{"component": "clause", "props": {"groups": [{"snippet_links": [{"key": "media-disposal-and-servicing", "type": "clause", "offset": [0, 28]}, {"key": "company-confidential-information", "type": "clause", "offset": [30, 62]}, {"key": "made-available", "type": "clause", "offset": [79, 93]}, {"key": "program-agreement", "type": "definition", "offset": [125, 142]}, {"key": "the-internet", "type": "clause", "offset": [171, 183]}, {"key": "wireless-network", "type": "definition", "offset": [189, 205]}, {"key": "consistent-with", "type": "clause", "offset": [341, 356]}, {"key": "industry-best-practices", "type": "definition", "offset": [357, 380]}, {"key": "as-designated", "type": "definition", "offset": [384, 397]}, {"key": "in-writing", "type": "clause", "offset": [421, 431]}, {"key": "removable-media", "type": "clause", "offset": [464, 479]}, {"key": "defined-above", "type": "clause", "offset": [484, 497]}, {"key": "the-foregoing", "type": "definition", "offset": [657, 670]}, {"key": "by-bank", "type": "clause", "offset": [713, 720]}, {"key": "site-facilities", "type": "clause", "offset": [728, 743]}, {"key": "in-the-event", "type": "clause", "offset": [745, 757]}, {"key": "storage-media", "type": "clause", "offset": [772, 785]}, {"key": "disposed-of", "type": "definition", "offset": [814, 825]}, {"key": "site-for", "type": "clause", "offset": [838, 846]}, {"key": "personal-information", "type": "clause", "offset": [923, 943]}, {"key": "dod-5220", "type": "clause", "offset": [1034, 1042]}, {"key": "in-accordance-with", "type": "definition", "offset": [1062, 1080]}, {"key": "privacy-and-security-requirements", "type": "definition", "offset": [1085, 1118]}], "size": 2, "samples": [{"hash": "gYrQ1jah96J", "uri": "/contracts/gYrQ1jah96J#data-control", "label": "Co Brand Credit Card Program Agreement (BJ's Wholesale Club Holdings, Inc.)", "score": 30.1115674196, "published": true}, {"hash": "1myUI0Iazcn", "uri": "/contracts/1myUI0Iazcn#data-control", "label": "Co Brand Credit Card Program Agreement (BJ's Wholesale Club Holdings, Inc.)", "score": 29.4134154689, "published": true}], "snippet": "media disposal and servicing. Company confidential information (i) may only be made available and accessible pursuant to the Program Agreement; (ii) if transferred across the internet, any wireless network (e.g., cellular, 802.11x, or similar technology), or other public or shared networks, must be protected using appropriate cryptography consistent with industry best practices or as designated or approved by Company in writing; and (iii) if transferred using removable media (as defined above) must be sent via a bonded courier or protected using cryptography consistent with industry best practices or as designated or approved by Company in writing. The foregoing requirements apply to back-up data stored by Bank at off-site facilities. In the event any hardware, storage media, or removable media must be disposed of or sent off-site for servicing, Bank will ensure all Company confidential information, including personal information, has been \u201cscrubbed\u201d from such hardware and/or media using industry best practices (e.g., dod 5220-22-m standard) and in accordance with the privacy and security requirements.", "hash": "809e7f4ea7b0cc5eabbd4bd5e821bcc9", "id": 4}, {"snippet_links": [{"key": "seller-will", "type": "clause", "offset": [0, 11]}, {"key": "in-place", "type": "definition", "offset": [41, 49]}, {"key": "destruction-methods", "type": "definition", "offset": [101, 120]}, {"key": "log-information", "type": "clause", "offset": [155, 170]}, {"key": "buyer-may", "type": "definition", "offset": [185, 194]}, {"key": "upon-request", "type": "definition", "offset": [195, 207]}, {"key": "applicable-policies-and-procedures", "type": "clause", "offset": [225, 259]}], "size": 48, "samples": [{"hash": "etw26W8mSoC", "uri": "/contracts/etw26W8mSoC#data-control", "label": "Addendum", "score": 28.7724740174, "published": true}, {"hash": "kqHpzFSR4JJ", "uri": "/contracts/kqHpzFSR4JJ#data-control", "label": "Purchase Order Terms and Conditions Services Contract \u2013 Government", "score": 