Privacy and Security Measures Sample Clauses

Privacy and Security Measures. Contractor represents and warrants it has established and will maintain privacy and security measures that meet or exceed the standards set in laws, rules, and regulations applicable to the safeguarding, security, and privacy of Agency Data. Contractor shall monitor, periodically assess, and update its physical, technical, and logical security controls and risk to ensure continued effectiveness of those controls.
AutoNDA by SimpleDocs
Privacy and Security Measures. County represents and warrants it has established and will maintain privacy and security measures that meet or exceed the standards set in laws, rules, and regulations applicable to the safeguarding, security and privacy of Data, including Client Records, all Information Assets, regardless of the media, and all Network and Information Systems. County shall monitor, periodically assess, and update its security controls and risk to ensure continued effectiveness of those controls.
Privacy and Security Measures. The Member Information and Payment Information may be stored for internal purposes and The Factory reserves the right to access, monitor and retrieve information for compliance with this agreement. The Factory will not disclose any Member Information or Payment Information, except as described in this agreement and The Factory privacy policy accessible at xxx.xxxxxxxxxxxxx.xx/xxxxxxx-xxxxxx. The Factory will continue to keep in place of security measures in the effort to protect all Member Information and Payment Information held by The Factory from unauthorized use, access, disclosure, distribution, loss, or alteration. The Factory employees physical, administrative, contractual, and technological safeguards to protect member information and payment information. Access to Member Information and Payment Information will be restricted to authorized personnel who require the information in order to perform their duties and carry out this Agreement.
Privacy and Security Measures. You are responsiblefortaking all reasonable measures to safeguard Personal Information and for ensuring the security of any devices used to access CareConnect and all codes or passwords that enable access to CareConnect by Supervised Persons. In particular, You will:
Privacy and Security Measures. Geecko must collect certain information in order to operate this Website and to fulfill your requests or enable participation in certain online activities. But Geecko respects the privacy of its visitors, and is especially mindful of protecting the privacy of young children visiting our sites. Please visit our website xxxxx://xxxxxxx.xxxxxx.xxx to review our Privacy Policy. We have adopted reasonable security measures to protect against the loss, misuse, and alteration of the personal information under our control.
Privacy and Security Measures. The Department of Interior Architecture and Product Design may potentially collect information in order to operate the Website and to fulfill your requests or enable participation in certain online activities. But IAPD respects the privacy of its visitors, and is especially mindful of protecting the privacy of young children visiting our sites. We have adopted reasonable security measures, in concert with Kansas State University, to protect against the loss, misuse, and alteration of the personal information under our control. We use secure technologies to protect data, and adopt careful internal procedures to safeguard this information in our system. Nevertheless, we cannot guarantee complete security of personal information.
Privacy and Security Measures. Subrecipient represents and warrants it has established and will maintain privacy and security measures that meet or exceed the standards set in laws, rules, and regulations applicable to the safeguarding, security and privacy of Data, including Client Records, all Information Assets, regardless of the media, and all Network and Information Systems. Subrecipient shall monitor, periodically assess, and update its security controls and risk to ensure continued effectiveness of those controls.
AutoNDA by SimpleDocs
Privacy and Security Measures. ProTechnology must collect certain information in order to operate this Website and to fulfill your requests or enable participation in certain online activities. But ProTechnology respects the privacy of its visitors, and is especially mindful of protecting the privacy of people visiting our sites. Please click here to review our Privacy Policy.
Privacy and Security Measures. In this Agreement, you have agreed to take steps to protect your User Name, Password, personal health information including downloaded information. Once you have viewed information, it is your responsibility to protect it. Here are the recommended steps you should take to protect your information or, if you are a Proxy, the information of the individual who has granted you access to his or her personal health information (you may choose to take other steps as well):  Keep your User Name and Password confidential.  Sign out of your account every time when you are finished using the Portal (before closing the Internet browser window or computer you are using).Change your Password immediately if you believe that someone else knows your Password. If asked to “save your Password”, you should answer “no”. Passwords saved on a local computer or other device increase the risk of someone else accessing your Account.  Ensure that no one is “shoulder-surfing” or watching you when you are viewing your information. Choose a private space (like your home) in preference to a public space (e.g., on public transportation) to access the Portal. Avoid using free or untrusted wireless Internet (‘Wi-Fi’) to access the Portal. Free Wi-Fi is easily compromised.  Protect your health information (e.g., clinic notes and appointments) and general health information (like a pamphlet about a health condition) that you download or print.  Do not download documents to a public or shared computer. Store it in a safe location (like a locked cabinet or on a personal electronic device that is encrypted).

