personal property must include the payee's identification number. The number is any or all of the following: (i) the payee’s Federal employer identification number, (ii) the payee’s Federal social security number, and/or (iii) the payee’s Vendor Identification Number assigned by the Statewide Financial System. Failure to include such number or numbers may delay payment. Where the payee does not have such number or numbers, the payee, on its invoice or Claim for Payment, must give the reason or reasons why the payee does not have such number or numbers.

  • Information Security IET information security management practices, policies and regulatory compliance requirements are aimed at assuring the confidentiality, integrity and availability of Customer information. The UC Xxxxx Cyber-safety Policy, UC Xxxxx Security Standards Policy (PPM Section 310-22), is adopted by the campus and IET to define the responsibilities and key practices for assuring the security of UC Xxxxx computing systems and electronic data.

  • Information Regarding Collateral Not effect any change (i) in any Loan Party’s legal name or in any trade name used to identify it in the conduct of its business or in the ownership of its properties, (ii) in the location of any Loan Party’s chief executive office, its principal place of business, any office in which it maintains books or records relating to Collateral owned by it or any office or facility at which any material Pari Passu Priority Collateral owned by it is located (including the establishment of any such new office or facility) other than changes in location to a property identified on Schedule 3.24, another property location previously identified on a Perfection Certificate Supplement or otherwise by notice to the Administrative Agent and the Collateral Agent, as to which the steps required by clause (B) below have been completed or to a Mortgaged Property or a leased property subject to a Landlord Access Agreement, (iii) in any Loan Party’s identity or organizational structure, (iv) in any Loan Party’s Federal Taxpayer Identification Number or organizational identification number, if any, or (v) in any Loan Party’s jurisdiction of organization (in each case, including by merging with or into any other entity, reorganizing, dissolving, liquidating, reorganizing or organizing in any other jurisdiction), until (A) it shall have given the Collateral Agent and the Administrative Agent not less than ten (10) Business Days’ prior written notice (in the form of an Officers’ Certificate) of its intention to do so, or such lesser notice period agreed to by the Administrative Agent and the Collateral Agent, clearly describing such change and providing such other information in connection therewith as the Collateral Agent or the Administrative Agent may reasonably request and (B) it shall have taken all action reasonably satisfactory to the Administrative Agent and the Collateral Agent to maintain the perfection and priority of the security interest of the Collateral Agent for the benefit of the Secured Parties in the Collateral, if applicable. Each Loan Party agrees to promptly provide the Administrative Agent and the Collateral Agent, upon request therefor, with certified Organizational Documents reflecting any of the changes described in the preceding sentence. For the purposes of the Regulation, (i) no U.K. Guarantor shall change its centre of main interest (as that term is used in Article 3(1) of the Regulation) from England and Wales, (ii) nor shall any Irish Guarantor change its centre of main interest from Ireland or Germany, nor shall Irish Guarantor have an “establishment” (as that term is used in Article 2(h) of the Regulation) in any jurisdiction other than Ireland or Germany, (iii) nor shall any Swiss Guarantor change its centre of main interest from Switzerland, nor shall any Swiss Guarantor have an “establishment” in any other jurisdiction, (iv) nor shall German Seller change its centre of main interest from Germany, (v) nor shall any Dutch Guarantor change its centre of main interest from the Netherlands, nor shall any Dutch Guarantor have an “establishment” in any other jurisdiction, (vi) nor shall any French Guarantor change its centre of main interest from France, nor shall any French Guarantor have an “establishment” in any other jurisdiction, (vii) nor shall any Belgian Guarantor change its centre of main interest from Belgium, nor shall any Belgian Guarantor have an “establishment” in any other jurisdiction and (viii) other than as provided in paragraph (ii) above, no Guarantor (to the extent such Guarantor is subject to the Regulation) shall have a centre of main interest other than as situated in its jurisdiction of incorporation.

