Physical Security of Data Centers Sample Clauses

Physical Security of Data Centers. NetDocuments requires data center vendors to meet industry-standard physical security controls. NetDocuments conducts internal audits of all data centers annually, and all data centers are included in the scope of NetDocuments annual ISO 27001 certification audit.
AutoNDA by SimpleDocs

Related to Physical Security of Data Centers

  • Physical Security Contractor shall ensure that Medi-Cal PII is used and stored in an area that is physically safe from access by unauthorized persons during working hours and non- working hours. Contractor agrees to safeguard Medi-Cal PII from loss, theft or inadvertent disclosure and, therefore, agrees to:

  • Security of Data a. Each of the parties shall:

  • Physical and Environmental Security DST shall: (i) restrict entry to DST’s area(s) where Fund Confidential Information is stored, accessed, or processed solely to DST’s personnel or DST authorized third party service providers for such access; and (ii) implement commercially reasonable practices for infrastructure systems, including fire extinguishing, cooling, and power, emergency systems and employee safety.

  • Physical Safeguards USAC and the Department agree to maintain all automated matching records in a secured computer environment that includes the use of authorized access codes to restrict access. Those records will be maintained under conditions that restrict access to persons who need them for official duties related to the matching process. The user’s supervisor will ensure that USAC or the Department are notified when a user has departed or duties have changed so the user no longer needs access to the system, to ensure timely deletion of the user’s account and password.

  • Collection of Data The Insured acknowledges being informed that the Insurer processes his personal data in accordance with regulations relative to the protection of personal data in effect and that, moreover: - the answers to the questions asked are mandatory and that in the event of false declarations or omissions, the consequences for him may be invalidity of the subscription to the contract (article L 113-8 of the Insurance Code) or the reduction of indemnities (article L 113-9 of the Insurance Code), • The processing of personal data is necessary for acceptance and execution of its contract and its guarantees, for the management of commercial and contractual relationships, and for the execution of legal, regulatory or administrative provisions in effect. • The data collected and processed is kept for the period necessary for execution of the contract or the legal obligation. This data is then archived in accordance with the durations specified by the provisions relative to time limits. • The recipients of the data concerning him are, within the limits of their powers, the services of the Insurer in charge of signature, management and execution of the Insurance Contract and guarantees, its delegates, agents, partners, subcontractors and reinsurers, within the framework of their duties. It can also be sent, if necessary, to professional bodies as well as to all persons involved in the contract such as lawyers, experts, court officials and ministerial officers, trustees, guardians or investigators. Information concerning him may also be transmitted to the Underwriter, as well as to all persons authorized as Authorized Third Parties (courts, arbitrators, mediators, relevant ministries, supervisory and regulatory authorities and all public bodies authorized to receive it as well as departments in charge of control such as statutory auditors, auditors as well as departments in charge of internal control). • In its capacity as a financial organization, the Insurer is subject to the legal obligations resulting mainly from the Monetary and Financial Code with regard to money laundering and against the financing of terrorism and, as such, it monitors contracts, which may result in the drafting of a declaration of suspicion or a measure of freezing of assets. The data and documents concerning the Insured are kept for a period of five (5) years from the end of the contract or termination of the relationship. • His personal information will also be able to be used within the framework of processing to fight against insurance fraud, which may lead, if applicable, to placement on a list of persons presenting a risk of fraud. This registration may have the effect of extending examination of his case, or even the reduction or refusal of the benefit of a right, benefit, contract or service offered. In this context, personal data concerning him (or concerning persons or parties who are interested in the contract may be processed by any authorized persons working within the entities of the Insurer Group in the context of the fight against fraud. This data may also be intended for the authorized personnel of organizations directly concerned by fraud (other insurance organizations or intermediaries; judicial authorities, mediators, arbitrators, court officials, legal officers; third-party organizations authorized by a legal provision and, if applicable, victims of acts of fraud or their representatives). In the event of a fraud alert, the data is kept for a maximum of six (6) months to qualify the alert and then deleted, unless the alert is relevant. In the event of a relevant alert, the data is kept for up to five (5) years following closure of the fraud case, or until the end of the legal proceedings and the applicable limitation periods. For people registered on a list of suspected fraudsters, their data is deleted after 5 years from the date of placement on this list. • In its capacity as insurer, it is founded in carrying out the processing of data relative to violations, condemnations and measures of security, either at the time of subscription of the insurance contract, or during the period of execution, or within the framework of the handling of legal action. • Personal data may be used by the Insurer within the framework of processing implemented by the insurer, the purpose of which is research and development to improve the quality or relevance of its future insurance or assistance products and service offers • Personal data concerning him may be accessible to some of the Insurer's employees or service providers established in countries outside the European Union. • By proving his identity, the Insured has a right of access, rectification, deletion and opposition concerning the data processed. He also has the right to ask to limit the use of his data when it is no longer necessary, or to recover, in a structured format, the data that he has provided when it was necessary for the contract or when he consented to the use of this data. He has the right to provide instructions relative to the fate of his personal data after his death. These instructions, general or specific, concern the storage, removal and communication of his data after his death. These rights can be exercised with the Insurer's Data Protection Representative: - by email: sent to XXXX@XXXXXXXX.xx or - by postal mail: by writing to the following address: Délégué représentant à la protection des données – MUTUAIDE ASSISTANCE – 000, xxx xx xx Xxxxxx – 93196 Noisy le Grand. After having made a request to the Data Protection Representative without having received satisfaction, he has the possibility of contacting the CNIL (Commission Nationale de l'informatique et des Libertés).

  • Technical Security Controls 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.

  • Contractor Security Clearance Customers may designate certain duties and/or positions as positions of “special trust” because they involve special trust responsibilities, are located in sensitive locations, or have key capabilities with access to sensitive or confidential information. The designation of a special trust position or duties is at the sole discretion of the Customer. Contractor or Contractor’s employees and Staff who, in the performance of this Contract, will be assigned to work in positions determined by the Customer to be positions of special trust, may be required to submit to background screening and be approved by the Customer to work on this Contract.

  • Personnel Security 6.1 Staff recruitment in accordance with government requirements for pre- employment checks;

  • Preservation of Records The Assuming Bank agrees that it will preserve and maintain for the joint benefit of the Receiver, the Corporation and the Assuming Bank, all Records of which it has custody for such period as either the Receiver or the Corporation in its discretion may require, until directed otherwise, in writing, by the Receiver or Corporation. The Assuming Bank shall have the primary responsibility to respond to subpoenas, discovery requests, and other similar official inquiries with respect to the Records of which it has custody.

  • Protection of Data The Contractor agrees to store Data on one or more of the following media and protect the Data as described:

Time is Money Join Law Insider Premium to draft better contracts faster.