{"component": "clause", "props": {"groups": [{"snippet": "Data Processor shall take reasonable measures to provide that Personal Data is accessible and manageable only by properly authorized staff, direct database query access is restricted and application access rights are established and enforced to ensure that persons entitled to use a data processing system only have access to the", "size": 14, "snippet_links": [{"key": "data-processor", "type": "clause", "offset": [0, 14]}, {"key": "to-provide", "type": "clause", "offset": [46, 56]}, {"key": "personal-data", "type": "clause", "offset": [62, 75]}, {"key": "authorized-staff", "type": "definition", "offset": [122, 138]}, {"key": "access-rights", "type": "clause", "offset": [199, 212]}, {"key": "to-ensure", "type": "clause", "offset": [242, 251]}, {"key": "persons-entitled", "type": "clause", "offset": [257, 273]}, {"key": "data-processing-system", "type": "definition", "offset": [283, 305]}, {"key": "access-to-the", "type": "clause", "offset": [316, 329]}], "samples": [{"hash": "8AiazDEPNyL", "uri": "/contracts/8AiazDEPNyL#data-access-controls", "label": "Data Processing Agreement", "score": 24.7645454407, "published": true}, {"hash": "lqH8igos6Og", "uri": "/contracts/lqH8igos6Og#data-access-controls", "label": "Data Processing Agreement", "score": 22.6577682495, "published": true}, {"hash": "fOqfQaB8ayf", "uri": "/contracts/fOqfQaB8ayf#data-access-controls", "label": "Data Processing Agreement", "score": 22.6577682495, "published": true}], "hash": "ce9824dd9a84d9595dcc207886e43bb1", "id": 1}, {"snippet": "Zendesk takes reasonable measures to provide that Service Data is accessible and manageable only by properly authorised staff.", "size": 6, "snippet_links": [{"key": "to-provide", "type": "clause", "offset": [34, 44]}, {"key": "service-data", "type": "definition", "offset": [50, 62]}, {"key": "authorised-staff", "type": "definition", "offset": [109, 125]}], "samples": [{"hash": "8BiXXLmxZd3", "uri": "/contracts/8BiXXLmxZd3#data-access-controls", "label": "Master Subscription Agreement", "score": 33.3482666016, "published": true}, {"hash": "Yz7ND3Bq59", "uri": "/contracts/Yz7ND3Bq59#data-access-controls", "label": "Data Processing Agreement", "score": 33.263092041, "published": true}, {"hash": "he82P7M0KVG", "uri": "/contracts/he82P7M0KVG#data-access-controls", "label": "Data Processing Agreement", "score": 31.6948451996, "published": true}], "hash": "c70ed841b2066fa16fdd0eef07fdc46d", "id": 2}, {"snippet": "Our Sub-processors will take reasonable measures to ensure that Service Data is accessible and manageable only by properly authorised staff, direct database query access is restricted and application access rights are established and enforced to ensure that persons entitled to access Service Data only have access to Service Data to which they have privilege of access; and, that Service Data cannot be read, copied, modified or removed without authorisation in the course of processing. Vendor will implement and maintain an access policy under which access to its system environment, to data processing systems, to Service Data, and other data is restricted to authorised personnel only.", "size": 6, "snippet_links": [{"key": "to-ensure", "type": "clause", "offset": [49, 58]}, {"key": "service-data", "type": "definition", "offset": [64, 76]}, {"key": "authorised-staff", "type": "definition", "offset": [123, 139]}, {"key": "access-rights", "type": "clause", "offset": [200, 213]}, {"key": "persons-entitled", "type": "clause", "offset": [258, 274]}, {"key": "access-service", "type": "definition", "offset": [278, 292]}, {"key": "access-to-service", "type": "clause", "offset": [308, 325]}, {"key": "in-the-course-of", "type": "definition", "offset": [460, 476]}, {"key": "vendor-will", "type": "clause", "offset": [489, 500]}, {"key": "access-policy", "type": "definition", "offset": [527, 540]}, {"key": "system-environment", "type": "clause", "offset": [567, 585]}, {"key": "data-processing-systems", "type": "clause", "offset": [590, 613]}, {"key": "other-data", "type": "clause", "offset": [636, 646]}, {"key": "authorised-personnel", "type": "definition", "offset": [664, 684]}], "samples": [{"hash": "8BiXXLmxZd3", "uri": "/contracts/8BiXXLmxZd3#data-access-controls", "label": "Master Subscription Agreement", "score": 33.3482666016, "published": true}, {"hash": "Yz7ND3Bq59", "uri": "/contracts/Yz7ND3Bq59#data-access-controls", "label": "Data