8.1 Data security. We implement and maintain physical, electronic and management procedures for protection against loss, abuse, unauthorized access, modification or disclosure of subscriber data. These measures include encrypting subscriber data when it is transferred to the service, as well as encrypting subscriber data backups and resting authentication information. We will inform you of unauthorized access or the use of subscription data that will be brought to our attention. If we become aware of an unauthorized disclosure of subscriber data resulting from your use of the Service, we will work with you to investigate the cause of such unauthorized disclosure and will cooperate in good faith to take the necessary steps to avoid future repetitions and comply with applicable data breach reporting laws.8.2 Data Transfer Legislation. They recognize that the use of the service involves the transmission of subscriber data and other communications over the Internet and other networks and that these transfers could be accessed by unauthorized persons. You must protect your authorized user`s credentials and passwords from access or use by unauthorized persons and you are solely responsible for not taking into account. You must notify us immediately of subscriber information email@example.com about any alleged security breaches. Subscriber data is your property. They grant us a non-exclusive, global and free license for the use, sublicensing, index, storage, aggregation and display of subscriber data, to the extent necessary to provide or execute the service, technical assistance, account management and professional services and to publish, display and distribute unidentified and aggregated information from subscriber data and your use of the Service for the purpose of improving our products and services, as well as for the development, display and distribution of similar repositories and reports, provided that such data is not identified or identifiable by you.
In general, this definition of what is contained in confidential information is considerably expanded to reflect the specific sector and activities of the company. In addition, this definition of confidential information is generally extended when the entity collects or accesses data about each client`s client. A lawyer can help you determine how confidential information is defined based on your specific transaction and circumstances, and they can ensure that the company complies with federal and federal privacy and confidentiality laws. 6.5 Full agreement. This agreement (including all referenced exposures) constitutes the whole agreement between the contracting parties. Any amendment, amendment or waiver of a provision of this Agreement only has effect if it has signed this agreement in writing and by both parties. These are examples and guarantees. It is important to adapt the representations and guarantees of your specific situation – ideally, insurance and guarantees should guarantee the necessary guarantees and limit certain risks. A lawyer can help you develop representations and guarantees that meet the particular circumstances of your agreement. This form assumes that the specific details of the services to be performed are defined in a calendar – this structure is often used, for example. B if a list of different services to be provided is available.
However, in many cases, services are defined in the agreement. A lawyer can help you decide how the definition should be structured based on the details of your specific situation. If the parties agree to the electronic signature of the agreement, the signature page must be separated so that each party`s signature is appropriately affixed to the agreement.