Information Security Obligations Sample Clauses

Information Security Obligations. 1. To identify an appropriately skilled individual to function as its Data Security Officer who shall act as the liaison to the Department’s Security Staff and who will maintain an appropriate level of data security for the information the Provider is collecting or using in the performance of this contract. An appropriate level of security includes approving and tracking all Provider employees that request system or information access and ensuring that user access has been removed from all terminated Provider employees.
AutoNDA by SimpleDocs
Information Security Obligations. The Contractor shall abide by the SFWIB’s Information Technology Security Policies and Procedures.  The Contractor (including its officers, employees, subcontractors, agents, partners, principals, servants, representatives or any other individuals to whom Contractor exposes or authorizes to access confidential information obtained under this Contract), shall not store, or allow to be stored, any confidential information on any portable storage media (e.g., laptops, thumb drives, hard drives, etc.) or peripheral device with the capacity to store information. The Contractor shall not electronically transmit, or allow to be transmitted, any personal or confidential information. Failure to strictly comply with this provision shall constitute a breach of this Contract.  The Contractor shall not engage any third party vendor, company or agent to modify, troubleshoot or otherwise alter the configuration of network devices, workstations, printers and/or any other device or hardware attached to the SFWIB’s network and agrees that no other devices, servers, workstations, tablets, wireless devices, etc., other than those installed by the SFWIB’s IT Unit or SFWIB’s authorized agent, will be connected to the SWFIB’s network.  The Contractor shall not engage any third party vendor, company or agent to modify, troubleshoot or otherwise alter the configuration of network devices, workstations, printers and/or any other device or hardware attached to the SFWIB’s network and agrees that no other devices, servers, workstations, tablets, wireless devices, etc., other than those installed by the SFWIB’s IT Unit or SFWIB’s authorized agent, will be connected to the SWFIB’s network.  The Contractor shall ensure that the Contractor’s staff who has access to client information through the Employ Miami-Dade (“EMD”)/Employ Monroe (“EM”), the One-Stop Service Tracking (“OSST”) system(s) and/or any other information systems as required, complete the Information Security and Awareness Training annually.
Information Security Obligations. Provider will employ security measures in accordance with applicable Law.
Information Security Obligations. 12.2.2.1 Each Party shall adopt technical and organizational measures to guarantee reasonable protection of the other Party’s Confidential Information, including the measures listed in Exhibit 12.2.2.1.
Information Security Obligations eGain will use commercially reasonable security technologies (such as encryption, password protection and firewall protection) in providing the Cloud Services, however, Customer acknowledges that eGain cannot and does not guarantee the privacy, security, authenticity and non-corruption of any information transmitted through, or stored in any system connected to the Internet. Customer further acknowledges that Customer is responsible for any security vulnerabilities, and the consequences of such vulnerabilities, arising from Customer’s content and Customer’s applications, including any Malicious Codes contained in Customer’s content or Customer’s applications that could limit or harm the functionality of a computer or that could damage, intercept or expropriate data. If made available by eGain, Customer may purchase, or may be required to purchase, additional Cloud Services Add-Ons from eGain (e.g. Security Plus, HIPAA Compliant Customer Environment, PCI Certified Customer Environment, etc.) to address particular data protection requirements applicable to Customer’s business or Customer’s content or to address changes in other Applicable Laws which affects the scope, provision, receipt or use of the Cloud Services.
Information Security Obligations. 41.1. The Training Vendor shall abide by the SFWIB’s Information Technology Security Policies and Procedures.
Information Security Obligations. 3.1. Vendor shall have implemented and documented reasonable and appropriate administrative, technical, and physical safeguards to protect CVS Information Assets against accidental or unlawful destruction, alteration, unauthorized or improper disclosure or access. Vendor shall monitor access to, use and disclosure of CVS Information Assets whether in physical or electronic form. Vendor will regularly test and monitor the effectiveness of its safeguards, controls, systems and procedures. Vendor will periodically identify reasonably foreseeable internal and external risks to the security, confidentiality, integrity, and availability of the CVS Information Assets, and ensure that these risks are addressed. Vendor shall use secure user identification and authentication protocols, including, but not limited to unique user identification, use of appropriate access controls, and strict measures to protect identification and authentication processes.
AutoNDA by SimpleDocs
Information Security Obligations. The Transferred Press Subsidiaries have established and as at the date of this Agreement maintain commercially reasonable information security procedures (including with respect to the collection and processing of Personal Data) and, to the Knowledge of Seller, the Transferred Press Subsidiaries have not in the two years prior to the date of this Agreement materially failed to comply with such information security procedures.
Information Security Obligations. INFORMATION SECURITY OBLIGATIONS OF THE CONSULTANT The Consultant will use reasonable precautions, including but not limited to, physical, software, and network security measures, employee screening, training, and supervision and appropriate agreements with employees, to prevent anyone other than the Client from monitoring, using, gaining access to or learning the import of Data (as defined in Schedule 2); protect appropriate copies of Data from loss, corruption, or unauthorised alteration; and prevent the disclosure of Client passwords and other access control information to anyone other than authorised Client employees, except as relates to the provision of services provided to the Client by the Consultant or its subcontractors as pertains to this Agreement. The Consultant will periodically test and re-evaluate the effectiveness of the obligations specified in this schedule. This is to include a minimum of two external assessments per calendar year. The Consultant agrees to supply these reports to the Client upon reasonable request, and will maintain copies of these reports for not less than two (2) calendar years. If a breach of information security or data protection measures occurs and Data is or was at risk as a result of the breach, the Consultant will notify the Client within 48 hours. If the Consultant is served with a warrant, subpoena, or any other order or request from a government body or any other person for any record or files of Data, the Consultant will, as soon as reasonably practical and not in violation of the law, deliver to the Client a copy of such warrant, subpoena, order or request and will not, without the Client's prior written consent, comply with the same unless and until required to do so under applicable law. The Consultant will not be liable for the disclosure, monitoring, loss, alteration of corruption of Data to the extent it results from the Client's failure to implement reasonable security measures to protect against the unauthorised use of facilities, computers, network access devices and passwords. The Consultant will supply the Client a description of its security measures or any particular controls described herein upon reasonable request. The Consultant shall ensure its personnel comply with the data security requirements set out in this Agreement. PRACTICAL SECURITY MEASURES With regard to the processing of Personal Data on behalf of the Client, the Consultant, as a minimum requirement, shall ensure it has reasonab...
Information Security Obligations. We will maintain appropriate security measures to protect Customer Data in accordance with industry standards. Without limiting the generality of the foregoing, all Customer Data is encrypted and stored on servers located within Australia. Although we will implement appropriate security measures to protect Customer Data, no method of electronic transmission or service is 100% secure. As a result, we do not guarantee that unauthorized access, hacking, data loss, or breach of security systems will never occur.
Time is Money Join Law Insider Premium to draft better contracts faster.