Technical data transfer Sample Clauses

Technical data transfer. The use of insecure data transmission routes, in particular, HTTP or FTP, can result in THIRD PARTIES accessing the transmitted data, reading or changing these data. In order to prevent this risk, SERVICE PROVIDER offers secure data transmission routes, e.g. HTTPS, FTPS or AS2. If CUSTOMER nevertheless decides to use insecure transmission routes, CUSTOMER is solely responsible for any damages that may result therefrom.
AutoNDA by SimpleDocs
Technical data transfer. Supplier shall not export, re-export, transfer, disclose or otherwise provide physical or electronic access to Technical Data to any person (including unauthorized third-party IT service providers) not authorized to receive Technical Data under existing ITC Laws and/or export authorization, or modify or divert such Technical Data to any military application or other end-use prohibited by applicable ITC Laws. Supplier shall develop and implement IT security procedures which ensure that Technical Data is accessible only by authorized persons. Any subcontracts for the provision of Technical Data, or the provision of Services shall contain all the limitations of this Section and shall require compliance with all applicable export licenses or authorizations.

Related to Technical data transfer

  • Data Transfer 11.1 The Processor may not transfer or authorize the transfer of Data to countries outside the EU and/or the European Economic Area (EEA) without the prior written consent of the Company. If personal data processed under this Agreement is transferred from a country within the European Economic Area to a country outside the European Economic Area, the Parties shall ensure that the personal data are adequately protected. To achieve this, the Parties shall, unless agreed otherwise, rely on EU approved standard contractual clauses for the transfer of personal data.

  • Technical Data For the purpose of this Agreement, "TECHNICAL DATA" shall mean all information of the Company in written, graphic or tangible form relating to any and all products which are developed, formulated and/or manufactured by the Company, as such information exists as of the Effective Date or is developed by the Company during the term hereof.

  • International Data Transfers The Company and the Stock Plan Administrator are based in the United States. The International Participant should note that the International Participant’s country of residence may have enacted data privacy laws that are different from the United States. The Company’s legal basis for the transfer of the International Participant’s personal data to the United States is the International Participant’s consent.

  • Data Transfers You acknowledge and agree that we may access and Process Personal Data on a global basis as necessary to provide the Subscription Service in accordance with the Agreement, and in particular that Personal Data may be transferred to and Processed by HubSpot, Inc. in the United States and to other jurisdictions where HubSpot Affiliates and Sub-Processors have operations. Wherever Personal Data is transferred outside its country of origin, each party will ensure such transfers are made in compliance with the requirements of Data Protection Laws.

  • Software Transfer You may permanently transfer all of your rights under this XXXX, provided you retain no copies, you transfer all of the SOFTWARE PRODUCT (including all component parts, the media and printed materials, any upgrades, this XXXX, and, if applicable, the Certificate of Authenticity), and the recipient agrees to the terms of this XXXX. If the SOFTWARE PRODUCT is an upgrade, any transfer must include all prior versions of the SOFTWARE PRODUCT.

  • Data Use Each party may use Connected Account Data in accordance with this Agreement and the consent (if any) each obtains from each Connected Account. This consent includes, as to Stripe, consent it receives via the Connected Account Agreement.

  • License Transfer You may not transfer the software to a third party without Microsoft’s prior written consent. If permitted, there may be additional charges for transferring the software to a third party.

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • Historical Appendix of Central Terms For Reference Only LANGUAGE FROM SEPTEMBER 1, 2014- AUGUST 31 2017, AND EXTENSION UNTIL AUGUST 31, 2019 LETTER OF UNDERSTANDING #9 BETWEEN The Ontario Public School Board Association (hereinafter called ‘OPSBA’) AND The Ontario Catholic School Trustees Association (hereinafter called ‘OCSTA’) AND L’Association des conseils scolaires des écoles publiques de l’Ontario (hereinafter called ‘ACEPO’) AND L’Association franco-ontarienne des conseils scolaires catholiques (hereinafter called ‘AFOCSC’) AND The Canadian Union of Public Employees / Syndicat canadien de la fonction publique (hereinafter called ‘CUPE’) AND

  • Transfer Format Transfers may include, but are not limited to, conversion of all Data into or from an industry standard format or providing application programmable interface. ENCRYPTION Data must be encrypted at all times unless specifically outlined otherwise in the Authorized User Agreement. At a minimum, encryption must be carried out at the most current NYS Encryption Standard (NYS-S14-007), (or successor policy with key access restricted to the Authorized User only, unless with the express written permission of the Authorized User. All Data in transit must be handled in accordance with ITS Policy NYS-S14-007 (or successor) or the National Institute of Standards and Technology (NIST) Federal Institute Processing Standard (FIPS)-140-2 or Transport Layer Security (TLS) 1, or TLS2 (or successor). The Authorized User Agreement shall specify the respective responsibilities of the Authorized User and the Contractor for the encryption of Data.

Time is Money Join Law Insider Premium to draft better contracts faster.