Processing Agreement", "score": 33.263092041, "published": true}, {"hash": "he82P7M0KVG", "uri": "/contracts/he82P7M0KVG#data-access-controls", "label": "Data Processing Agreement", "score": 31.6948451996, "published": true}], "hash": "30d5f867f8f66cd3922dedb8401c8c18", "id": 3}, {"snippet": "Vendor shall take reasonable measures to provide that personal data is accessible and manageable only by properly authorized staff, direct database query access is restricted and application access rights are established and enforced to ensure that persons entitled to use a data processing system only have access to the personal data to which they have privilege of access; and, that personal data cannot be read, copied, modified or removed without authorization in the course of processing.", "size": 6, "snippet_links": [{"key": "vendor-shall", "type": "clause", "offset": [0, 12]}, {"key": "to-provide", "type": "clause", "offset": [38, 48]}, {"key": "authorized-staff", "type": "definition", "offset": [114, 130]}, {"key": "access-rights", "type": "clause", "offset": [191, 204]}, {"key": "to-ensure", "type": "clause", "offset": [234, 243]}, {"key": "persons-entitled", "type": "clause", "offset": [249, 265]}, {"key": "data-processing-system", "type": "definition", "offset": [275, 297]}, {"key": "the-personal-data", "type": "definition", "offset": [318, 335]}, {"key": "without-authorization", "type": "clause", "offset": [444, 465]}, {"key": "in-the-course-of", "type": "definition", "offset": [466, 482]}], "samples": [{"hash": "lmXnHW72ZvJ", "uri": "/contracts/lmXnHW72ZvJ#data-access-controls", "label": "Data Processing Agreement", "score": 33.2634086609, "published": true}, {"hash": "eZhaMkpBtEX", "uri": "/contracts/eZhaMkpBtEX#data-access-controls", "label": "Data Processing Agreement", "score": 33.1758117676, "published": true}, {"hash": "jleJciFyC4C", "uri": "/contracts/jleJciFyC4C#data-access-controls", "label": "Data Processing Agreement", "score": 33.1292762756, "published": true}], "hash": "08bddaeb8c5268064c000040297f636c", "id": 4}, {"snippet": "Q4, as a Data processor, shall take reasonable measures to provide that Personal Data is accessible and manageable only by properly authorized staff, direct database query access is restricted and application access rights are established and enforced to ensure that persons entitled to use a data processing system only have access to the Personal Data to which they have privilege of access.", "size": 4, "snippet_links": [{"key": "data-processor", "type": "clause", "offset": [9, 23]}, {"key": "to-provide", "type": "clause", "offset": [56, 66]}, {"key": "authorized-staff", "type": "definition", "offset": [132, 148]}, {"key": "access-rights", "type": "clause", "offset": [209, 222]}, {"key": "to-ensure", "type": "clause", "offset": [252, 261]}, {"key": "persons-entitled", "type": "clause", "offset": [267, 283]}, {"key": "data-processing-system", "type": "definition", "offset": [293, 315]}, {"key": "the-personal-data", "type": "definition", "offset": [336, 353]}], "samples": [{"hash": "4ljKKBCxKsp", "uri": "/contracts/4ljKKBCxKsp#data-access-controls", "label": "Data Protection Addendum", "score": 34.8702430725, "published": true}, {"hash": "rlIaq8M0yA", "uri": "/contracts/rlIaq8M0yA#data-access-controls", "label": "Data Protection Addendum", "score": 33.7889823914, "published": true}, {"hash": "lgGETI7lt8U", "uri": "/contracts/lgGETI7lt8U#data-access-controls", "label": "Data Protection Addendum", "score": 31.6072998047, "published": true}], "hash": "2240bac86efb603054f941fc080d53ce", "id": 5}, {"snippet": "Aircall shall take reasonable measures to provide that Personal Data is accessible and manageable only by properly authorized staff, direct database query access is restricted and application access rights are established and enforced to ensure that persons entitled to use a data processing system only have access to the Personal Data to which they have the privilege of access; and, that Personal Data cannot be read, copied, modified or removed without authorization in the course of Processing.", "size": 4, "snippet_links": [{"key": "to-provide", "type": "clause", "offset": [39, 49]}, {"key": "authorized-staff", "type": "definition", "offset": [115, 131]}, {"key": "access-rights", "type": "clause", "offset": [192, 