Security and Privacy Requirements Sample Clauses

Security and Privacy Requirements. The Security and Privacy Requirements for Brokers (Exhibit A to this Amendment) are incorporated into, and made a part of, the Agreement.
AutoNDA by SimpleDocs
Security and Privacy Requirements. Business Associate agrees to comply with Sections 164.308, 164.310, 164.312 and 164.314 of the Omnibus Regulations applicable to Business Associates. The Parties hereto agree that the requirements of the Omnibus Regulations relating to security and privacy that are made applicable to Covered Entities shall also be applicable to Business Associate under the Agreement to the extent required by the Omnibus Regulations. Except as expressly provided herein, Business Associate has not assumed any obligations of Covered Entity under the HIPAA Rules.
Security and Privacy Requirements. (a) Each party will take reasonable care to ensure that the information submitted in each Transaction is timely, complete, accurate and secure, and will take reasonable precautions to prevent unauthorized access to: (i) its own and the other party's transmission and processing systems; (ii) the transmissions themselves; and (iii) the control structure applied to transmissions between them.
Security and Privacy Requirements 

Related to Security and Privacy Requirements

  • Security and Privacy 3. Security and privacy policies for the Genesys Cloud Service addressing use of Customer Data, which are incorporated by reference, are located at xxxxx://xxxx.xxxxxxxxxxx.xxx/articles/Genesys Cloud-security-compliance/.

  • Data Security and Privacy 12.1 SERVICE PROVIDER acknowledges the importance of Data Security and agrees to adhere to the Terms and Conditions of the Data Security Policy of IIMC.

  • Security and Data Privacy Each party will comply with applicable data privacy laws governing the protection of personal data in relation to their respective obligations under this Agreement. Where Siemens acts as Customer’s processor of personal data provided by Customer, the Data Privacy Terms available at xxxxx://xxx.xxxxxxx.xxx/dpt/sw, including the technical and organizational measures described therein, apply to the use of the relevant Learning Services and are incorporated herein by reference.

  • Compliance with Data Privacy and Security Laws and Standards Contractor shall comply with all applicable State and federal data privacy and data security laws, rules, and regulations.

  • Security Requirements 11.1 The Supplier shall comply, and shall procure the compliance of the Suppliers Personnel, with the Security Policy and the Security Plan and the Supplier shall ensure that the Security Plan produced by the Supplier fully complies with the Security Policy.

  • Data Security and Privacy Plan As more fully described herein, throughout the term of the Master Agreement, Vendor will have a Data Security and Privacy Plan in place to protect the confidentiality, privacy and security of the Protected Data it receives from the District. Vendor’s Plan for protecting the District’s Protected Data includes, but is not limited to, its agreement to comply with the terms of the District’s Bill of Rights for Data Security and Privacy, a copy of which is set forth below and has been signed by the Vendor. Additional components of Vendor’s Data Security and Privacy Plan for protection of the District’s Protected Data throughout the term of the Master Agreement are as follows:

  • DATA PROTECTION AND PRIVACY 14.1 In addition to Supplier’s obligations under Sections 6, 9, 10, and 15, Supplier will comply with this Section 14 when processing Accenture Personal Data. "

  • Security and Safety A. The Contractor warrants it is and shall remain in compliance with all applicable local, state and federal laws, regulations, codes and ordinances relating to fire, construction, building, health, food service and safety, including but not limited to the Hotel and Motel Fire Safety Act of 1990, Public Law 101-391. The Judicial Council may terminate this Agreement, pursuant to the termination for cause provision set forth herein, without penalty or prejudice if the Contractor fails to comply with the foregoing requirements.

  • Data Security Requirements A. Data Transport. When transporting Confidential Information electronically, including via email, the data will be protected by:

  • Data and Privacy 22.1 In making a booking we will ask for personal information such as your name, postal address, email address, telephone number and payment details. We could use the data to inform you about news and information we think may be of interest to you. We will not pass your information onto any third parties for the purposes of administration. Contractors will not be allowed to use your personal information for any other purpose that that which Pebble House may have instructed. By booking with us you are deemed to have consented to the use of personal information for these purposes. If you decide that you would prefer that your information is not used in this way or that you do not wish to receive such information, please contact us in writing or by email to hello@ xxxxxxxxxxxxxxxxxxx.xx.xx.

Time is Money Join Law Insider Premium to draft better contracts faster.