Security of Information Systems Sample Clauses

Security of Information Systems. The Post and the Customer shall each ensure the security of the information system to prevent illegal entry, acquisition, alteration, or destruction of transaction records or the Customer’s personal data. With regard to dispute arising out of the hacking of the safeguard measures of the Post’s information system by a third party or the loophole of the Post’s information system, the Post bears the burden of proof to show that such fact does not exist. The Post shall be responsible for damages to the Customer caused by third party invasion into the Post’s information system.
AutoNDA by SimpleDocs
Security of Information Systems. If Seller stores or processes Confidential Information, which is controlled by the Company and to which Seller is disclosed or permitted access to by the Company during the course of providing the Services described in the PO, on computer systems of Seller, then Seller shall comply with the terms and conditions set forth in this section. Seller shall ensure that Confidential Information transmitted through a Public Network is protected using Secure FTP, Socket Layer (SSL), or an equivalent means of protection. Seller shall maintain and enforce its information security program at each location from which Seller provides Services. In addition, Seller shall ensure that its information security program covers all networks, systems, servers, computers, notebooks, laptops, PDAs, mobile phones, and other devices and media that process or handle Confidential Information or that has the ability to access to all Company networks, all Company systems, or all Company Confidential Information. Moreover, Seller shall ensure that its information security program includes industry standard password protections as appropriate, firewalls, and anti-virus and malware protections to protect Confidential Information stored on computer systems.
Security of Information Systems. As used in this section:
Security of Information Systems. The Bank and the Depositor shall each ensure the security of the information system to prevent illegal entry, acquisition, alteration or destruction of transaction records or the Depositor’s personal data. With regard to dispute arising out of the hacking of the safeguard measures or the loophole of the Bank’s information system by a third party, the Bank bears the burden of proof to show that such fact does not exist. The Bank shall be responsible to the Depositor for damages caused by the invasion of third party into the Bank’s information system.
Security of Information Systems. 7.1. The Attorney General and the Chief Justice acknowledge that the judiciary is responsible for policy for the security of Court Information and Judicial Information and acknowledge the need to maintain Information Systems with comprehensive security and privacy specifications for Court Information and Judicial Information, which, in respect of Judicial Information, are in compliance with the principles outlined in the Canadian Judicial Council's Blueprint for the Security of Judicial Information as published from time to time.

Related to Security of Information Systems

  • Accessibility of Information Technology Contractor represents and warrants that any software/ hardware/ communications system/ equipment (collectively “technology”), if any, provided under this Agreement adheres to the standards and/or specifications as may be set forth in the Section 508 of the Rehabilitation Act of 1973 standards guide and is fully compliant with WCAG 2.0 AA standards for accessibility and compliant with any applicable FCC regulations. Technology that will be used on a mobile device must also be navigable with Voiceover on iOS devices in addition to meeting WCAG 2.0 level AA. If portions of the technology or user experience are alleged to be non-compliant or non- accessible at any point, District will provide Contractor with notice of such allegation and Contractor shall use its best efforts to make the technology compliant and accessible. If a state or federal department, office or regulatory agency, or if any other third party administrative agency or organization (“Claimants”), make a claim, allegation, initiates legal or regulatory process, or if a court finds or otherwise determines that technology is non-compliant or non-accessible, Contractor shall indemnify, defend and hold harmless the District from and against any and all such claims, allegations, liabilities, damages, penalties, fees, costs (including but not limited to reasonable attorneys’ fees), arising out of or related to Xxxxxxxxx’ claims. Contractor shall also fully indemnify District for the full cost of any user accommodation that is found to be necessary due to an identifiable lack of accessibility in the Contractor’s technology. If necessary, an independent 3rd party accessibility firm using POUR standards (Perceivable, Operable, Understandable and Robust) may be used to validate the accessibility of the technology.

  • Protection of Information E1 Data Protection Xxx X0 Official Secrets Acts 1911, 1989, Section 182 of the Finance Xxx 0000 E3 Confidentiality E4 Freedom of Information E5 Security of Confidential Information E6 Publicity, Media and Official Enquiries E7 Security E8 Intellectual Property Rights and Assigned Deliverables E9 Audit and the National Audit Office

  • Privacy of Information Subject to clauses 19.2 and 23 of this contract we must keep your information about you confidential in accordance with the Privacy Act 1988 (Cth).

  • Supply of Information Following service of a notice by the Contractor pursuant to clause 16.1 (Notice), the Contractor shall promptly supply to the Authority any further information relating to the delay which:

  • Use and Protection of Information Recipient agrees to protect such Information of the Discloser provided to Recipient from whatever source from distribution, disclosure or dissemination to anyone except employees of Recipient with a need to know such Information solely in conjunction with Recipient’s analysis of the Information and for no other purpose except as authorized herein or as otherwise authorized in writing by the Discloser. Recipient will not make any copies of the Information inspected by it.

  • Retention of Information You acknowledge and accept that the Bank will be required under the China Connect Rules to keep records in relation to Northbound trading for a period of not less than 20 years.

  • Availability of Information To make DHCS PI and PII available to the DHCS and/or 15 COUNTY for purposes of oversight, inspection, amendment, and response to requests for records, 16 injunctions, judgments, and orders for production of DHCS PI and PII. If CONTRACTOR receives 17 DHCS PII, upon request by COUNTY and/or DHCS, CONTRACTOR shall provide COUNTY and/or 18 DHCS with a list of all employees, contractors and agents who have access to DHCS PII, including 19 employees, contractors and agents of its subcontractors and agents.

  • Collection of Information You authorize us to access and download information from your Meter or from your PC Postage account. We may disclose this information to the USPS or other authorized governmental entity. We won’t share with any third parties (except the USPS or other governmental entity) individually identifiable information that we obtain about you in this manner unless required to by law or court order. We may elect to share aggregate data about our clients’ postage usage with third parties.

Time is Money Join Law Insider Premium to draft better contracts faster.