205]}, {"key": "to-ensure", "type": "clause", "offset": [235, 244]}, {"key": "persons-entitled", "type": "clause", "offset": [250, 266]}, {"key": "data-processing-system", "type": "definition", "offset": [276, 298]}, {"key": "the-personal-data", "type": "definition", "offset": [319, 336]}, {"key": "without-authorization", "type": "clause", "offset": [449, 470]}, {"key": "in-the-course-of", "type": "definition", "offset": [471, 487]}], "samples": [{"hash": "dbcHUu4KxwV", "uri": "/contracts/dbcHUu4KxwV#data-access-controls", "label": "Data Processing Agreement", "score": 34.0114097595, "published": true}, {"hash": "1N4i83FiCRw", "uri": "/contracts/1N4i83FiCRw#data-access-controls", "label": "Data Processing Agreement", "score": 27.4832305908, "published": true}, {"hash": "eXb3ROEWgkt", "uri": "/contracts/eXb3ROEWgkt#data-access-controls", "label": "Data Processing Agreement", "score": 27.4407939911, "published": true}], "hash": "86dd6fa3647ba0187621d692de456a04", "id": 6}, {"snippet": "For service components managed by Oracle, Oracle\u2019s access to Your Content is restricted to authorized staff. With respect to Oracle personnel accessing the Services environment for the Cloud Services (including Your Content residing in the Cloud Services), Oracle enforces Role Based Access Controls (RBAC) and employs the access management principles of \u201cneed to know\u201d, \u201cleast privilege\u201d and \u201csegregation of duties.\u201d In addition, Oracle provides a mechanism by which You control Your access to Your Cloud Services environment and to Your Content by Your authorized staff.", "size": 4, "snippet_links": [{"key": "for-service-components", "type": "clause", "offset": [0, 22]}, {"key": "by-oracle", "type": "clause", "offset": [31, 40]}, {"key": "access-to", "type": "definition", "offset": [51, 60]}, {"key": "your-content", "type": "clause", "offset": [61, 73]}, {"key": "authorized-staff", "type": "definition", "offset": [91, 107]}, {"key": "with-respect-to", "type": "clause", "offset": [109, 124]}, {"key": "accessing-the-services", "type": "clause", "offset": [142, 164]}, {"key": "access-controls", "type": "definition", "offset": [284, 299]}, {"key": "management-principles", "type": "clause", "offset": [330, 351]}, {"key": "need-to-know", "type": "clause", "offset": [356, 368]}, {"key": "least-privilege", "type": "definition", "offset": [372, 387]}, {"key": "segregation-of-duties", "type": "definition", "offset": [394, 415]}, {"key": "in-addition", "type": "clause", "offset": [418, 429]}, {"key": "your-access", "type": "clause", "offset": [480, 491]}, {"key": "cloud-services-environment", "type": "definition", "offset": [500, 526]}], "samples": [{"hash": "iJzI3MqFwKc", "uri": "/contracts/iJzI3MqFwKc#data-access-controls", "label": "Order Form", "score": 35.4861526489, "published": true}, {"hash": "6qffdNRJL5y", "uri": "/contracts/6qffdNRJL5y#data-access-controls", "label": "Order Form", "score": 34.1825904846, "published": true}, {"hash": "bTfEfWz6rUm", "uri": "/contracts/bTfEfWz6rUm#data-access-controls", "label": "Cloud Service Agreement", "score": 33.3729019165, "published": true}], "hash": "b77058c1f04595a7ebf8a80ea84055b5", "id": 7}, {"snippet": "Unless otherwise provided for in the service provider terms, Contractor will provide access to Purchasing Entity\u2019s Data only to those Contractor employees, contractors and subcontractors (\u201cContractor Staff\u201d) who need to access the Data to fulfill Contractor\u2019s obligations under this Agreement. Contractor shall not access a Purchasing Entity\u2019s user accounts or Data, except on the course of data center operations, response to service or technical issues, as required by the express terms of this Master Agreement, or at a Purchasing Entity\u2019s written request.", "size": 4, "snippet_links": [{"key": "provider-terms", "type": "definition", "offset": [45, 59]}, {"key": "access-to", "type": "definition", "offset": [85, 94]}, {"key": "purchasing-entity", "type": "clause", "offset": [95, 112]}, {"key": "contractor-employees", "type": "definition", "offset": [134, 154]}, {"key": "contractors-and-subcontractors", "type": "clause", "offset": [156, 186]}, {"key": "contractor-staff", "type": "definition", "offset": [189, 205]}, {"key": "the-data", "type": "clause", "offset": [227, 235]}, {"key": "obligations-under-this-agreement", "type": "clause", "offset": [260, 