Security of Cardholder Data Sample Clauses

Security of Cardholder Data. (a) Xxxxxx Beaumont has designed and implemented an Information Security Program that is designed to protect cardholder data in accordance with the Visa/MasterCard Cardholder Information Security Program (“CISP”) requirements. At all times during the term of the Agreement, Xxxxxx Beaumont shall be in compliance with the CISP requirements, as the same may be revised from time to time.
AutoNDA by SimpleDocs
Security of Cardholder Data. Company and Services Vendor each acknowledge and agree that this Agreement constitutes an agreement for Services Vendor to perform services for Company as contemplated in Title V of the Xxxxx-Xxxxx-Xxxxxx Financial Modernization Act (the "Act") and Regulation P issued under the Act ("Regulation P"), Without limiting the generality of the terms of this Agreement, Services Vendor agrees that it shall protect the privacy of Cardholder's non-public personal information, as such terms are defined in the Act and in Regulation P ("Consumer Information") to at least the same extent that Client must maintain that confidentiality under the Act and Regulation P. Without limiting the generality of the foregoing sentence, Services Vendor shall not disclose any non-public personal information to any third person except as required in the performance of Services under this Agreement, and Services Vendor shall not use any non-public personal information except to perform the Services described under this Agreement. Services Vendor shall establish administrative, technical and physical safeguards for Company's customer records and information in Services Vendor's control or possession from time to time. Such safeguards shall be designed for the purpose of: (a) insuring the security of such records and information, (b) protecting against any anticipated threats or hazards to the security or integrity of such records and information; and (c) protecting against unauthorized access to or use of such records and information that would result in substantial harm or inconvenience to any Cardholder. Such safeguards shall be established in accordance with Section 501 of the Act and the Interagency Guidelines Establishing Standards for Safeguarding Customer Information adopted pursuant to Section 501 of the Act. Company shall provide Services Vendor with a copy of its privacy policy established in accordance with the Act and Regulation P.
Security of Cardholder Data. The Sub Merchant shall ensure that there are proper encryption and security measures at its Site to prevent any hacking into the information of the Sub Merchant. It shall be the obligation of Sub Merchant to verify the IP address of xxx.XXXxxxxx.xxx in the return/confirmation message URL. In the event of any loss being due to any act, which is beyond the control of the Sub Merchant, including any hacking into the Sub Merchants Site, the loss shall be borne by the Sub Merchant alone and not the Customer;
Security of Cardholder Data. Upon activation of an account, Integrator acknowledges and agrees that it shall bear the sole responsibility for protecting the privacy of cardholder data in its possession in accordance with Applicable Law and any requirement of participating agencies. Intellectual Property.
Security of Cardholder Data. SecurePay is committed to maintaining the security of cardholder data it possesses or otherwise stores, processes, or transmits on your behalf, or to the extent that it could impact the security of your cardholder data environment.
Security of Cardholder Data. The Contractor and/or any subcontractors responsible for storing, processing, or transmitting cardholder data must comply with all applicable Payment Card Industry Data Security Standards (PCI-DSS) throughout the term of the Contract. The State acknowledges that as of the effective date of this Agreement, as a payment brand, Contractor is not a service provider as that term is defined by PCI DSS. American Express places a top priority on safeguarding Card Member information and, as a regulated financial services institution, adheres to robust legal requirements by U.S. and international regulators, including the Gramm Xxxxx Xxxxxx Act (GLBA), the EU General Data Protection Regulation (GDPR), and the Federal Financial Institutions Examinations Council (“FFIEC”) guidelines. The FFIEC is composed of the primary banking regulators, including the Federal Reserve Board of Governors (FRB), the Federal Deposit Insurance Corporation (FDIC), the Office of the Comptroller of the Currency (OCC) and the Consumer Financial Protection Bureau (CFPB) among other banking regulators. PCI-DSS does not address all of the legal and regulatory security requirements that American Express must comply with. As such, American Express’s information security standards address specific concerns for our industry.
Security of Cardholder Data. MBI has designed and implemented an Information Security Program that is designed to protect cardholder data in accordance with the Visa/MasterCard Cardholder Information Security Program (“CISP”) requirements. At all times during the term of the Agreement, MBI shall be in compliance with the CISP requirements, as the same may be revised from time to time.
AutoNDA by SimpleDocs
Security of Cardholder Data. Merchant shall ensure that there are proper encryption and security measures at its Site to prevent any hacking into the information of Merchant. It shall be the obligation of Merchant to verify the IP address of xxx.xxxxxxxxxx.xxx in the return/confirmation message URL. In the event of any loss being due to any act, which is beyond the control of Merchant, including any hacking into Merchant Site, the loss shall be borne by Merchant alone and not by APPNIT.

