Protection of Property Seller assumes, and shall ensure that all subcontractors thereof and their respective employees assume, the risk of loss or destruction of or damage to any property of such parties whether owned, hired, rented, borrowed or otherwise, brought to a facility owned or controlled by Buyer or Buyer’s customer. Seller waives, and shall ensure that any subcontractor thereof and their respective employees waive, all rights of recovery against Buyer, its subsidiaries and their respective directors, officers, employees and agents for any such loss, destruction or damage. At all times Seller shall, and ensure that any subcontractor thereof shall, use suitable precautions to prevent damage to Buyer's property. If any such property is damaged by the fault or negligence of Seller or any subcontractor thereof, Seller shall, at no cost to Buyer, promptly and equitably reimburse Buyer for such damage or repair or otherwise make good such property to Buyer’s satisfaction. If Seller fails to do so, Buyer may do so and recover from Seller the cost thereof.
Protection of Data The Contractor agrees to store Data on one or more of the following media and protect the Data as described:
SAFETY AND PROTECTION OF PROPERTY The Contractor shall at all times:
Protection of Persons and Property The AGENCY shall be responsible for initiating, maintaining and supervising all safety precautions and programs in connection with the performance of this Contract.
Security and Validation Procedures The Scheduling Coordinator shall apply to the Meter Data of the Scheduling Coordinator Metered Entities that it represents the security and validation procedures prescribed by the relevant Local Regulatory Authority. If the relevant Local Regulatory Authority has not prescribed any such procedures, the Scheduling Coordinator shall apply the procedures set forth in the CAISO Tariff. Meter Data submitted by a Scheduling Coordinator for Scheduling Coordinator Metered Entities shall conform to these standards unless the CAISO has, at its discretion, exempted the Scheduling Coordinator from these standards.
Security of State Information To the extent Contractor shall have access to, processes, handles, collects, transmits, stores or otherwise deals with State Data, the Contractor represents and warrants that it has implemented and it shall maintain during the term of this Master Agreement the highest industry standard administrative, technical, and physical safeguards and controls consistent with NIST Special Publication 800-53 (version 4 or higher) and Federal Information Processing Standards Publication 200 and designed to (i) ensure the security and confidentiality of State Data; (ii) protect against any anticipated security threats or hazards to the security or integrity of the State Data; and (iii) protect against unauthorized access to or use of State Data. Such measures shall include at a minimum: (1) access controls on information systems, including controls to authenticate and permit access to State Data only to authorized individuals and controls to prevent the Contractor employees from providing State Data to unauthorized individuals who may seek to obtain this information (whether through fraudulent means or otherwise); (2) industry-standard firewall protection; (3) encryption of electronic State Data while in transit from the Contractor networks to external networks; (4) measures to store in a secure fashion all State Data which shall include multiple levels of authentication; (5) dual control procedures, segregation of duties, and pre-employment criminal background checks for employees with responsibilities for or access to State Data; (6) measures to ensure that the State Data shall not be altered or corrupted without the prior written consent of the State; (7) measures to protect against destruction, loss or damage of State Data due to potential environmental hazards, such as fire and water damage; (8) staff training to implement the information security measures; and (9) monitoring of the security of any portions of the Contractor systems that are used in the provision of the services against intrusion on a twenty-four (24) hour a day basis.
Protection of Privacy Act You acknowledge that all or part of the information you are required to keep, may be information deemed to be under the control of the LDB and may be subject to the provisions of Freedom of Information and Protection of Privacy Act if a request is made to the LDB for such information.
Data Protection Laws those laws applicable to the processing of personal data in the relevant jurisdictions, including but not limited to the General Data Protection Regulation 2016/679.
Security of Data a. Each of the parties shall:
Child Protection Barracudas’ staff have a duty to respond if they suspect a child may be suffering from or makes a disclosure about abuse. In this event staff will contact the relevant local authority and act on their advice.