System Security and Data Safeguards Sample Clauses

The System Security and Data Safeguards clause establishes requirements for protecting information systems and the data they process from unauthorized access, breaches, or misuse. It typically mandates the implementation of technical and organizational measures such as encryption, access controls, regular security assessments, and incident response protocols. By setting clear expectations for data protection, this clause helps prevent data loss or compromise, ensuring compliance with legal standards and maintaining trust between parties.
POPULAR SAMPLE Copied 3 times
System Security and Data Safeguards. When SAP is given access to Licensee’s systems and data, SAP shall comply with Licensee’s reasonable administrative, technical, and physical safeguards to protect such data and guard against unauthorized access. In connection with such access, Licensee shall be responsible for providing Consultants with user authorizations and passwords to access its systems and revoking such authorizations and terminating such access, as Licensee deems appropriate from time to time. Licensee shall not grant SAP access to Licensee systems or personal information (of Licensee or any third party) unless such access is essential for the performance of Services under the Agreement. The parties agree that no breach of this provision shall be deemed to have occurred in the event of SAP non-conformance with the aforementioned safeguard but where no personal information has been compromised.
System Security and Data Safeguards. When SAP is given access to Prime Contractor or Customer’s systems and data, SAP shall comply with Prime Contractor or Customer’s (as applicable) reasonable administrative, technical, and physical safeguards to protect such data and guard against unauthorized access. In connection with such access, Prime Contractor shall be responsible for providing SAP Consultants with user authorizations and passwords to access its systems and revoking such authorizations and terminating such access, as Prime Contractor deems appropriate from time to time. Prime Contractor shall ensure that Customer will be responsible for providing SAP Consultants with user authorizations and passwords to access its systems and revoking such authorizations and terminating such access, as Customer deems appropriate from time to time. Prime Contractor shall not grant SAP access to Prime Contractor systems or personal information (of Prime Contractor or any third party) unless such access is essential for the performance of Services under the Agreement and Prime Contractor shall ensure that Customer agrees to the same in relation to Customer systems or personal information (of Customer or any third party). The parties agree that no breach of this provision shall be deemed to have occurred in the event of SAP non-conformance with the aforementioned safeguard but where no personal information has been compromised.
System Security and Data Safeguards. 系统安全和数据保护。
System Security and Data Safeguards. When SAP is given access to Prime Contractor or Customer’s systems and data, SAP shall comply with Prime Contractor or Customer’s (as applicable) reasonable administrative, technical, and physical safeguards to protect such data and guard against unauthorized access. In connection with such access, Prime Contractor shall be responsible for providing SAP Consultants with user authorizations and passwords to access its systems and revoking such authorizations and terminating such access, as Prime Contractor deems appropriate from time to time. Prime Contractor shall ensure that Customer will be responsible for providing SAP Consultants with user authorizations and passwords to access its systems and revoking such authorizations and terminating such access, as Customer deems appropriate from time to time. Prime Contractor shall not grant SAP access to Prime Contractor systems
System Security and Data Safeguards. When SAP is given access to Licensee’s systems and data, SAP shall comply with Licensee’s reasonable administrative, technical, and physical safeguards to protect such data and guard against unauthorized access. In connection with such access, Licensee shall be responsible for providing SAP Consultants with user authorizations and passwords to access its systems and revoking such authorizations and terminating such access, as Licensee deems appropriate from time to time. Licensee shall not grant SAP access to Licensee systems or personal information (of Licensee or any third party) unless such access is essential for the performance of Services under the Agreement. The parties agree that no breach of this provision shall be deemed to have occurred in the event of SAP non-conformance with the aforementioned safeguard but where no personal information has been compromised. pemberian lisensi atau persetujuan yang diwajibkan oleh undang-undang lainnya, tanpa adanya persetujuan tertulis sebelumnya dari SAP, ▇▇▇ tidak akan memberikan Informasi Rahasia ke negara, individu atau badan usaha yang dilarang oleh undang-undang tersebut. Penerima Lisensi juga akan bertanggung jawab untuk mematuhi semua peraturan pemerintah yang berlaku di suatu negara di mana Penerima Lisensi terdaftar, ▇▇▇ setiap negara asing yang terkait dengan penggunaan Informasi Rahasia oleh Penerima Lisensi ▇▇▇/atau anak-anak perusahaan atau pengguna resminya.