27.2773008927, "published": true}, {"hash": "kOXffu4d12Q", "uri": "/contracts/kOXffu4d12Q#data-control", "label": "Addendum", "score": 27.237743636, "published": true}], "snippet": "Seller will have policies and procedures in place to protect any data that Buyer provides, including destruction methods employed and how audit and system log information is protected. Buyer may upon request, review Seller's applicable policies and procedures.", "hash": "5ccccbee3edd8dda111a7c9bc2eabfa8", "id": 1}, {"snippet_links": [{"key": "the-software", "type": "clause", "offset": [20, 32]}, {"key": "access-to-data", "type": "clause", "offset": [39, 53]}, {"key": "to-ensure", "type": "clause", "offset": [132, 141]}, {"key": "restrictions-on", "type": "clause", "offset": [151, 166]}], "size": 3, "samples": [{"hash": "e2TxdMtH7HC", "uri": "/contracts/e2TxdMtH7HC#data-control", "label": "End User License Agreement", "score": 26.2929500342, "published": true}, {"hash": "48NMz4XbDdL", "uri": "/contracts/48NMz4XbDdL#data-control", "label": "End User License Agreement", "score": 25.5961670089, "published": true}], "snippet": "Certain elements of the Software allow access to data to be controlled. It is Customer\u2019s responsibility to manage such controls and to ensure that any restrictions on accessing data are appropriate.", "hash": "fe577d8d0832abf402daa8215db56016", "id": 2}, {"snippet_links": [{"key": "purposes-for-which", "type": "clause", "offset": [54, 72]}, {"key": "data-controllers", "type": "clause", "offset": [176, 192]}, {"key": "comply-with-the", "type": "clause", "offset": [209, 224]}, {"key": "process-personal-data", "type": "definition", "offset": [243, 264]}, {"key": "bearing-in-mind", "type": "clause", "offset": [266, 281]}, {"key": "at-all-times", "type": "definition", "offset": [379, 391]}, {"key": "providing-data", "type": "clause", "offset": [398, 412]}, {"key": "to-partners", "type": "clause", "offset": [413, 424]}, {"key": "the-partner", "type": "definition", "offset": [426, 437]}, {"key": "responsible-for", "type": "clause", "offset": [438, 453]}, {"key": "the-data-controller", "type": "definition", "offset": [494, 513]}, {"key": "point-of-contact", "type": "clause", "offset": [562, 578]}, {"key": "partner-organisations", "type": "clause", "offset": [580, 601]}, {"key": "delivery-authority", "type": "clause", "offset": [643, 661]}, {"key": "data-processors", "type": "definition", "offset": [684, 699]}, {"key": "on-behalf-of", "type": "clause", "offset": [730, 742]}, {"key": "delivery-partner", "type": "definition", "offset": [748, 764]}, {"key": "in-accordance-with", "type": "definition", "offset": [834, 852]}, {"key": "security-obligations", "type": "clause", "offset": [896, 916]}, {"key": "set-out", "type": "definition", "offset": [917, 924]}, {"key": "in-section-4", "type": "clause", "offset": [925, 937]}], "size": 3, "samples": [{"hash": "2BXGiEVHrjT", "uri": "/contracts/2BXGiEVHrjT#data-control", "label": "Data Sharing Agreement", "score": 20.3689253936, "published": true}, {"hash": "2n0kpMn4vXg", "uri": "/contracts/2n0kpMn4vXg#data-control", "label": "Data Sharing Agreement", "score": 17.0, "published": true}], "snippet": "Under the DPA, any organisation which \u201cdetermines the purposes for which and manner in which any personal data are, or are to be, processed\u201d is called a \u201cdata controller\u201d. All data controllers are required to comply with the DPA whenever they process personal data (bearing in mind, as stated above, that \u201cprocessing\u201d includes collecting, storing, amending and disclosing data). At all times, when providing data to partners, the partner responsible for delivering a service will be considered the data controller, as opposed to the partner who may be the first point of contact. Partner organisations which receive data from that responsible delivery authority are considered to be \u201cdata processors\u201d i.e., processing those data \u201con behalf of\u201d the delivery partner. As a data processor, partners must at all times process data solely in accordance with the WDP\u2019s instructions and comply with the security obligations set out in section 4.", "hash": "45cc23cab7a6a892e83b01357409d31f", "id": 