  • Privacy of Customer Information (i) Seller’s Customer Information in the possession of Purchaser, other than information independently obtained by Purchaser and not derived in any manner from or using information obtained under or in connection with this Agreement, is and shall remain confidential and proprietary information of Seller. Except in accordance with this Section18(b), Purchaser shall not use any Seller’s Customer Information for any purpose, including the marketing of products or services to, or the solicitation of business from, customers, or disclose any Seller’s Customer Information to any Person, including any of Purchaser’s employees, agents or contractors or any third party not affiliated with Purchaser. Purchaser may use or disclose Seller’s Customer Information only to the extent necessary (1) for examination and audit of Purchaser’s activities, books and records by Purchaser’s regulatory authorities, (2) to protect or exercise Purchaser’s rights and privileges or (3) to carry out Purchaser’s express obligations under this Agreement and the other Program Documents (including providing Seller’s Customer Information to Takeout Buyers), and for no other purpose; provided that Purchaser may also use and disclose Seller’s Customer Information as expressly permitted by Seller in writing, to the extent that such express permission is in accordance with the Privacy Requirements. Purchaser shall take commercially reasonable steps to ensure that each Person to which Purchaser intends to disclose Seller’s Customer Information, before any such disclosure of information, agrees to keep confidential any such Seller’s Customer Information and to use or disclose such Seller’s Customer Information only to the extent necessary to protect or exercise Purchaser’s rights and privileges, or to carry out Purchaser’s express obligations, under this Agreement and the other Program Documents (including providing Seller’s Customer Information to Takeout Buyers). Xxxxxxxxx agrees to maintain an information security program and to assess, manage and control risks relating to the security and confidentiality of Seller’s Customer Information pursuant to such program in the same manner as Purchaser does in respect of its own customers’ information, and shall implement the standards relating to such risks in the manner set forth in the Interagency Guidelines Establishing Standards for Safeguarding Company Customer Information set forth in 12 CFR Parts 30, 168, 170, 208, 211, 225, 263, 308 and 364. Without limiting the scope of the foregoing sentence, Purchaser shall use at least the same physical and other security measures to protect all of Seller’s Customer Information in its possession or control as it uses for its own customers’ confidential and proprietary information.

  • Third-Party Information; Privacy or Data Protection Laws Each Party acknowledges that it and members of its Group may presently have and, following the Effective Time, may gain access to or possession of confidential or proprietary information of, or personal information relating to, Third Parties (i) that was received under confidentiality or non-disclosure agreements entered into between such Third Parties, on the one hand, and the other Party or members of such Party’s Group, on the other hand, prior to the Effective Time; or (ii) that, as between the two Parties, was originally collected by the other Party or members of such Party’s Group and that may be subject to and protected by privacy, data protection or other applicable Laws. Each Party agrees that it shall hold, protect and use, and shall cause the members of its Group and its and their respective Representatives to hold, protect and use, in strict confidence the confidential and proprietary information of, or personal information relating to, Third Parties in accordance with privacy, data protection or other applicable Laws and the terms of any agreements that were either entered into before the Effective Time or affirmative commitments or representations that were made before the Effective Time by, between or among the other Party or members of the other Party’s Group, on the one hand, and such Third Parties, on the other hand.

  • CONFIDENTIALITY AND PRIVACY POLICIES AND LAWS The Contractor shall comply to the extent applicable with all State and Authorized User policies regarding compliance with various confidentiality and privacy laws, rules and regulations, including but not limited to the IRS Publication 1075, Family Educational Rights and Privacy Act (FERPA), the Health Insurance and Portability Act of 1996 (HIPAA) and the Health Information Technology for Economic and Clinical Health Act (HITECH). Contractor shall cooperate in executing a written confidentiality agreement under FERPA and/or a Business Associate Agreement (HIPAA/HITECH) or other contractual provisions upon request by the State or any Authorized User.

  • Personal Information security breach Supplier/Service Provider’s Obligations

Time is Money Join Law Insider Premium to draft better contracts faster.