Security and Data Privacy Each party will comply with applicable data privacy laws governing the protection of personal data in relation to their respective obligations under this Agreement. Where Siemens acts as Customer’s processor of personal data provided by Customer, the Data Privacy Terms available at xxxxx://xxx.xxxxxxx.xxx/dpt/sw, including the technical and organizational measures described therein, apply to the use of the relevant Offering and are incorporated herein by reference.
Card Information Updates and Authorizations If you have authorized a merchant to xxxx charges to your card on a recurring basis, it is your responsibility to notify the merchant in the event your card is replaced, your card information (such as card number and expiration date) changes, or the account associated with your card is closed. However, if your card is replaced or card information changes, you authorize us, without obligation on our part, to provide the updated card information to the merchant in order to permit the merchant to xxxx recurring charges to the card. You authorize us to apply such recurring charges to the card until you notify us that you have revoked authorization for the charges to your card. Your card is automatically enrolled in an information updating service. Through this service, your updated card information (such as card number and expiration date) may be shared with participating merchants to facilitate continued recurring charges. Updates are not guaranteed before your next payment to a merchant is due. You are responsible for making direct payment until recurring charges resume. To revoke your authorization allowing us to provide updated card information to a merchant, please contact us.
Information Integrity and Security Contractor shall immediately notify County of any known or suspected breach of personal, sensitive and confidential information related to Contractor’s work under this Agreement.
Data Security and Privacy 13.1 SERVICE PROVIDER acknowledges the importance of Data Security and agrees to adhere to the Terms and Conditions of the Data Security Policy of IIMC.
Data Security and Privacy Plan As more fully described herein, throughout the term of the Master Agreement, Vendor will have a Data Security and Privacy Plan in place to protect the confidentiality, privacy and security of the Protected Data it receives from the District. Vendor’s Plan for protecting the District’s Protected Data includes, but is not limited to, its agreement to comply with the terms of the District’s Bill of Rights for Data Security and Privacy, a copy of which is set forth below and has been signed by the Vendor. Additional components of Vendor’s Data Security and Privacy Plan for protection of the District’s Protected Data throughout the term of the Master Agreement are as follows:
Certifications and Audits Company shall promptly complete and return to BNYM any certifications which BNYM in its sole discretion may from time to time send to Company, certifying that Company is using the Licensed System in strict compliance with the terms and conditions set forth in this Agreement. BNYM may, at its expense and after giving reasonable advance written notice to Company, enter Company locations during normal business hours and audit Company’s utilization of the Licensed System, the number of copies of the Documentation in Company’s possession, and the scope of use and information pertaining to Company’s compliance with the provisions of this Agreement. The foregoing right may be exercised directly by BNYM or by delegation to an independent auditor acting on its behalf. If BNYM discovers that there is any unauthorized scope of use or that Company is not in compliance with the aforementioned provisions, Company shall reimburse BNYM for the full costs incurred in conducting the audit.
Security and Privacy 3. Security and privacy policies for the Genesys Cloud Service addressing use of Customer Data, which are incorporated by reference, are located at xxxxx://xxxx.xxxxxxxxxxx.xxx/articles/Genesys Cloud-security-compliance/.
Information Access and Audit Rights 25.1 Information Access 25.2 Reporting of Non-Force Majeure Events 25.3 Audit Rights 25.3.1 25.3.2 25.4 Audit Rights Periods
UNION SECURITY AND CHECKOFF 5:01 It shall be a condition of continued employment for all employees including probationary employees, as defined in Article 2, to become members and maintain membership in good standing in the Union.
Checks and Audits The parties of the agreement undertake to provide any detailed information requested by the European Commission, the National Agency of [country] or by any other outside body authorised by the European Commission or the National Agency of [country] to check that the mobility period and the provisions of the agreement are being properly implemented.