3}, {"snippet_links": [{"key": "saas-services", "type": "definition", "offset": [11, 24]}, {"key": "the-customer-must", "type": "clause", "offset": [25, 42]}, {"key": "sole-discretion", "type": "clause", "offset": [136, 151]}, {"key": "of-customer", "type": "clause", "offset": [166, 177]}, {"key": "transfer-to", "type": "definition", "offset": [187, 198]}, {"key": "for-the-authority", "type": "clause", "offset": [238, 255]}, {"key": "the-customer-data", "type": "definition", "offset": [306, 323]}], "size": 2, "samples": [{"hash": "h5Qs2JzbR7Q", "uri": "/contracts/h5Qs2JzbR7Q#data-control", "label": "Master Software as a Service Agreement", "score": 36.1289307378, "published": true}, {"hash": "klKtACTenCK", "uri": "/contracts/klKtACTenCK#data-control", "label": "Master Software as a Service Agreement", "score": 36.1115273134, "published": true}], "snippet": "To use the SaaS Services the Customer must transfer Customer Data to Visier for processing. The Customer determines and controls in its sole discretion the selection of Customer Data for transfer to Visier. Customer is solely responsible for the authority, quality, accuracy, transfer, and completeness of the Customer Data.", "hash": "a17ee1bbee0073519d3c33274cf8c70a", "id": 5}, {"snippet_links": [{"key": "customer-may", "type": "clause", "offset": [0, 12]}, {"key": "service-data", "type": "definition", "offset": [44, 56]}, {"key": "the-software", "type": "clause", "offset": [122, 134]}, {"key": "access-to-data", "type": "clause", "offset": [141, 155]}, {"key": "to-ensure", "type": "clause", "offset": [234, 243]}, {"key": "restrictions-on", "type": "clause", "offset": [253, 268]}], "size": 2, "samples": [{"hash": "48NMz4XbDdL", "uri": "/contracts/48NMz4XbDdL#data-control", "label": "End User License Agreement", "score": 25.5961670089, "published": true}], "snippet": "Customer may only store through the Hosting Service data that Customer is lawfully entitled to store. Certain elements of the Software allow access to data to be controlled. It is Customer\u2019s responsibility to manage such controls and to ensure that any restrictions on accessing data are appropriate.", "hash": "1d6abb350f692fbc26dca873819ef42d", "id": 6}, {"snippet_links": [{"key": "an-additional", "type": "clause", "offset": [3, 16]}, {"key": "to-control", "type": "definition", "offset": [25, 35]}, {"key": "the-data", "type": "clause", "offset": [36, 44]}, {"key": "authorized-administrator", "type": "definition", "offset": [246, 270]}, {"key": "the-system", "type": "definition", "offset": [291, 301]}, {"key": "internet-services", "type": "definition", "offset": [327, 344]}, {"key": "required-measures", "type": "clause", "offset": [346, 363]}, {"key": "protection-of-the", "type": "clause", "offset": [391, 408]}], "size": 1, "samples": [{"hash": "bEAFq7fG8Ar", "uri": "/contracts/bEAFq7fG8Ar#data-control", "label": "Grant Agreement", "score": 24.9099766055, "published": true}], "snippet": "As an additional measure to control the data, Miraculous-Life services can only be invoked from the Miraculous-Life system. No debug or test interfaces are exposed externally. Administrative and management interfaces require authentication of an authorized administrator. As for the part of the system that will have access to internet services, required measures will be taken to guarantee protection of the data.", "hash": "454f2f37f93fcb9428e92c5f1a6669bb", "id": 7}, {"snippet_links": [{"key": "to-control", "type": "definition", "offset": [43, 53]}, {"key": "the-data", "type": "clause", "offset": [54, 62]}, {"key": "the-administrator", "type": "clause", "offset": [334, 351]}, {"key": "internet-services", "type": "definition", "offset": [405, 422]}, {"key": "in-order-to", "type": "clause", "offset": [447, 458]}, {"key": "protection-of-the", "type": "clause", "offset": [473, 490]}, {"key": "the-system-security", "type": "clause", "offset": [500, 519]}], "size": 1, "samples": [{"hash": "bEAFq7fG8Ar", "uri": "/contracts/bEAFq7fG8Ar#data-control", "label": "Grant Agreement", "score": 24.9099766055, "published": true}], "snippet": "The following measures will be implemented to