Safeguarding of DIR Data Sample Clauses

Safeguarding of DIR Data. (a) Successful Respondent shall maintain a comprehensive data security program, which shall include reasonable and appropriate technical, organizational, and security measures against the destruction, loss, unauthorized access, or alteration of DIR Data in the possession of Successful Respondent, and which shall be:
AutoNDA by SimpleDocs
Safeguarding of DIR Data. (i) Service Provider shall maintain a comprehensive data security program, which shall include reasonable and appropriate technical, organizational and security measures against the destruction, loss, unauthorized access or alteration of DIR Data in the possession of Service Provider, and which shall be (A) no less rigorous than those maintained (or required to be maintained) by DIR or the relevant DIR Customer as of the Commencement Date (or required or implemented by DIR or the relevant DIR Customer in the future to the extent deemed necessary by DIR or such DIR Customer and communicated to Service Provider in accordance with Section 6.3(a)), (B) no less rigorous than those maintained by Service Provider for its own information of a similar nature (subject, however, to Section 11.5 and implementation through Change Control upon approval by DIR, as applicable, but without limiting Service Provider's obligations respecting Technology Evolution), (C) no less rigorous than accepted security standards in the industry (subject, however, to Section 11.5 and implementation through Change Control upon approval by DIR, as applicable, but without limiting Service Provider's obligations respecting Technology Evolution), and (D) (without limiting the Parties' obligations under Section 15.11) compliant with all applicable DIR Rules and DIR Standards, including the requirements of DIR's and the relevant DIR Customer's then- current privacy, security and records retention policies (such as Internal Revenue Service guidelines contained within IRS Publication 1075 (found at xxxx://xxx.xxx.xxx/pub/irs- pdf/p1075.pdf) and the rules pertaining to information technology security standards found at 1 Texas Administrative Code, Chapter 202). Service Provider acknowledges and agrees that certain DIR Customers are legally prohibited from disclosing or allowing access to certain DIR Data, including disclosures to and access by DIR, other DIR Customers and Service Provider. The content and implementation of such data security program and associated technical, organizational and security measures shall be fully documented by Service Provider in the Service Management Manual, including the process DIR Customers shall follow to identify DIR Data they are legally prohibited from disclosing and the confidentiality requirements of DIR Customers. Service Provider shall permit DIR Auditors to review such documentation and/or to inspect Service Provider's compliance with these provisions in...
Safeguarding of DIR Data and Section 6.3 DIR Personal Data, as applicable, each Receiving Party shall use at least the same degree of care to prevent disclosure, dissemination, and misuse of the disclosing Party's Confidential Information to third parties as the Receiving Party employs to avoid unauthorized disclosure, publication, dissemination, destruction, loss or alteration of its own information (or information of its customers) of a similar nature, but not less than reasonable care.
Safeguarding of DIR Data. (i) Service Provider shall maintain a comprehensive data security program, which shall include reasonable and appropriate technical, organizational and security measures against the destruction, loss, unauthorized access or alteration of DIR Data in the possession of Service Provider, and which shall be (A) no less rigorous than those maintained (or required to be maintained) by DIR or the relevant DIR Customer as of the Commencement Date (or required or implemented by DIR or the relevant DIR Customer in the future to the extent deemed necessary by DIR or such DIR Customer and communicated to Service Provider in accordance with Section 6.3(a)), (B) no less rigorous than those maintained by Service Provider for its own information of a similar nature (subject, however, to Section 11.5 and implementation through Change Control upon approval by DIR, as applicable, but without limiting Service Provider's obligations respecting Technology Evolution),

Related to Safeguarding of DIR Data

  • Safeguarding of Information 8(1) Where a Crown Servant or Government Contractor, by virtue of his position as such, has in his possession or under his control any document or other article which it would be an offence under any of the foregoing provisions of this Act for him to disclose without lawful authority he is guilty of an offence if –

  • CONFIDENTIALITY/SAFEGUARDING OF INFORMATION The CONTRACTOR shall not use or disclose any information concerning the AGENCY, or information that may be classified as confidential, for any purpose not directly connected with the administration of this contract, except with prior written consent of the AGENCY, or as may be required by law.

