DATA HANDLING AND SECURITY Sample Clauses

POPULAR SAMPLE Copied 1 times
DATA HANDLING AND SECURITY. It will always be the responsibility of the selected Contractor to manage data transfer and to secure all data appropriately during the project to prevent unauthorized access to all data, products, and deliverables.
DATA HANDLING AND SECURITY. 6.1 The clauses below outline the duties of all parties in regards to handling information.
DATA HANDLING AND SECURITY. All parties must have in place appropriate technical and organisational security measures to ensure the confidentiality, integrity and availability of personal data and protect against accidental loss, destruction, damage, alteration or disclosure. These measures must be appropriate to the harm which might result from any unauthorised or unlawful processing, accidental loss, destruction or damage to the personal data and having regard to the nature of the personal data which is being processed. The London Borough of Barnet works towards ISO 27001, the International Standard for Information Security Management. There is an expectation that all parties will either be working toward or meeting a similar standard of security.
DATA HANDLING AND SECURITY. Please note: Both the SIA and the Approved Contractor will be data controllers in their own right in respect of the data being processed through the licensing site, as each party will be using the data for its own purposes – the SIA in the course of carrying out its regulatory functions, and the Approved Contractor for managing employment and/or contractual relationships (or potential employment and/or contractual relationships) with licence applicants. The Approved Contractor will be a data processor where it is utilising the additional LM functionality on the licensing site which allows it to undertake the tasks outlined in Schedule 1. However, the SIA still wishes to ensure that the Approved Contractor has certain minimum standards in place when it is a data controller if the Approved Contractor is going to be an SIA partner 3.1 The Approved Contractor shall: 3.1.1 comply with its obligations under the Data Protection Legislation in respect of all personal data it processes on behalf of the Licence Applicant; 3.1.2 ensure it obtains any necessary consents from the Licence Applicant in relation to its own use of Licence Applicant data and acts within the bounds of that consent; 3.1.3 ensure that all data is kept secure and transmitted in an encrypted form and use reasonable security practices and systems (in accordance with the SIA Code of Connection) for the collection, storage and use of such data; 3.1.4 retain a copy of all original identity documents used to verify the Licence Applicant’s identity in the format specified by the SIA and to the security standard specified in the LM Manual for 7 years following a Licence Applicant leaving the Approved Contractor’s business; 3.1.5 notify the SIA without undue delay but in any event no later than 24 hours upon becoming aware of any security incident/breach of security including, but not limited to an actual, potential or attempted breach, or threat to, the Approved Contractor’s Information Security Policy where it relates to SIA licensing; and 3.1.6 If the Approved Contractor ceases trading, provide to the SIA a copy of the most recent identity documents used to verify the identity of all individuals with a currently valid licence.
DATA HANDLING AND SECURITY. Data Management and Security 22.1. All data and Information submitted by or on behalf of EKEDP to MAP or otherwise in MAP’s possession or accessible by MAP pursuant to the provision of the Services, including without limitation all Personal Information (“Distribution Oath), are and shall remain the property of EKEDP or applicable third parties. EKEDP Data shall not be: (i) Used by MAP or any MAP Agent other than in connection with providing the Services in accordance with the terms of this Agreement (ii) Disclosed sold, assigned, leased or otherwise provided to third parties or to anyone not having a specific need to know the information for providing the Services, by MAP or any MAP Agent; or (iii) Commercially exploited by or on behalf of MAP or any MAP Agent. 22.2. MAP shall establish and maintain safeguards against the destruction, loss, alteration or unauthorized disclosure of EKEDP’s Data in the possession of MAP or any MAP Agent in accordance with Distribution Company’s security standards set out in the Service Agreement or as notified, by EKEDP to MAP from time to time. EKEDP shall be responsible for reasonable costs incurred by the MAP in the event of changes to such standards after the effective date of the Agreement.

Related to DATA HANDLING AND SECURITY

  • Data and Security If Contractor is granted access to Court Data, Confidential Information or Court Work Locations in the performance of the Work;

  • Safety and Security Contractor is responsible for maintaining safety in the performance of this Agreement. Contractor shall be responsible to ascertain from the District the rules and regulations pertaining to safety, security, and driving on school grounds, particularly when children are present.

