Security and Audit Sample Clauses

Security and Audit. 5.1. Sage shall implement and maintain appropriate technical and organisational security measures appropriate to the risks presented by the relevant Processing activity to protect the Personal Data against unauthorised or unlawful Processing and against accidental loss, destruction, damage or disclosure. Such measures include, without limitation, the security measures set out in clause 5.3.
AutoNDA by SimpleDocs
Security and Audit. 5.1. We shall implement and maintain appropriate technical and organisational security measures appropriate to the risks presented by the relevant Processing activity to protect the Personal Data against unauthorised or unlawful Processing and against accidental loss, destruction, damage or disclosure. Such measures include, without limitation, the security measures set out in clause 5.3 below.
Security and Audit. Licensor reserves the right to: - Embed security mechanisms within the Software Product to monitor, store and transmit information concerning usage in order to verify compliance with this License, being pointed out that such security mechanism: o Only reacts in case of non-compliance (use of an illegal copy). o Cannot access to proprietary data created by the Licensee through use of the Software Product (access to proprietary data that are created or modified or to result of creation or modification is impossible). - Use a hardware lock device, License administration software, or a License authorization key to control access to the Software Product. The Licensee may not take any steps to avoid, bypass or defeat the purpose of any such security measures. Use of the Software Product without the required lock device or without the authorization key provided by Licensor is prohibited. Licensor shall be entitled to audit the Licensee or have an audit performed on its behalf, during business hours, in order to verify that all conditions of the present License are respected. Licensor shall give prior notice at least three business days before said audit.
Security and Audit. 5.1 Heap may update the security measures set out in Schedule 2, including (where applicable) following any review by Heap of such measures, provided that such variation does not reduce the level of protection afforded to the Customer Personal Data by Heap under this DPA.
Security and Audit. 3.1 The Processor shall implement appropriate technical and organisational security measures to protect the Personal Data in accordance with Data Protection Law. The Processor shall particularly observe relevant codes of conduct, industry practice, and guidelines issued or approved by supervisory authorities.
Security and Audit. Customer will at all times have security provisions in place to protect the DMF from being visible, searchable, harvestable, or in any way discoverable on the World Wide Web, in compliance with this Agreement. Customer understands that any successful attempt by any person to gain unauthorized access to or use of the DMF provided by IRBsearch may result in immediate termination of Customer’s access. In addition, any successful attempt by any person to gain unauthorized access may under certain circumstances result in penalties as prescribed in 15 CFR § 1110.200 levied on Customer and the person attempting such access. Customer will take appropriate action to ensure that all persons accessing the Limited Access DMF obtained from IRBsearch are aware of their potential liability for misuse or attempting to gain unauthorized access. Any such access or attempted access is a breach, or attempted breach, of security and Customer must immediately report the same to NTIS at xxxxxxx@xxxx.xxx; and to IRBsearch by written notification to IRBsearch, LLC, 0000-X Xxxxxx Xxxxx, Tallahassee, FL 32301, and by email (xxxxxxxxxxxx@xxxxxxxxx.xxx) and by phone (0-000-000-0000). Customer agrees to be subject to audit by IRBsearch and/or NTIS to determine Customer’s compliance with the requirements of this Addendum, the Agreement, and CFR. Customer agrees to retain a list of all employees, contractors, and subcontractors to which it provides DMF and to make that list available to NTIS and/or IRBsearch as part of any audits conducted hereunder. Customer will not resell or otherwise redistribute DMF.
Security and Audit. 4.1. Processor shall implement appropriate technical and organizational measures for the security of the processing of Personal Data, in order to protect the Personal Data against unauthorised or unlawful processing and against accidental loss, destruction or damage. Taking into account the state of the art and the cost of their implementation, such measures shall ensure a level of security appropriate to the risks represented by the processing and the nature of the Personal Data. An overview of these technical and organisational measures shall be attached to this DPA as Exhibit 2.
AutoNDA by SimpleDocs
Security and Audit. The Contractor shall fully comply with any written instructions on information security matters (including IT Security Best Practices) that may be issued by A Company. The Contractor shall allow A Company or its appointed external auditors to conduct periodic audits at all locations and Site in which the Contractor is providing or has provided Services under this Agreement to ensure that there is proper controls and compliance with this Agreement. The Contractor shall co-operate with and provide support, information and assistance to A Company or its appointed external auditors for the purpose of such audits at no additional cost to A Company.
Security and Audit. 16.5.1 CAW shall implement and maintain appropriate technical and organisational security measures appropriate to the risks presented by the relevant Processing activity to protect the Customer Data against unauthorised or unlawful Processing and against accidental loss, destruction, damage, or disclosure. Such measures include, without limitation, the security measures set out in Annex 1.
Security and Audit. ACCESS shall notify COMPANY of, and COMPANY shall have the right to approve, upon reasonable prior notice to ACCESS, any affiliate or third party contractor, prior to its engagement by ACCESS to perform Services hereunder, review the books, records, policies and procedures of ACCESS, its affiliates and any affiliate or third party contractors that perform services under this Agreement, and conduct on-site audits and inspections during reasonable business hours, and if necessary, at a mutually agreeable time, after business hours, to ensure that ACCESS, its affiliates and any third party contractor is in full compliance with the terms of this Agreement, and with all of COMPANY’s policies and procedures relating to the safeguarding of Confidential Information, including without limitation, those tasks described in Exhibit B. Any audit or inspection hereunder shall be subject to the following limitations: (i) use of any third party auditor that is a competitor of ACCESS shall be subject to ACCESS’ prior written approval, such approval not to be unreasonably withheld or delayed; (ii) all audit results and disclosed records shall be held as ACCESS’ Confidential Information (as hereinafter defined) and shall not be used for any purpose except to verify ACCESS’ compliance with the terms of this Agreement and the accuracy of invoices; and (iii) COMPANY or any auditor conducting any such audit or inspection shall at all times comply with any and all reasonable security and confidentiality guidelines and other policies of ACCESS with respect to the audit.
Time is Money Join Law Insider Premium to draft better contracts faster.