  • Safeguarding 2.10. The Local Authority has overarching responsibility for safeguarding and promoting the welfare of all children and young people in their area. They have a number of statutory functions under the 1989 and 2004 Children Acts which make this clear, and the ‘Working Together to Safeguard Children’ 2015 guidance1 sets these out in detail.

  • Safeguarding Information Not to use or disclose any information concerning a recipient of services under this contract for any purpose not in conformity with state and federal law except upon written consent of the recipient, or the responsible parent or guardian when authorized by law.

  • Information Safeguards Business Associate will develop, document, implement, maintain and use appropriate administrative, technical and physical safeguards to preserve the integrity and confidentiality of and to prevent non-permitted use or disclosure of PHI created for or received from Recipient or its Subsidiaries. These safeguards must be appropriate to the size and complexity of Business Associate’s operations and the nature and scope of its activities. Business Associate agrees that these safeguards will meet any applicable requirements set forth by the U.S. Department of Health and Human Services, including (as of the effective date or as of the compliance date, whichever is applicable) any requirements set forth in the final HIPAA security regulations. Business Associate agrees to mitigate, to the extent practicable, any harmful effect that is known to Business Associate resulting from a use or disclosure of PHI by Business Associate in violation of the requirements of this Addendum.

  • Customer Information CPNI of a Customer and any other non-public, individually identifiable information about a Customer or the purchase by a Customer of the services or products of a Party.

  • Confidentiality and Safeguarding Information 1. Each Party may have access to confidential information made available by the other. The provisions of the Florida Public Records Act, Chapter 119, F.S., and other applicable state and federal laws will govern disclosure of any confidential information received by the State of Florida.

  • Reporting of Unauthorized Disclosure The Contractor shall immediately report to the State any unauthorized disclosure of confidential information.

  • Confidentiality and Safeguarding of University Records; Press Releases; Public Information Under this Agreement, Contractor may (1) create, (2) receive from or on behalf of University, or (3) have access to, records or record systems (collectively, University Records). Among other things, University Records may contain social security numbers, credit card numbers, or data protected or made confidential or sensitive by Applicable Laws. [Option (Include if University Records are subject to FERPA.): Additional mandatory confidentiality and security compliance requirements with respect to University Records subject to the Family Educational Rights and Privacy Act, 20 United States Code (USC) §1232g (FERPA) are addressed in Section 12.41.] [Option (Include if University is a HIPAA Covered Entity and University Records are subject to HIPAA.): Additional mandatory confidentiality and security compliance requirements with respect to University Records subject to the Health Insurance Portability and Accountability Act and 45 Code of Federal Regulations (CFR) Part 160 and subparts A and E of Part 164 (collectively, HIPAA) are addressed in Section 12.26.] Contractor represents, warrants, and agrees that it will: (1) hold University Records in strict confidence and will not use or disclose University Records except as (a) permitted or required by this Agreement, (b) required by Applicable Laws, or (c) otherwise authorized by University in writing; (2) safeguard University Records according to reasonable administrative, physical and technical standards (such as standards established by the National Institute of Standards and Technology and the Center for Internet Security [Option (Include if Section 12.39 related to Payment Card Industry Data Security Standards is not include in this Agreement.):, as well as the Payment Card Industry Data Security Standards]) that are no less rigorous than the standards by which Contractor protects its own confidential information; (3) continually monitor its operations and take any action necessary to assure that University Records are safeguarded and the confidentiality of University Records is maintained in accordance with all Applicable Laws and the terms of this Agreement; and (4) comply with University Rules regarding access to and use of University’s computer systems, including UTS165 at xxxx://xxx.xxxxxxxx.xxx/board-of-regents/policy-library/policies/uts165-information-resources-use-and-security-policy. At the request of University, Contractor agrees to provide University with a written summary of the procedures Contractor uses to safeguard and maintain the confidentiality of University Records.

  • Other Confidential Consumer Information Party agrees to comply with the requirements of AHS Rule No. 08-048 concerning access to and uses of personal information relating to any beneficiary or recipient of goods, services or other forms of support. Party further agrees to comply with any applicable Vermont State Statute and other regulations respecting the right to individual privacy. Party shall ensure that all of its employees, subcontractors and other service providers performing services under this agreement understand and preserve the sensitive, confidential and non-public nature of information to which they may have access.

Time is Money Join Law Insider Premium to draft better contracts faster.