10.07.2015 Views

1E9Ct5D

1E9Ct5D

1E9Ct5D

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Information and the nature of such Confidential Information, consistent with [best]industry practice and standards.(c)take all reasonable measures to:(i)secure and defend all locations, equipment, systems and othermaterials and facilities employed in connection with the Servicesagainst "hackers" and others who may seek, without authorization, todisrupt, damage, modify, access or otherwise use Provider Systems orthe information found therein;(ii) prevent (A) Customer and its Authorized Users from having access tothe data of other customers or such other customer's users of theServices; (B) Customer's Confidential Information from beingcommingled with or contaminated by the data of other customers ortheir users of the Services; and (C) unauthorized access to anyCustomer's Confidential Information;(d) [periodically test/continuously monitor] its systems for potential areaswhere security could be breached;(e) immediately report to Customer any breach of security or unauthorizedaccess to Customer's Confidential Information that Provider detects or becomes aware of;(f) use diligent efforts to remedy such breach of security or unauthorizedaccess in a timely manner and deliver to Customer a root cause assessment and futureincident mitigation plan with regard to any breach of security or unauthorized accessaffecting any Confidential Information of Customer that sets out written details regardingProvider's investigation of such incident and, upon Customer's written request, provide asecond more in-depth investigation and results of its findings;(g) refrain from notifying, for or on behalf of Customer or any AuthorizedUser, any regulatory authority, consumer or other Person of any such security breach orunauthorized access unless Customer specifically requests in writing that Provider do so;and(h) if such security breach or unauthorized access results from any act oromission of Provider or any Provider Personnel, promptly reimburse Customer for all[reasonable] costs and expenses Customer may incur in [notifying any Person/providingany notification] of such security breach or unauthorized access[ required by applicableLaw].Without limiting the generality of the foregoing, Provider and Customer will worktogether to formulate a plan to rectify all security breaches and unauthorized accessconcerning Customer's Confidential Information.35

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!