Related to Privacy and Security Measures

  • Privacy and Security (a) The Service Provider shall not transmit or store any AHS data outside the borders of Canada, nor transmit any AHS data in Canada to any party not specifically contemplated in this Agreement, without AHS’s prior written consent to each such data transmittal, which consent may be arbitrarily and unreasonably withheld.

  • Security Measures Lessee hereby acknowledges that the rental payable to Lessor hereunder does not include the cost of guard service or other security measures, and that Lessor shall have no obligation whatsoever to provide same. Lessee assumes all responsibility for the protection of the Premises, Lessee, its agents and invitees and their property from the acts of third parties.

  • Data Privacy and Security Bank will implement and maintain a written information security program, in compliance with all federal, state and local laws and regulations (including any similar international laws) applicable to Bank, that contains reasonable and appropriate security measures designed to safeguard the personal information of the Funds' shareholders, employees, trustees and/or officers that Bank or any Subcustodian receives, stores, maintains, processes, transmits or otherwise accesses in connection with the provision of services hereunder. In this regard, Bank will establish and maintain policies, procedures, and technical, physical, and administrative safeguards, designed to (i) ensure the security and confidentiality of all personal information and any other confidential information that Bank receives, stores, maintains, processes or otherwise accesses in connection with the provision of services hereunder, (ii) protect against any reasonably foreseeable threats or hazards to the security or integrity of personal information or other confidential information, (iii) protect against unauthorized access to or use of personal information or other confidential information, (iv) maintain reasonable procedures to detect and respond to any internal or external security breaches, and (v) ensure appropriate disposal of personal information or other confidential information. Bank will monitor and review its information security program and revise it, as necessary and in its sole discretion, to ensure it appropriately addresses any applicable legal and regulatory requirements. Bank shall periodically test and review its information security program. Bank shall respond to Customer's reasonable requests for information concerning Bank's information security program and, upon request, Bank will provide a copy of its applicable policies and procedures, or in Bank's discretion, summaries thereof, to Customer, to the extent Bank is able to do so without divulging information Bank reasonably believes to be proprietary or Bank confidential information. Upon reasonable request, Bank shall discuss with Customer the information security program of Bank. Bank also agrees, upon reasonable request, to complete any security questionnaire provided by Customer to the extent Bank is able to do so without divulging sensitive, proprietary, or Bank confidential information and return it in a commercially reasonable period of time (or provide an alternative response that reasonably addresses the points included in the questionnaire). Customer acknowledges that certain information provided by Bank, including internal policies and procedures, may be proprietary to Bank, and agrees to protect the confidentiality of all such materials it receives from Bank. Bank agrees to resolve promptly any applicable control deficiencies that come to its attention that do not meet the standards established by federal and state privacy and data security laws, rules, regulations, and/or generally accepted industry standards related to Bank's information security program. Bank shall: (i) promptly notify Customer of any confirmed unauthorized access to personal information or other confidential information of Customer ("Breach of Security"); (ii) promptly furnish to Customer appropriate details of such Breach of Security and assist Customer in assessing the Breach of Security to the extent it is not privileged information or part of an investigation; (iii) reasonably cooperate with Customer in any litigation and investigation of third parties reasonably deemed necessary by Customer to protect its proprietary and other rights; (iv) use reasonable precautions to prevent a recurrence of a Breach of Security; and (v) take all reasonable and appropriate action to mitigate any potential harm related to a Breach of Security, including any reasonable steps requested by Customer that are practicable for Bank to implement. Nothing in the immediately preceding sentence shall obligate Bank to provide Customer with information regarding any of Bank's other customers or clients that are affected by a Breach of Security, nor shall the immediately preceding sentence limit Bank's ability to take any actions that Bank believes are appropriate to remediate any Breach of Security unless such actions would prejudice or otherwise limit Customer's ability to bring its own claims or actions against third parties related to the Breach of Security. If Bank discovers or becomes aware of a suspected data or security breach that may involve an improper access, use, disclosure, or alteration of personal information or other confidential information of Customer, Bank shall, except to the extent prohibited by Applicable Law or directed otherwise by a governmental authority not to do so, promptly notify Customer that it is investigating a potential breach and keep Customer informed as reasonably practicable of material developments relating to the investigation until Bank either confirms that such a breach has occurred (in which case the first sentence of this paragraph will apply) or confirms that no data or security breach involving personal information or other confidential information of Customer has occurred. For these purposes, "personal information" shall mean (i) an individual's name (first initial and last name or first name and last name), address or telephone number plus (a) social security number, (b) driver's license number, (c) state identification card number, (d) debit or credit card number, (e) financial account 22 number, (f) passport number, or (g) personal identification number or password that would permit access to a person's account or (ii) any combination of the foregoing that would allow a person to log onto or access an individual's account. This provision will survive termination or expiration of the Agreement for so long as Bank or any Subcustodian continues to possess or have access to personal information related to Customer. Notwithstanding the foregoing "personal information" shall not include information that is lawfully obtained from publicly available information, or from federal, state or local government records lawfully made available to the general public.