System Security and Data Safeguards. When SAP is given access to Customer’s systems and data, SAP shall comply with Customer’s reasonable administrative, technical, and physical safeguards to protect such data and guard against unauthorized access. In connection with such access, Customer shall be responsible for providing SAP Consultants with user authorizations and passwords to access its systems and revoking such authorizations and terminating such access, as Customer nie sú podpísané oprávnenými signatármi strán. Predchádzajúce ustanovenie sa vzťahuje aj na akékoľvek zrieknutie sa požiadavky na písomnú formu. Všade tam, kde sa v tomto Článku alebo na iných miestach v tejto Zmluve alebo v tomto Rozsahu prác požaduje písomná forma, možno ▇▇▇▇ ▇▇▇▇▇▇▇▇▇▇ ▇▇▇▇▇▇▇▇▇ ▇▇ splnenú, ak sa použije fax, výmena listových zásielok alebo iná písomná forma (s výnimkou e-mailov).
System Security and Data Safeguards. When SAP is given access to Licensee’s systems and data, SAP shall comply with Licensee’s reasonable administrative, technical, and physical safeguards to protect such data and guard against unauthorized access. In connection with such access, Licensee shall be responsible for providing SAP’s staff members with user authorizations and passwords to access its systems and revoking such authorizations and terminating such access, as Licensee deems appropriate from time to time. Licensee shall not grant SAP access to Licensee systems or personal information (of Licensee or any third party) unless such access is essential for the performance of Services under the Agreement. The parties agree that no breach of this provision shall be deemed to have occurred in the event of SAP non- conformance with the aforementioned safeguard but where no personal information has been compromised. In the event that Licensee will disclose to SAP any database or other material containing personal data, Licensee shall act as a “Administrator” and respect all statutory duties under Act No. 101/2000 Coll., on Personal Data Protection, as amended. For the sake of certainty, SAP shall not, under this agreement, process any personal data. Should Licensee require such processing, the Parties may conclude a separate agreement on personal data processing; otherwise such processing shall not be possible.
System Security and Data Safeguards. When SAP is given access to Prime Contractor or Customer’s systems and data, SAP shall comply with Prime Contractor or Customer’s (as applicable) reasonable administrative, technical, and physical safeguards to protect such data and guard against unauthorized access. In connection with such access, Prime Contractor shall be responsible for providing SAP Consultants with user authorizations and passwords to access its systems and revoking such authorizations and terminating such access, as Prime Contractor deems appropriate from time to time. Prime Contractor shall ensure that Customer will be responsible for providing SAP Consultants with user authorizations and passwords to access its systems and revoking such authorizations and terminating such access, as Customer deems appropriate from time to time. Prime Contractor shall not grant SAP access to Prime Contractor systems or personal information (of Prime Contractor or any third party) unless such access is essential for the performance of Services under the Agreement and Prime Contractor shall ensure that Customer agrees to the same in relation to Customer systems or personal information (of Customer or any third party). The parties agree that no breach of this provision shall be deemed to have occurred in the event of SAP non-conformance with the aforementioned safeguard but where no personal information has been compromised. undang pengendalian ekspor sejumlah negara, termasuk namun tidak terbatas pada undang- undang Amerika Serikat, ▇▇▇▇▇▇ ▇▇▇ Indonesia. Kontraktor Utama menyetujui bahwa pihaknya tidak akan, ▇▇▇ akan memastikan bahwa Pelanggan menyetujui bahwa pihaknya juga tidak akan menyerahkan Layanan SAP, Produk Kerja, Deliverables, ▇▇▇ ▇▇▇▇▇▇ SAP lainnya atau Informasi Rahasia SAP kepada instansi pemerintah mana pun untuk pertimbangan pemberian lisensi atau persetujuan yang diwajibkan oleh undang- undang lainnya, tanpa adanya persetujuan tertulis sebelumnya dari SAP, ▇▇▇ tidak akan memberikan Informasi Rahasia ke negara, individu atau badan ▇▇▇▇▇ ▇▇▇▇ dilarang oleh undang-undang tersebut. Kontraktor Utama juga harus bertanggung jawab untuk mematuhi semua regulasi ▇▇▇ undang-undang pemerintah yang berlaku di suatu negara di mana Kontraktor Utama terdaftar, ▇▇▇ setiap negara asing terkait dengan penggunaan Informasi Rahasia ▇▇▇ pemberian Data Pelanggan oleh Kontraktor Utama ▇▇▇/atau anak-anak perusahaannya, Pelanggan ▇▇▇/atau anak-anak perusahaannya, atau pengguna resminya.