Related to Security of Cardholder Data

  • Customer Data 5.1 The Customer shall own all right, title and interest in and to all of the Customer Data and shall have sole responsibility for the legality, reliability, integrity, accuracy and quality of the Customer Data.

  • Privacy of Customer Information Company Customer Information in the possession of the Agent, other than information independently obtained by the Agent and not derived in any manner from or using information obtained under or in connection with this Agreement, is and shall remain confidential and proprietary information of the Companies. Except in accordance with this Section 10.10, the Agent shall not use any Company Customer Information for any purpose, including the marketing of products or services to, or the solicitation of business from, Customers, or disclose any Company Customer Information to any Person, including any of the Agent’s employees, agents or contractors or any third party not affiliated with the Agent. The Agent may use or disclose Company Customer Information only to the extent necessary (i) for examination and audit of the Agent’s activities, books and records by the Agent’s regulatory authorities, (ii) to protect or exercise the Agent’s, the Custodian’s and the Lenders’ rights and privileges or (iii) to carry out the Agent’s, the Custodian’s and the Lenders’ express obligations under this Agreement and the other Facilities Papers (including providing Company Customer Information to Approved Investors), and for no other purpose; provided that the Agent may also use and disclose the Company Customer Information as expressly permitted by the relevant Company in writing, to the extent that such express permission is in accordance with the Privacy Requirements. The Agent shall take commercially reasonable steps to ensure that each Person to which the Agent intends to disclose Company Customer Information, before any such disclosure of information, agrees to keep confidential any such Company Customer Information and to use or disclose such Company Customer Information only to the extent necessary to protect or exercise the Agent’s, the Custodian’s and the Lenders’ rights and privileges, or to carry out the Agent’s, the Custodian’s and the Lenders’ express obligations, under this Agreement and the other Facilities Papers (including providing Company Customer Information to Approved Investors). The Agent agrees to maintain an Information Security Program and to assess, manage and control risks relating to the security and confidentiality of Company Customer Information pursuant to such program in the same manner as the Agent does so in respect of their own customers’ information, and shall implement the standards relating to such risks in the manner set forth in the Interagency Guidelines Establishing Standards for Safeguarding Company Customer Information set forth in 12 CFR Parts 30, 208, 211, 225, 263, 308, 364, 568 and 570. Without limiting the scope of the foregoing sentence, the Agent shall use at least the same physical and other security measures to protect all Company Customer Information in the Agent’s possession or control as the Agent uses for their own customers’ confidential and proprietary information.

  • Safeguarding Customer Information The Servicer has implemented and will maintain security measures designed to meet the objectives of the Interagency Guidelines Establishing Standards for Safeguarding Customer Information published in final form on February 1, 2001, 66 Fed. Reg. 8616 and the rules promulgated thereunder, as amended from time to time (the “Guidelines”). The Servicer shall promptly provide the Master Servicer, the Trustee and the NIMS Insurer information reasonably available to it regarding such security measures upon the reasonable request of the Master Servicer, the Trustee and the NIMS Insurer which information shall include, but not be limited to, any Statement on Auditing Standards (SAS) No. 70 report covering the Servicer’s operations, and any other audit reports, summaries of test results or equivalent measures taken by the Servicer with respect to its security measures to the extent reasonably necessary in order for the Seller to satisfy its obligations under the Guidelines.

  • User Data In addition to any disclosures authorized by Section 24, You and Your Authorised Users consent and agree that the RIM Group of Companies may access, preserve, and disclose Your or Your Authorised Users' data, including personal information, contents of your communication or information about the use of Your BlackBerry Solution functionality and the services or software and hardware utilized in conjunction with Your BlackBerry Solution where available to RIM ("User Data"), to third parties, including foreign or domestic government entities, without providing notice to You or Your Authorized Users under the laws of countries where the RIM Group of Companies and its service providers, other partners and affiliates are located in order to: (i) comply with legal process or enforceable governmental request, or as otherwise required by law; (ii) cooperate with third parties in investigating acts in violation of this Agreement; or (iii) cooperate with system administrators at Internet service providers, networks or computing facilities in order to enforce this Agreement. You warrant that You have obtained all consents necessary under applicable law from Your Authorised Users to disclose User Data to the RIM Group of Companies and for the RIM Group of Companies to collect, use, process, transmit, and/or disclose such User Data as described above.