  • PERSONAL INFORMATION PRIVACY AND SECURITY CONTRACT 11 Any reference to statutory, regulatory, or contractual language herein shall be to such language as in 12 effect or as amended.

  • Safeguarding and Protecting Children and Vulnerable Adults The Supplier will comply with all applicable legislation and codes of practice, including, where applicable, all legislation and statutory guidance relevant to the safeguarding and protection of children and vulnerable adults and with the British Council’s Child Protection Policy, as notified to the Supplier and amended from time to time, which the Supplier acknowledges may include submitting to a check by the UK Disclosure & Barring Service (DBS) or the equivalent local service; in addition, the Supplier will ensure that, where it engages any other party to supply any of the Services under this Agreement, that that party will also comply with the same requirements as if they were a party to this Agreement.

  • Safeguard Measures 1. The Parties note the multilateral negotiations pursuant to Article X of GATS on the question of emergency safeguard measures based on the principle of non- discrimination. Upon the conclusion of such multilateral negotiations, the Parties shall conduct a review for the purpose of discussing appropriate amendments to this Agreement so as to incorporate the results of such multilateral negotiations.

  • Electronic and Information Resources Accessibility and Security Standards a. Applicability: The following Electronic and Information Resources (“EIR”) requirements apply to the Contract because the Grantee performs services that include EIR that the System Agency's employees are required or permitted to access or members of the public are required or permitted to access. This Section does not apply to incidental uses of EIR in the performance of the Agreement, unless the Parties agree that the EIR will become property of the State of Texas or will be used by HHSC’s clients or recipients after completion of the Agreement. Nothing in this section is intended to prescribe the use of particular designs or technologies or to prevent the use of alternative technologies, provided they result in substantially equivalent or greater access to and use of a Product.

  • Safety Measures Employees working in any unsanitary or dangerous jobs shall be supplied with all the necessary tools, safety equipment, and protective clothing.

  • Access and Security Customer shall employ all physical, administrative and technical controls, screening and security procedures and other safeguards necessary to: (a) securely administer the distribution and use of all Access Credentials and protect against any unauthorized access to or use of the Hosted Services; and (b) control the content and use of Customer Data, including the uploading or other provision of Customer Data for Processing by the Hosted Services.

  • Security Safeguards (1) Each party acknowledges that it is solely responsible for determining and communicating to the other the appropriate technological, physical, and organizational security measures required to protect Personal Data.

Time is Money Join Law Insider Premium to draft better contracts faster.