Related to System Security and Data Safeguards

  • Security Safeguards Contractor shall store and process District Data in accordance with commercial best practices, including implementing appropriate administrative, physical, and technical safeguards that are no less rigorous than those outlined in SANS Top 20 Security Controls, as amended, to secure such data from unauthorized access, disclosure, alteration, and use. Contractor shall ensure that all such safeguards, including the manner in which District Data is collected, accessed, used, stored, processed, disposed of and disclosed, comply with all applicable federal and state data protection and privacy laws, regulations and directives, including without limitation C.R.S. § ▇▇-▇▇-▇▇▇ et seq., as well as the terms and conditions of this Addendum. Without limiting the foregoing, and unless expressly agreed to the contrary in writing, Contractor warrants that all electronic District Data will be encrypted in transmission and at rest in accordance with NIST Special Publication 800-57, as amended.

  • Data Security and Privacy Except as would not, individually or in the aggregate, reasonably be expected to be material to the business of the Company Group, taken as a whole, the Company and each of its Subsidiaries (i) is in compliance with all Data Security Requirements and (ii) has taken commercially reasonable steps consistent with standard industry practice by companies of similar size and maturity, and in compliance in all material respects with all Data Security Requirements to protect (A) the confidentiality, integrity, availability and security of its Business Systems that are involved in the Processing of Personally Identifiable Information, in the conduct of the business of the Company and its Subsidiaries as currently conducted; and (B) Personally Identifiable Information Processed by or on behalf of the Company or such Subsidiary or on their behalf from unauthorized use, access, disclosure, theft and modification. Except as would not, individually or in the aggregate, reasonably be expected to be material to the business of the Company Group, taken as a whole, (i) there are, and since January 1, 2022, have been, no pending complaints, investigations, inquiries, notices, enforcement proceedings, or Actions by or before any Governmental Authority and (ii) since January 1, 2022, no fines or other penalties have been imposed on or written claims, notice, complaints or other communications have been received by the Company or any Subsidiary, relating to any Specified Data Breach or alleging non-compliance with any Data Security Requirement. The Company and each of its Subsidiaries have not, since January 1, 2022, (1) experienced any Specified Data Breaches, or (2) been involved in any Legal Proceedings related to or alleging any violation of any Data Security Requirements by the Company Group or any Specified Data Breaches, each except as would not be material to the business of the Company Group, taken as a whole. The consummation of the transactions contemplated by this Agreement will not cause the Company Group to breach any Data Security Requirement, except as would not reasonably be expected to be material to the business of the Company Group, taken as a whole.

  • Technical Safeguards 1. USAC and DSS will process the data matched and any data created by the match under the immediate supervision and control of authorized personnel to protect the confidentiality of the data, so unauthorized persons cannot retrieve any data by computer, remote terminal, or other means. 2. USAC and DSS will strictly limit authorization to these electronic data areas necessary for the authorized user to perform their official duties. All data in transit will be encrypted using algorithms that meet the requirements of the Federal Information Processing Standard (FIPS) Publication 140-2 or 140-3 (when applicable). 3. Authorized system users will be identified by User ID and password, and individually tracked to safeguard against the unauthorized access and use of the system. System logs of all user actions will be saved, tracked and monitored periodically. 4. USAC will transmit data to DSS via encrypted secure file delivery system. For each request, a response will be sent back to USAC to indicate success or failure of transmission.

