Media preservation and protection Sample Clauses

Media preservation and protection. When a Contractor discovers a cyber incident has occurred, the Contractor shall preserve and protect images of all known affected information systems identified in paragraph (c)(1)(i) of this clause and all relevant monitoring/packet capture data for at least 90 days from the submission of the cyber incident report to allow DoD to request the media or decline interest.
AutoNDA by SimpleDocs
Media preservation and protection. When Xxxxxx discovers a cyber incident has occurred, Seller shall preserve and protect images of all known affected information systems identified in this clause and all relevant monitoring/packet capture data for at least 90 days from the submission of the cyber incident report to allow DoD to request the media or decline interest.

Related to Media preservation and protection

  • Preservation and Protection of Collateral (a) The Administrative Agent shall be under no duty or liability with respect to the collection, protection or preservation of the Collateral, or otherwise, beyond the use of reasonable care in the custody and preservation thereof while in its possession.

  • Data Protection All personal data contained in the agreement shall be processed in accordance with Regulation (EC) No 45/2001 of the European Parliament and of the Council on the protection of individuals with regard to the processing of personal data by the EU institutions and bodies and on the free movement of such data. Such data shall be processed solely in connection with the implementation and follow-up of the agreement by the sending institution, the National Agency and the European Commission, without prejudice to the possibility of passing the data to the bodies responsible for inspection and audit in accordance with EU legislation (Court of Auditors or European Antifraud Office (XXXX)). The participant may, on written request, gain access to his personal data and correct any information that is inaccurate or incomplete. He/she should address any questions regarding the processing of his/her personal data to the sending institution and/or the National Agency. The participant may lodge a complaint against the processing of his personal data with the [national supervising body for data protection] with regard to the use of these data by the sending institution, the National Agency, or to the European Data Protection Supervisor with regard to the use of the data by the European Commission.

  • Cybersecurity and Data Protection The Company and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are reasonably believed by the Company to be adequate in all material respects for, and operate and perform as required in connection with, the operation of the business of the Company and its Subsidiaries as currently conducted and, to the Company’s knowledge, are free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants, except as would not individually or in the aggregate reasonably be expected to result in a Material Adverse Effect. The Company and its Subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (“Personal Data”)) used in connection with the business of the Company and its Subsidiaries as currently conducted, and, to the knowledge of the Company, there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same, except for such failures as would not individually or in the aggregate reasonably be expected to result in a Material Adverse Effect. The Company and its Subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification, except for such failures as would not individually or in the aggregate reasonably be expected to result in a Material Adverse Effect.

  • Cybersecurity; Data Protection To the Company’s knowledge, the Company and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (collectively, the “Personal Data”)) used in connection with their businesses, and there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same, except in each case as would not reasonably be expected to have a Material Adverse Effect. The Company and its subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification.

  • Preservation and Disclosure of Lists The Trustee shall preserve, in as current a form as is reasonably practicable, all information as to the names and addresses of the Holders contained in the most recent list furnished to it as provided in Section 5.01 or maintained by the Trustee in its capacity as Note Registrar, if so acting. The Trustee may destroy any list furnished to it as provided in Section 5.01 upon receipt of a new list so furnished.

  • Privacy and Data Protection 8.1 The Receiving Party undertakes to comply with South Africa’s general privacy protection in terms Section 14 of the Xxxx of Rights in connection with this Bid and shall procure that its personnel shall observe the provisions of such Act [as applicable] or any amendments and re-enactments thereof and any regulations made pursuant thereto.

  • Whistleblower Protections and Trade Secrets Notwithstanding anything to the contrary contained herein, nothing in this Agreement prohibits Executive from reporting possible violations of federal law or regulation to any United States governmental agency or entity in accordance with the provisions of and rules promulgated under Section 21F of the Securities Exchange Act of 1934 or Section 806 of the Xxxxxxxx-Xxxxx Act of 2002, or any other whistleblower protection provisions of state or federal law or regulation (including the right to receive an award for information provided to any such government agencies). Furthermore, in accordance with 18 U.S.C. § 1833, notwithstanding anything to the contrary in this Agreement: (i) Executive shall not be in breach of this Agreement, and shall not be held criminally or civilly liable under any federal or state trade secret law (x) for the disclosure of a trade secret that is made in confidence to a federal, state, or local government official or to an attorney solely for the purpose of reporting or investigating a suspected violation of law, or (y) for the disclosure of a trade secret that is made in a complaint or other document filed in a lawsuit or other proceeding, if such filing is made under seal; and (ii) if Executive files a lawsuit for retaliation by the Company for reporting a suspected violation of law, Executive may disclose the trade secret to Executive’s attorney, and may use the trade secret information in the court proceeding, if Executive files any document containing the trade secret under seal, and does not disclose the trade secret, except pursuant to court order.

  • Survival of Protection The provisions of this Section 4 shall continue to afford protection to each Protected Person regardless of whether such Protected Person remains in the position or capacity pursuant to which such Protected Person became entitled to indemnification under this Section 4 and regardless of any subsequent amendment to this Agreement; provided, that no such amendment shall reduce or restrict the extent to which these indemnification provisions apply to actions taken or omissions made prior to the date of such amendment.

  • Right to Perform, Preserve and Protect If any Credit Party fails to perform any obligation hereunder or under any other Financing Document, Agent itself may, but shall not be obligated to, cause such obligation to be performed at Borrowers’ expense. Agent is further authorized by Borrowers and the Lenders to make expenditures from time to time which Agent, in its reasonable business judgment, deems necessary or desirable to (a) preserve or protect the business conducted by Borrowers, the Collateral, or any portion thereof, and/or (b) enhance the likelihood of, or maximize the amount of, repayment of the Loan and other Obligations. Each Borrower hereby agrees to reimburse Agent on demand for any and all costs, liabilities and obligations incurred by Agent pursuant to this Section 11.14. Each Lender hereby agrees to indemnify Agent upon demand for any and all costs, liabilities and obligations incurred by Agent pursuant to this Section 11.14, in accordance with the provisions of Section 11.6.

  • OWNERSHIP AND PROTECTION OF INFORMATION; COPYRIGHTS 6.1 All information, ideas, concepts, improvements, discoveries, and inventions, whether patentable or not, which are conceived, made, developed or acquired by Employee, individually or in conjunction with others, during Employee's employment by Employer (whether during business hours or otherwise and whether on Employer's premises or otherwise) which relate to Employer's business, products or services (including, without limitation, all such information relating to corporate opportunities, research, financial and sales data, pricing and trading terms, evaluations, opinions, interpretations, acquisition prospects, the identity of customers or their requirements, the identity of key contacts within the customer's organizations or within the organization of acquisition prospects, or marketing and merchandising techniques, prospective names, and marks) shall be disclosed to Employer and are and shall be the sole and exclusive property of Employer. Moreover, all drawings, memoranda, notes, records, files, correspondence, drawings, manuals, models, specifications, computer programs, maps and all other writings or materials of any type embodying any of such information, ideas, concepts, improvements, discoveries, and inventions are and shall be the sole and exclusive property of Employer.

Time is Money Join Law Insider Premium to draft better contracts faster.