292]}, {"key": "contractor-shall", "type": "clause", "offset": [294, 310]}, {"key": "user-accounts", "type": "definition", "offset": [344, 357]}, {"key": "data-center-operations", "type": "clause", "offset": [391, 413]}, {"key": "technical-issues", "type": "definition", "offset": [438, 454]}, {"key": "as-required-by", "type": "clause", "offset": [456, 470]}, {"key": "terms-of", "type": "clause", "offset": [483, 491]}, {"key": "master-agreement", "type": "definition", "offset": [497, 513]}, {"key": "written-request", "type": "definition", "offset": [543, 558]}], "samples": [{"hash": "4KGw7LHcapp", "uri": "/contracts/4KGw7LHcapp#data-access-controls", "label": "Master Agreement", "score": 26.0706195831, "published": true}, {"hash": "d9Pz2F1C4PR", "uri": "/contracts/d9Pz2F1C4PR#data-access-controls", "label": "Master Agreement", "score": 22.5359344482, "published": true}], "hash": "56d196708bc7493502de498f79f587a6", "id": 8}, {"snippet": "Third-party service providers shall take reasonable measures to provide that Service Data is accessible and manageable only by properly authorized staff, direct database query access is restricted and application access rights are established and enforced to ensure that persons entitled to access Service Data only have access to Service Data to which they have privilege of access; and, that Service Data cannot be read, copied, modified or removed without authorization in the course of processing.", "size": 3, "snippet_links": [{"key": "party-service-providers", "type": "clause", "offset": [6, 29]}, {"key": "to-provide", "type": "clause", "offset": [61, 71]}, {"key": "service-data", "type": "definition", "offset": [77, 89]}, {"key": "authorized-staff", "type": "definition", "offset": [136, 152]}, {"key": "access-rights", "type": "clause", "offset": [213, 226]}, {"key": "to-ensure", "type": "clause", "offset": [256, 265]}, {"key": "persons-entitled", "type": "clause", "offset": [271, 287]}, {"key": "access-service", "type": "definition", "offset": [291, 305]}, {"key": "access-to-service", "type": "clause", "offset": [321, 338]}, {"key": "without-authorization", "type": "clause", "offset": [451, 472]}, {"key": "in-the-course-of", "type": "definition", "offset": [473, 489]}], "samples": [{"hash": "Gl8TKQ74eY", "uri": "/contracts/Gl8TKQ74eY#data-access-controls", "label": "Master Subscription Agreement", "score": 26.9151268005, "published": true}, {"hash": "hc9SGiBdBjJ", "uri": "/contracts/hc9SGiBdBjJ#data-access-controls", "label": "Master Subscription Agreement", "score": 26.8877487183, "published": true}], "hash": "4f8bf643f82df283ca040914883e0113", "id": 9}, {"snippet": "Vendor shall take reasonable measures to provide that personal data is accessible and manageable only by properly authorized staff, direct database query access is restricted and application access rights are established and enforced to ensure that persons entitled to use a data processing system only have access to the personal data to which they have privilege of access; and, that personal data cannot be read, copied, modified or removed without authorization in the course of processing. Cybersecurity controls: Vendor has implemented a cyber security defense strategy in several layers as a protection against unauthorized access. Vendor will utilize one or more of the following if reasonable and appropriate: a. Firewalls; b. Web Application Firewall (WAF); c. Security Monitoring Centre; d. Antivirus software; e. Backup and recovery; f. Penetration testing; g. Intrusion detection; Transmission Controls Vendor shall take reasonable measures to ensure that it is possible to check and establish to which entities the transfer of personal data by means of data transmission facilities is envisaged so personal data cannot be read, copied, modified or removed without authorization during electronic transmission or transport. Data in-transit will be encrypted using industry standard algorithms and certificates e.g HTTPS encryption, secure communication tunnels (VPN), etc. Exceptions may include data in-transit between components of the Vendor solution within a suitably secure environment. E.g Between an application server and database server in a secure data center. Data at rest is protected through encryption of stored data using industry standard solutions e.g. BitLocker. Input Controls Vendor shall take reasonable measures to provide that it