  • Customer Information CPNI of a Customer and any other non-public, individually identifiable information about a Customer or the purchase by a Customer of the services or products of a Party.

  • Information Security Program (1) DTI shall implement and maintain a comprehensive written information security program applicable to the Personal Information ("Information Security Program") which shall include commercially reasonable measures, including, as appropriate, policies and procedures and technical, physical, and administrative safeguards that are consistent with industry standards, providing for (i) the security and confidentiality of the Personal Information, (ii) protection of the Personal Information against reasonably foreseeable threats or hazards to the security or integrity of the Personal Information, (iii) protection against unauthorized access to or use of or loss or theft of the Personal Information, and (iv) appropriate disposal of the Personal Information. Without limiting the generality of the foregoing, the Information Security Program shall provide for (i) continual assessment and re-assessment of the risks to the security of Personal Information acquired or maintained by DTI and its agents, contractors and subcontractors in connection with the Services, including but not limited to (A) identification of internal and external threats that could result in unauthorized disclosure, alteration or destruction of Personal Information and systems used by DTI and its agents, contractors and subcontractors, (B) assessment of the likelihood and potential damage of such threats, taking into account the sensitivity of such Personal Information, and (C) assessment of the sufficiency of policies, procedures, information systems of DTI and its agents, contractors and subcontractors, and other arrangements in place, to control risks; and (ii) appropriate protection against such risks.

  • Security and Safeguarding Information (a) Confidential Information that contains Non-Public Personal Information about customers is subject to the protections created by the Xxxxx-Xxxxx-Xxxxxx Act of 1999 (the “Act”) and under the standards for safeguarding Confidential Information, 16 CFR Part 314 (2002) adopted by Federal Trade Commission (“FTC”) (the “Safeguards Rule”). Additionally, state specific laws may regulate how certain confidential or personal information is safeguarded. The parties agree with respect to the Non-Public Personal Information to take all appropriate measures in accordance with the Act, and any state specific laws, as are necessary to protect the security of the Non-Public Personal Information and to specifically assure there is no disclosure of the Non-Public Personal Information other than as authorized under the Act, and any state specific laws, and this Agreement. With respect to Confidential Information, including Non-Public Personal Information and Personally Identifiable Financial Information as applicable, each of the parties agrees that:

  • Information Regarding Collateral All information supplied to Administrative Agent by or on behalf of any Loan Party with respect to any of the Collateral (in each case taken as a whole with respect to any particular Collateral) is accurate and complete in all material respects.

  • Product Information EPIZYME recognizes that by reason of, inter alia, EISAI’s status as an exclusive licensee in the EISAI Territory under this Agreement, EISAI has an interest in EPIZYME’s retention in confidence of certain information of EPIZYME. Accordingly, until the end of all Royalty Term(s) in the EISAI Territory, EPIZYME shall keep confidential, and not publish or otherwise disclose, and not use for any purpose other than to fulfill EPIZYME’s obligations, or exercise EPIZYME’s rights, hereunder any EPIZYME Know-How Controlled by EPIZYME or EPIZYME Collaboration Know-How, in each case that are primarily applicable to EZH2 or EZH2 Compounds (the “Product Information”), except to the extent (a) the Product Information is in the public domain through no fault of EPIZYME, (b) such disclosure or use is expressly permitted under Section 9.3, or (c) such disclosure or use is otherwise expressly permitted by the terms and conditions of this Agreement. For purposes of Section 9.3, each Party shall be deemed to be both the Disclosing Party and the Receiving Party with respect to Product Information. For clarification, the disclosure by EPIZYME to EISAI of Product Information shall not cause such Product Information to cease to be subject to the provisions of this Section 9.2 with respect to the use and disclosure of such Confidential Information by EPIZYME. In the event this Agreement is terminated pursuant to Article 12, this Section 9.2 shall have no continuing force or effect, but the Product Information, to the extent disclosed by EPIZYME to EISAI hereunder, shall continue to be Confidential Information of EPIZYME, subject to the terms of Sections 9.1 and 9.3 for purposes of the surviving provisions of this Agreement. Each Party shall be responsible for compliance by its Affiliates, and its and its Affiliates’ respective officers, directors, employees and agents, with the provisions of Section 9.1 and this Section 9.2.

  • Personal Information 23.1 Subject to any applicable laws, the Licensee authorises XXXXX to:

Time is Money Join Law Insider Premium to draft better contracts faster.