  • DATA PROTECTION AND SECURITY 14.1 The Supplier must not remove any ownership or security notices in or relating to the Government Data. 14.2 The Supplier must make accessible back-ups of all Government Data, stored in an agreed off-site location and send the Buyer copies via secure encrypted method upon reasonable request. 1 ▇▇▇▇▇://▇▇▇.▇▇▇.▇▇/government/publications/ppn-0223-tackling-modern-slavery-in-government-supply-chains 14.3 The Supplier must ensure that any Supplier, Subcontractor, or Subprocessor system holding any Government Data, including back-up data, is a secure system that complies with the security requirements specified in the Order Form or otherwise in writing by the Buyer (where any such requirements have been provided). 14.4 If at any time the Supplier suspects or has reason to believe that the Government Data is corrupted, lost or sufficiently degraded, then the Supplier must immediately notify the Buyer and suggest remedial action. 14.5 If the Government Data is corrupted, lost or sufficiently degraded so as to be unusable the Buyer may either or both: 14.5.1 tell the Supplier to restore or get restored Government Data as soon as practical but no later than 5 Working Days from the date that the Buyer receives notice, or the Supplier finds out about the issue, whichever is earlier; and/or 14.5.2 restore the Government Data itself or using a third party. 14.6 The Supplier must pay each Party's reasonable costs of complying with clause 14.5 unless the Buyer is at fault.

  • Privacy and Security (a) Each of the Company and its Subsidiaries complies (and requires and monitors the compliance of applicable third parties) in all material respects with all applicable Laws relating to privacy or data security, and reputable industry practice, standards, self-governing rules and policies and their own published, posted and internal agreements and policies (which are in conformance with reputable industry practice) (all of the foregoing collectively, “Privacy Laws”) with respect to: (i) personally identifiable information (including name, address, telephone number, electronic mail address, social security number, bank account number or credit card number), sensitive personal information and any special categories of personal information regulated thereunder or covered thereby (“Personal Information”), whether any of same is accessed or used by the Company or any of its Subsidiaries or any of their respective business partners; and (ii) non-personally identifiable information, whether any of same is accessed or used by the Company or any of its Subsidiaries or any of their respective business partners. (b) Neither the Company nor any of its Subsidiaries uses, collects, or receives any Personal Information or sensitive non-personally identifiable information and does not become aware of the identity or location of, or identify or locate, any particular Person as a result of any receipt of such Personal Information, in a manner which would materially breach or violate any Privacy Laws and materially and adversely impact the business of the Company and its Subsidiaries, taken as a whole. (c) To the Company’s knowledge, Persons with which the Company or any of its Subsidiaries have contractual relationships have not breached any agreements or any Privacy Laws pertaining to Personal Information and to non-personally identifiable information. (d) To the Company’s knowledge, the Company and its Subsidiaries take all commercially reasonable steps to protect the operation, confidentiality, integrity and security of their respective business systems and websites and all information and transactions stored or contained therein or transmitted thereby against any unauthorized or improper use, access, transmittal, interruption, modification or corruption, and there have been no material breaches of same. Without limiting the generality of the foregoing, each of the Company and its Subsidiaries (i) uses industry standard encryption technology and (ii) has implemented a comprehensive security plan that (1) identifies internal and external risks to the security of the Company’s or its Subsidiaries’ confidential information and Personal Information and (2) implements, monitors and improves adequate and effective safeguards to control those risks.

  • Password and Security If you are issued or create any password or other credentials to access the Service or the portion of the Site through which the Service is offered, you agree not to give or make available your password or credentials to any unauthorized individuals, and you agree to be responsible for all actions taken by anyone to whom you have provided such credentials. If you believe that your credentials have been lost or stolen or that someone may attempt to use them to access the Site or Service without your consent, you must inform us at once at the telephone number provided in Section 6 of the General Terms above. See also Section 16 of the General Terms above regarding how the timeliness of your notice impacts your liability for unauthorized transfers.