is possible to check and establish whether and by whom personal data has been entered into data processing systems, modified or removed. Vendor shall take reasonable measures to ensure that a. the personal data source is under the control of customer; and b. personal data integrated into Vendor\u2019s systems is managed by a secured\\encrypted transfer mechanism from the customer. Data Backup Vendor shall ensure that back-ups are taken on a regular basis, are secured, and encrypted when storing personal data to protect against accidental destruction or loss when hosted by outsourced cloud infrastructure providers. Vendor will on a periodic basis ensure that it is possible to restore access to and availability of personal data in a timely manner in the event of a physical or technical incident. Policies Vendor senior management assess and approve policies, including those related to data privacy, security and acceptable use. Policies are documented and published among all relevant personnel. Employees and contracted third parties are required to comply with policies relevant to their scope of work. New employees receive training on confidentiality obligations, information security, compliance, and data protection. Employees receive regular training updates, which cover Information Security policies and expectations. Where required, policies are supported by associated procedures, standards, and guidelines. Information Security policies are updated, as needed, to reflect changes to business objectives or risk. Senior management performs an annual review of all Information Security policies. Information Security policies are stored, maintained, updated, and published in a centralized, online location. Vendor\u2019s Information Security Management System contains sections on password requirements, Internet usage, computer security, confidentiality, customer data protection, and Company data protection.", "size": 2, "snippet_links": [{"key": "vendor-shall", "type": "clause", "offset": [0, 12]}, {"key": "to-provide", "type": "clause", "offset": [38, 48]}, {"key": "authorized-staff", "type": "definition", "offset": [114, 130]}, {"key": "access-rights", "type": "clause", "offset": [191, 204]}, {"key": "to-ensure", "type": "clause", "offset": [234, 243]}, {"key": "persons-entitled", "type": "clause", "offset": [249, 265]}, {"key": "the-personal-data", "type": "definition", "offset": [318, 335]}, {"key": "without-authorization", "type": "clause", "offset": [444, 465]}, {"key": "in-the-course-of", "type": "definition", "offset": [466, 482]}, {"key": "cybersecurity-controls", "type": "definition", "offset": [495, 517]}, {"key": "cyber-security", "type": "definition", "offset": [544, 558]}, {"key": "unauthorized-access", "type": "clause", "offset": [618, 637]}, {"key": "vendor-will", "type": "clause", "offset": [639, 650]}, {"key": "web-application", "type": "clause", "offset": [736, 751]}, {"key": "security-monitoring", "type": "definition", "offset": [771, 790]}, {"key": "antivirus-software", "type": "definition", "offset": [802, 820]}, {"key": "backup-and-recovery", "type": "clause", "offset": [825, 844]}, {"key": "penetration-testing", "type": "definition", "offset": [849, 868]}, {"key": "intrusion-detection", "type": "clause", "offset": [873, 892]}, {"key": "transmission-controls", "type": "clause", "offset": [894, 915]}, {"key": "the-transfer-of-personal-data", "type": "clause", "offset": [1025, 1054]}, {"key": "transmission-facilities", "type": "definition", "offset": [1072, 1095]}, {"key": "electronic-transmission", "type": "definition", "offset": [1199, 1222]}, {"key": "industry-standard", "type": "clause", "offset": [1277, 1294]}, {"key": "secure-communication", "type": "clause", "offset": [1345, 1365]}, {"key": "exceptions-may-include", "type": "clause", "offset": [1386, 1408]}, {"key": "vendor-solution", "type": "definition", "offset": [1451, 1466]}, {"key": "secure-environment", "type": "clause", "offset": [1485, 1503]}, {"key": "application-server", "type": "clause", "offset": [1520, 1538]}, {"key": "database-server", "type": "definition", "offset": [1543, 1558]}, {"key": "data-center", "type": "definition", "offset": [1571, 1582]}, {"key": "data-at-rest", "type": "clause", "offset": [1584, 1596]}, {"key": "stored-data", "type": "definition", "offset": [1632, 1643]}, {"key": "input-controls", "type": "clause", "offset": [1694, 