control the data:\n1) The Miraculous-Life services will be only invoked from the Miraculous-Life system,\n2) No debug or test interfaces will be exposed externally,\n3) The administrative and management interfaces will include an authentication infrastructure ensuring the identification of the administrator Since the Miraculous-Life system will have access to Internet services, measures will be taken in order to guarantee the protection of the data and the system security. These measures will be assessed in the next chapter.", "hash": "8fa134acb4c20de21e5cf49a25f9254f", "id": 8}, {"snippet_links": [{"key": "data-protection-act", "type": "clause", "offset": [10, 29]}, {"key": "purposes-for-which", "type": "clause", "offset": [70, 88]}, {"key": "data-controllers", "type": "clause", "offset": [192, 208]}, {"key": "comply-with-the", "type": "clause", "offset": [225, 240]}, {"key": "process-personal-data", "type": "definition", "offset": [275, 296]}, {"key": "bearing-in-mind", "type": "clause", "offset": [298, 313]}, {"key": "at-all-times", "type": "definition", "offset": [411, 423]}, {"key": "providing-data", "type": "clause", "offset": [430, 444]}, {"key": "responsible-for", "type": "clause", "offset": [481, 496]}, {"key": "the-data-controller", "type": "definition", "offset": [537, 556]}, {"key": "the-partner", "type": "definition", "offset": [572, 583]}, {"key": "point-of-contact", "type": "clause", "offset": [605, 621]}, {"key": "partner-organisations", "type": "clause", "offset": [623, 644]}, {"key": "delivery-authority", "type": "clause", "offset": [686, 704]}, {"key": "data-processors", "type": "definition", "offset": [727, 742]}, {"key": "on-behalf-of", "type": "clause", "offset": [773, 785]}, {"key": "delivery-partner", "type": "definition", "offset": [791, 807]}, {"key": "in-accordance-with", "type": "definition", "offset": [887, 905]}, {"key": "security-obligations", "type": "clause", "offset": [951, 971]}, {"key": "set-out", "type": "definition", "offset": [972, 979]}, {"key": "in-section-4", "type": "clause", "offset": [980, 992]}, {"key": "this-agreement", "type": "clause", "offset": [1000, 1014]}, {"key": "the-trust", "type": "clause", "offset": [1038, 1047]}, {"key": "for-treatment", "type": "clause", "offset": [1071, 1084]}, {"key": "as-required-by", "type": "clause", "offset": [1159, 1173]}, {"key": "relevant-legislation", "type": "definition", "offset": [1174, 1194]}, {"key": "trust-policies", "type": "definition", "offset": [1218, 1232]}], "size": 1, "samples": [{"hash": "cA7FiCfcHoZ", "uri": "/contracts/cA7FiCfcHoZ#data-control", "label": "Data Sharing Agreement", "score": 30.7268827133, "published": true}], "snippet": "Under the Data Protection Act, any organisation which \u201cdetermines the purposes for which and manner in which any personal data are, or are to be, processed\u201d is called a \u201cdata controller\u201d. All data controllers are required to comply with the Data Protection Act whenever they process personal data (bearing in mind, as stated above, that \u201cprocessing\u201d includes collecting, storing, amending and disclosing data). At all times, when providing data to associated members, the supplier responsible for delivering a service will be considered the data controller, as opposed to the partner who may be the first point of contact. Partner organisations which receive data from that responsible delivery authority are considered to be \u201cdata processors\u201d i.e., processing those data \u201con behalf of\u201d the delivery partner. As a data processor, associated members must at all times process data solely in accordance with Amplitude\u2019s instructions and comply with the security obligations set out in section 4. Under this Agreement the Data Controller is the Trust, where patient attends for Treatment. Amplitude are acting as the Data Processor and as such will process data as required by relevant legislation and in accordance with Trust policies.", "hash": "362148bfc6900e83a549df13e4db7487", "id": 9}, {"snippet_links": [{"key": "internal-procedures", "type": "clause", "offset": [24, 43]}, {"key": "without-limitation", "type": "clause", "offset": [56, 