  • Security and Data Transfers Party shall comply with all applicable State and Agency of Human Services' policies and standards, especially those related to privacy and security. The State will advise the Party of any new policies, procedures, or protocols developed during the term of this agreement as they are issued and will work with the Party to implement any required. Party will ensure the physical and data security associated with computer equipment, including desktops, notebooks, and other portable devices, used in connection with this Agreement. Party will also assure that any media or mechanism used to store or transfer data to or from the State includes industry standard security mechanisms such as continually up-to-date malware protection and encryption. Party will make every reasonable effort to ensure media or data files transferred to the State are virus and spyware free. At the conclusion of this agreement and after successful delivery of the data to the State, Party shall securely delete data (including archival backups) from Party’s equipment that contains individually identifiable records, in accordance with standards adopted by the Agency of Human Services. Party, in the event of a data breach, shall comply with the terms of Section 7 above.

  • Privacy and Data Security (a) In the prior three (3) years, the Company and its Subsidiaries have been in compliance with Privacy Laws, and in all material respects with (i) Contracts (or portions thereof) between the Company or its Subsidiaries and other Persons relating to Personal Data and (ii) applicable written policies, public statements and other public representations relating to the Processing of Personal Data, inclusive of all disclosures required by applicable Privacy Laws (“Privacy and Data Security Policies,” and together with Privacy Laws and such Contracts, “Privacy Commitments”). The execution, delivery and performance by the Company of this Agreement to which the Company is or will be a party, and the consummation of the transactions contemplated hereby or thereby, are not reasonably expected to, directly or indirectly, result in a violation of any Privacy Commitments that would be materially adverse to the Company and its Subsidiaries, taken as a whole. (b) In the prior three (3) years, the Privacy and Data Security Policies have at all times been maintained and made available to individuals in accordance with reasonable industry practices and as required by Privacy Laws, are accurate and complete and are not misleading or deceptive (including by omission). The practices of the Company or its Subsidiaries with respect to the Processing of Personal Data conform in all material respects to the Privacy and Data Security Policies that govern such Personal Data. (c) There is (and in the prior three years there has been) no material Legal Proceeding pending or, to the Company’s knowledge, threatened against or involving the Company or its Subsidiaries initiated by any Person (including (i) the Federal Trade Commission, any state attorney general or similar state official, (ii) any other Governmental authority, foreign or domestic or (iii) any regulatory or self-regulatory entity) alleging that any Processing of Personal Data by or on behalf of the Company or its Subsidiaries is or was in violation of any Privacy Commitments. To the Company’s Knowledge, there are no facts, circumstances or conditions that would reasonably be expected to form the basis for any proceeding for any potential violation of any Privacy Commitments. (d) In the prior three (3) years, (i) there has been no unauthorized access to, or unauthorized use, disclosure, or Processing of Personal Data in the possession or control of the Company or its Subsidiaries or any of its contractors with regard to any Personal Data obtained from or on behalf of the Company or its Subsidiaries (“Security Incident”), (ii) there have been no unauthorized intrusions or breaches of security into any Company IT Systems, and (iii) none of the Company or any of its Subsidiaries has notified or been required to notify any Person of any (A) loss, theft or damage of, or (B) other unauthorized or unlawful access to, or use, disclosure or other Processing of, Personal Data, except, in each case of clauses (i), (ii), and (iii), as would not have a Company Material Adverse Effect. Each of the Company and its Subsidiaries has implemented commercially reasonable administrative, physical and technical safeguards, and ensures that its contractors processing Personal Data take such safeguards to protect the confidentiality, integrity and security of Personal Data against any Security Incident, including taking all reasonable steps to safeguard and back up Personal Data. (e) Each of the Company and its Subsidiaries owns or has a license or other right to use the Company IT Systems as necessary to operate the business of each the Company or its Subsidiaries as currently conducted. All Company IT Systems are (i) free from any defect, bug, virus or programming, design or documentation error and (ii) in sufficiently good working condition to effectively perform all information technology operations necessary for the operation of businesses of the Company and its Subsidiaries (except for ordinary wear and tear), except in each case of clauses (i) and (ii), as is not and would not reasonably be expected to be, individually or in the aggregate, material to the Company and its Subsidiaries, taken as a whole. In the prior three years, there have not been any material failures, breakdowns or continued substandard performance of any Company IT Systems that have caused a material failure or disruption of the Company IT Systems other than routine failures or disruptions that have been remediated in the Ordinary Course of Business. In the past three (3) years, there have been no (except to the extent completely remediated), and to the Company’s Knowledge, there are no material security deficiencies or vulnerabilities in the Company IT Systems.