1708]}, {"key": "entered-into", "type": "clause", "offset": [1844, 1856]}, {"key": "data-processing-systems", "type": "clause", "offset": [1857, 1880]}, {"key": "data-source", "type": "definition", "offset": [1972, 1983]}, {"key": "of-customer", "type": "clause", "offset": [2005, 2016]}, {"key": "transfer-mechanism", "type": "clause", "offset": [2106, 2124]}, {"key": "the-customer", "type": "clause", "offset": [2130, 2142]}, {"key": "data-backup", "type": "definition", "offset": [2144, 2155]}, {"key": "on-a-regular-basis", "type": "definition", "offset": [2200, 2218]}, {"key": "cloud-infrastructure", "type": "definition", "offset": [2350, 2370]}, {"key": "periodic-basis", "type": "definition", "offset": [2399, 2413]}, {"key": "availability-of", "type": "clause", "offset": [2466, 2481]}, {"key": "in-a-timely-manner", "type": "definition", "offset": [2496, 2514]}, {"key": "in-the-event-of-a", "type": "clause", "offset": [2515, 2532]}, {"key": "technical-incident", "type": "definition", "offset": [2545, 2563]}, {"key": "senior-management", "type": "definition", "offset": [2581, 2598]}, {"key": "related-to", "type": "definition", "offset": [2644, 2654]}, {"key": "data-privacy", "type": "definition", "offset": [2655, 2667]}, {"key": "security-and", "type": "clause", "offset": [2669, 2681]}, {"key": "acceptable-use", "type": "definition", "offset": [2682, 2696]}, {"key": "relevant-personnel", "type": "definition", "offset": [2746, 2764]}, {"key": "parties-are", "type": "clause", "offset": [2797, 2808]}, {"key": "comply-with-policies", "type": "clause", "offset": [2821, 2841]}, {"key": "scope-of-work", "type": "clause", "offset": [2860, 2873]}, {"key": "new-employees", "type": "clause", "offset": [2875, 2888]}, {"key": "confidentiality-obligations", "type": "clause", "offset": [2909, 2936]}, {"key": "and-data-protection", "type": "clause", "offset": [2972, 2991]}, {"key": "information-security-policies", "type": "clause", "offset": [3049, 3078]}, {"key": "where-required", "type": "clause", "offset": [3097, 3111]}, {"key": "associated-procedures", "type": "definition", "offset": [3139, 3160]}, {"key": "and-guidelines", "type": "clause", "offset": [3173, 3187]}, {"key": "as-needed", "type": "definition", "offset": [3232, 3241]}, {"key": "business-objectives", "type": "definition", "offset": [3265, 3284]}, {"key": "review-of", "type": "clause", "offset": [3331, 3340]}, {"key": "all-information", "type": "clause", "offset": [3341, 3356]}, {"key": "information-security-management-system", "type": "definition", "offset": [3497, 3535]}, {"key": "password-requirements", "type": "clause", "offset": [3557, 3578]}, {"key": "internet-usage", "type": "definition", "offset": [3580, 3594]}, {"key": "computer-security", "type": "definition", "offset": [3596, 3613]}, {"key": "customer-data-protection", "type": "clause", "offset": [3632, 3656]}, {"key": "company-data", "type": "definition", "offset": [3662, 3674]}], "samples": [{"hash": "fOnFCf6uqoY", "uri": "/contracts/fOnFCf6uqoY#data-access-controls", "label": "Data Processing Agreement", "score": 34.4897460938, "published": true}, {"hash": "hh6zLNiuQqx", "uri": "/contracts/hh6zLNiuQqx#data-access-controls", "label": "Data Processing Agreement", "score": 27.8966464996, "published": true}], "hash": "a3195d467c15d2f66dd11944f9912514", "id": 10}], "next_curs": "Cl0SV2oVc35sYXdpbnNpZGVyY29udHJhY3RzcjkLEhZDbGF1c2VTbmlwcGV0R3JvdXBfdjU2Ih1kYXRhLWFjY2Vzcy1jb250cm9scyMwMDAwMDAwYQyiAQJlbhgAIAA=", "clause": {"parents": [["governing-law-and-jurisdiction", "GOVERNING LAW AND JURISDICTION"], ["security-policies-and-personnel", "Security Policies and Personnel"], ["definitions", "Definitions"], ["oracle-cloud-security-policy", "Oracle Cloud Security Policy"], ["contact-details", "Contact Details"]], "size": 72, "title": "Data Access Controls", "children": [["physical-access-controls", "Physical Access Controls"], ["system-access-controls", "System Access Controls"]], "id": "data-access-controls", "related": [["data-access-control", "Data Access Control", "Data Access Control"], ["access-controls", "Access Controls", "Access Controls"], ["data-access", "Data Access", "Data Access"], ["system-access-control", "System Access Control", "System Access Control"], ["access-control", "Access Control", "Access Control"]], "related_snippets": [], "updated": "2025-07-23T06:14:10+00:00"}, "json": true, "cursor": ""}}