Personal Identifying Information-Data Security Clause Samples

The Personal Identifying Information-Data Security clause establishes requirements for the protection and handling of personal data collected or processed under an agreement. It typically mandates that parties implement appropriate security measures to safeguard information such as names, addresses, social security numbers, or other identifiers from unauthorized access, disclosure, or misuse. By setting these standards, the clause helps ensure compliance with privacy laws and reduces the risk of data breaches, thereby protecting both individuals' privacy and the parties' legal interests.
Personal Identifying Information-Data Security. Personal identifying information, financial account information, or restricted City information, whether electronic format or hard copy, must be secured and protected at all times by Consultant or its subconsultants. At a minimum, Consultant or its subconsultants must encrypt or password-protect electronic files. This includes data saved to laptop computers, computerized devices, or removable storage devices. When personal identifying information, financial account information, or restricted City information, regardless of its format, is no longer necessary, the information must be redacted or destroyed through appropriate and secure methods that ensure the information cannot be viewed, accessed, or reconstructed. In the event that data collected or obtained by Consultant or its subconsultants in connection with this Agreement is believed to have been compromised, Consultant or its subconsultants must immediately notify City contact. Consultant agrees to reimburse City for any costs incurred by City to investigate potential breaches of this data and, where applicable, the cost of notifying individuals who may be impacted by the breach. Consultant agrees that the requirements of this Section must be incorporated into all subcontracts entered into by Consultant. It is further agreed that a violation of this Section must be deemed to cause irreparable harm that justifies injunctive relief in court. A violation of this Section may result in immediate termination of this Agreement without notice. The obligations of Consultant or its subconsultants under this Section must survive the termination of this Agreement.
Personal Identifying Information-Data Security. Personal identifying information, financial account information, or restricted County information, whether electronic forma to hard copy, must be secured and protected at all times. At a minimum, CMARE must encrypt and/or password protect electronic files. This includes data saved to laptop computers, computerized devices or removable storage devices. 6.4.2.1 When personal identifying information, financial account information, or restricted County information, regardless of its format, is no longer necessary, the information must be redacted or destroyed through appropriate and secure methods that ensure the information cannot be viewed, accessed, or reconstructed. 6.4.2.2 In the event that data collected or obtained by CMARE or its subcontractors in connection with this Contract is believed to have been compromised, CMARE or its subcontractors shall immediately notify the Project Manager. CMARE agrees to reimburse the County for any costs incurred by the County to investigate potential breaches of this data and, where applicable, the cost of notifying individuals who may be impacted by the breach. 6.4.2.3 CMARE agrees that the requirements of this Article shall be incorporated into all subcontracts entered into by CMARE. It is further agreed that a violation of this Article shall be deemed to cause irreparable harm that justifies injunctive relief in court. A violation of this Article may result in immediate termination of this Contract without notice. 6.4.2.4 The obligations of CMARE or its subcontractors under this Article shall survive the termination of this Contract.
Personal Identifying Information-Data Security. Personal identifying information, financial account information, or restricted AUTHORITY information, whether electronic forma to hard copy, must be secured and protected at all times. At a minimum, ▇▇▇▇ must encrypt and/or password protect electronic files. This includes data saved to laptop computers, computerized devices or removable storage devices. 6.3.2.1 When personal identifying information, financial account information, or restricted AUTHORITY information, regardless of its format, is no longer necessary, the information must be redacted or destroyed through appropriate and secure methods that ensure the information cannot be viewed, accessed, or reconstructed. 6.3.2.2 In the event that data collected or obtained by ▇▇▇▇ or its subconsultants or subcontractors in connection with this Contract is believed to have been compromised, ▇▇▇▇ or its subconsultants or subcontractors shall immediately notify the Project Manager. ▇▇▇▇ agrees to reimburse the AUTHORITY for any costs incurred by the AUTHORITY to investigate potential breaches of this data and, where applicable, the cost of notifying individuals who may be impacted by the breach. 6.3.2.3 ▇▇▇▇ agrees that the requirements of this section shall be incorporated into all subconsultants or subcontracts entered into by ▇▇▇▇. It is further agreed that a violation of this Section shall be deemed to cause irreparable harm that justifies injunctive relief in court. A violation of this Section may result in immediate termination of this Contract without notice. 6.3.2.4 The obligations of ▇▇▇▇ or its subconsultants or subcontractors under this Section shall survive the termination of this Contract.
Personal Identifying Information-Data Security. Personal identifying information, financial account information, or restricted County information, whether electronic forma to hard copy, must be secured and protected at all times. At a minimum, CM must encrypt and/or password protect electronic files. This includes data saved to laptop computers, computerized devices or removable storage devices. 6.4.2.1 When personal identifying information, financial account information, or restricted County information, regardless of its format, is no longer necessary, the information must be redacted or destroyed through appropriate and secure methods that ensure the information cannot be viewed, accessed, or reconstructed. 6.4.2.2 6.4.2.3 6.4.2.4