74]}, {"key": "the-procedures", "type": "definition", "offset": [76, 90]}, {"key": "keep-and-maintain", "type": "clause", "offset": [111, 128]}, {"key": "secure-environment", "type": "definition", "offset": [185, 203]}, {"key": "in-accordance-with", "type": "definition", "offset": [281, 299]}, {"key": "the-terms", "type": "definition", "offset": [300, 309]}, {"key": "pursuant-to", "type": "definition", "offset": [426, 437]}, {"key": "section-44", "type": "clause", "offset": [443, 454]}, {"key": "comply-with", "type": "clause", "offset": [494, 505]}, {"key": "other-measures", "type": "clause", "offset": [510, 524]}, {"key": "requested-by", "type": "definition", "offset": [536, 548]}, {"key": "during-the-term-of-this-agreement", "type": "clause", "offset": [557, 590]}, {"key": "period-of", "type": "definition", "offset": [601, 610]}, {"key": "complete-and-accurate-records", "type": "clause", "offset": [660, 689]}, {"key": "pertaining-to", "type": "definition", "offset": [690, 703]}, {"key": "the-research", "type": "clause", "offset": [704, 716]}, {"key": "manufacturing-and-supply", "type": "definition", "offset": [731, 755]}, {"key": "activities-of-the", "type": "clause", "offset": [778, 795]}, {"key": "licensed-products", "type": "clause", "offset": [796, 813]}, {"key": "developed-technology", "type": "definition", "offset": [861, 881]}, {"key": "sufficient-detail", "type": "clause", "offset": [920, 937]}, {"key": "patent-application", "type": "clause", "offset": [984, 1002]}, {"key": "applicable-law", "type": "clause", "offset": [1050, 1064]}, {"key": "all-records", "type": "clause", "offset": [1113, 1124]}], "size": 1, "samples": [{"hash": "emcWcWxpiYk", "uri": "/contracts/emcWcWxpiYk#data-control", "label": "License Agreement (NeuroBo Pharmaceuticals, Inc.)", "score": 33.7008898015, "published": true}], "snippet": "NeuroBo shall establish internal procedures (including, without limitation, the procedures set forth below) to keep and maintain any Data and Know-How owned and provided by Dong-A in a secure environment and prevent the contamination of Dong-A\u2019s Data and Know-How that is received in accordance with the terms hereunder. NeuroBo agrees that it shall: (a) cause all Data and Know-How of Dong-A to be promptly logged and stored pursuant to this Section 4.4, (b) [**], (c) [**], (d) [**], and (e) comply with any other measures reasonably requested by Dong-A. During the Term of this Agreement and for a period of [**] thereafter, NeuroBo shall keep and maintain complete and accurate records pertaining to the research, Development, manufacturing and supply and Commercialization activities of the Licensed Products and any API and all material results, Data and Developed Technology made in conducting such activities in sufficient detail and in good scientific manner appropriate for Patent application and regulatory purposes and in accordance with applicable Law and to permit Dong-A to confirm the accuracy of all records hereunder.", "hash": "3f87e0979f507dac6f68576f6a99cea8", "id": 10}], "next_curs": "ClUST2oVc35sYXdpbnNpZGVyY29udHJhY3RzcjELEhZDbGF1c2VTbmlwcGV0R3JvdXBfdjU2IhVkYXRhLWNvbnRyb2wjMDAwMDAwMGEMogECZW4YACAA", "clause": {"title": "DATA CONTROL", "size": 65, "parents": [["sensitive-data", "Sensitive Data"], ["saas-services", "Saas Services"], ["security-type", "SECURITY TYPE"], ["type-a-desktop-tools", "Type a Desktop Tools"], ["brokers", "Brokers"]], "children": [["provide-data-in-compliance-with-applicable-laws", "Provide Data in Compliance with Applicable Laws"], ["annual-notification-of-rights", "Annual Notification of Rights"], ["reasonable-precautions", "Reasonable Precautions"], ["lawful-purpose", "Lawful Purpose"], ["remedy-for-violation", "Remedy for Violation"]], "id": "data-control", "related": [["job-control", "Job Control", "Job Control"], ["data-input-control", "Data Input Control", "Data Input Control"], ["input-control", "Input Control", "Input Control"], ["traffic-control", "Traffic Control", "Traffic Control"], ["data-controller", "Data Controller", "Data Controller"]], "related_snippets": [], "updated": "2025-07-07T12:35:11+00:00"}, "json": true, "cursor": ""}}