Data Security Policies and Procedures Sample Clauses

Data Security Policies and Procedures. Both parties shall establish data security policies and procedures to ensure compliance with this section that are designed to: (a) ensure the security and confidentiality of Customer Information; (b) protect against any anticipated threats or hazards to the security or integrity of such Customer Information; and (c) protect against unauthorized access to or uses of such Customer Information that could result in substantial harm or inconvenience to any customer. Further, Seller agrees, at its own expense, that it shall transfer Confidential Information, especially Cardholder Account information, to Purchaser in a secure fashion, which includes, but is not limited to, transferring the data electronically and in an encrypted format. If data cannot be transferred electronically, Seller and Purchaser shall arrange for Purchaser’s representative to travel and collect the data file at Seller’s expense. Seller agrees to indemnify and hold Purchaser harmless from all claims, damages or expenses related to the loss or unauthorized access resulting from the transfer of such Confidential Information by Seller to Purchaser.
AutoNDA by SimpleDocs
Data Security Policies and Procedures. Both parties shall have established data security policies and procedures in place to ensure compliance with Requirements of Law that are designed to: (1) ensure the security and confidentiality of Customer Information; (2) protect against any anticipated threats or hazards to the security or integrity of such Customer Information; and (3) protect against unauthorized access to or uses of such Customer Information that could result in substantial harm or inconvenience to any customer. Further, as the sole creditor of the Accounts, Elan shall have a Business Continuity Plan and Disaster Recovery Plan in place, which shall, at a minimum, conform to generally accepted industry standards.
Data Security Policies and Procedures. Both parties shall establish data security policies and procedures to ensure compliance with this section that are designed to: (a) ensure the security and confidentiality of Customer Information; (b) protect against any anticipated threats or hazards to the security or integrity of such Customer Information; and (c) protect against unauthorized access to or uses of such Customer Information that could result in substantial harm or inconvenience to any customer.
Data Security Policies and Procedures. Both parties shall establish data security policies and procedures to ensure compliance with this section that are designed to: (a) ensure the security and confidentiality of Customer Information; (b) protect against any anticipated threats or hazards to the security or integrity of such Customer Information; and (c) protect against unauthorized access to or uses of such Customer Information that could result in substantial harm or inconvenience to any customer. Further, Seller agrees, at its own expense, that it shall transfer Confidential Information, especially Cardholder Account information, to Purchaser in a secure fashion, which includes, but is not limited to, transferring the data electronically and in an encrypted format. If data cannot be transferred electronically, Seller and Purchaser shall arrange for Purchaser’s representative to travel and collect the data file at Seller’s expense. Seller agrees to indemnify and hold Purchaser harmless from all claims, damages or expenses related to the loss or unauthorized access that occurs during the transfer of such Confidential Information by Seller to Purchaser. Seller shall not have any obligation to indemnify and hold Purchaser harmless from all claims, damages or expenses related to the loss or unauthorized access of such Confidential Information that occurs after the transfer of such Confidential Information to Purchaser.

Related to Data Security Policies and Procedures

  • Policies and Procedures i) The policies and procedures of the designated employer apply to the employee while working at both sites.

  • Compliance Policies and Procedures To assist the Fund in complying with Rule 38a-1 of the 1940 Act, BBH&Co. represents that it has adopted written policies and procedures reasonably designed to prevent violation of the federal securities laws in fulfilling its obligations under the Agreement and that it has in place a compliance program to monitor its compliance with those policies and procedures. BBH&Co will upon request provide the Fund with information about our compliance program as mutually agreed.

  • COMPLIANCE WITH POLICIES AND PROCEDURES During the period that Executive is employed with the Company hereunder, Executive shall adhere to the policies and standards of professionalism set forth in the policies and procedures of the Company and IAC as they may exist from time to time.

  • Accounting Policies and Procedures Permit any change in the accounting policies and procedures of the Company or any Guarantor, including a change in fiscal year, provided, however, that any policy or procedure required to be changed by the Financial Accounting Standards Board (or other board or committee thereof) in order to comply with Generally Accepted Accounting Principles may be so changed.

  • Policies and Practices The employment relationship between the Parties shall be governed by this Agreement and the policies and practices established by the Company and the Board of Directors (hereinafter referred to as the “Board”). In the event that the terms of this Agreement differ from or are in conflict with the Company’s policies or practices or the Company’s Employee Handbook, this Agreement shall control.

  • Reporting Procedures Enter in the XXX Entity Management area the information that XXX requires about each proceeding described in paragraph 2 of this award term and condition. You do not need to submit the information a second time under assistance awards that you received if you already provided the information through XXX because you were required to do so under Federal procurement contracts that you were awarded.

  • Security Procedures The Fund shall comply with data access operating standards and procedures and with user identification or other password control requirements and other security procedures as may be issued from time to time by State Street for use of the System on a remote basis and to access the Data Access Services. The Fund shall have access only to the Fund Data and authorized transactions agreed upon from time to time by State Street and, upon notice from State Street, the Fund shall discontinue remote use of the System and access to Data Access Services for any security reasons cited by State Street; provided, that, in such event, State Street shall, for a period not less than 180 days (or such other shorter period specified by the Fund) after such discontinuance, assume responsibility to provide accounting services under the terms of the Custodian Agreement.

Time is Money Join Law Insider Premium to draft better contracts faster.