Related to Personal Identifying Information-Data Security

  • IDENTIFYING INFORMATION AND PRIVACY NOTIFICATION (a) FEDERAL EMPLOYER IDENTIFICATION NUMBER and/or FEDERAL SOCIAL SECURITY NUMBER. As a condition to NYSERDA’s obligation to pay any invoices submitted by Contractor pursuant to this Agreement, Contractor shall provide to NYSERDA its Federal employer identification number or Federal social security number, or both such numbers when the Contractor has both such numbers. Where the Contractor does not have such number or numbers, the Contractor must give the reason or reasons why the payee does not have such number or numbers.

  • Identifying Information Issuer and Broker acknowledge that a portion of the identifying information set forth on Exhibit A is being requested by NCPS in connection with the USA Patriot Act, Pub.L.107-56 (the “Act”). To help the government fight the funding of terrorism and money laundering activities, Federal law requires all financial institutions to obtain, verify, and record information that identifies each person who opens an account. For a non-individual person such as a business entity, a charity, a Trust, or other legal entity, we ask for documentation to verify its formation and existence as a legal entity. We may also ask to see financial statements, licenses, identification and authorization documents from individuals claiming authority to represent the entity or other relevant documentation.

  • Privacy and Personal Information (a) This clause 14 applies where this agreement amounts to a “service arrangement” under the Information Privacy Act 2009 (Qld). (b) For the purpose of this clause 14, Personal Information has the meaning given in the Information Privacy Act 2009 (Qld). (c) If the Recipient collects or has access to Personal Information in order to undertake the Activity, the Recipient must: (i) comply with Parts 1 and 3 of Chapter 2 of the Information Privacy Act 2009 (Qld) in relation to the discharge of its obligations under this agreement (including its obligations regarding Reports), as if the Recipient was the Department; (ii) ensure that Personal Information is protected against loss and against unauthorised access, use, modification, disclosure or other misuse; (iii) not use Personal Information other than for the purposes of undertaking the Activity, unless required or authorised by law; (iv) not disclose Personal Information without the consent of the Department, unless required or authorised by law; (v) not transfer Personal Information outside of Australia without the consent of the Department; (vi) ensure that access to Personal Information is restricted to those of the Recipient's employees and officers who require access in order to perform their duties; (vii) ensure that the Recipient's officers and employees do not access, use or disclose Personal Information other than in the performance of their duties; (viii) ensure that the Recipient's subcontractors who have access to Personal Information comply with obligations the same as those imposed on the the Recipient under this clause 14; (ix) fully co-operate with the Department to enable the Department to respond to applications for access to, or amendment of a document containing an individual’s Personal Information and to privacy complaints; and (x) comply with such other privacy and security measures as the Department reasonably advises the Recipient in writing from time to time. (d) The Recipient must immediately notify the Department on becoming aware of any breach, suspected breach or complaint alleging something that would, if proved, be a breach of clause 14(c) and provide full details of the breach, suspected breach or complaint. (e) On request by the Department, the Recipient must obtain from its Representatives engaged for the purposes of this agreement, an executed deed of privacy in a form acceptable to the Department.