{"component": "clause", "props": {"groups": [{"size": 3, "snippet": "Personal Data will remain intact, complete and current during processing activities. // \u30c7\u30fc\u30bf\u5b8c\u5168\u6027\u5236\u5fa1 \u300c\u500b\u4eba\u30c7\u30fc\u30bf\u300d\u306f\u3001\u51e6\u7406\u4f5c\u696d\u4e2d\u3001\u640d\u306a\u308f\u308c\u308b\u3053\u3068\u306a\u304f\u3001\u5b8c\u5168\u304b\u3064\u6700\u65b0\u2730\u72b6\u614b\u306b\u4fdd\u305f\u308c\u308b\u3002 Measures: // \u5bfe\u7b56 SAP has implemented a multi-layered defense strategy as a protection against unauthorized modifications. // SAP \u306f\u3001\u6a29\u9650\u5916\u2730\u4fee\u6b63\u306b\u5bfe\u3059\u308b\u4fdd\u8b77\u5bfe\u7b56\u3068\u3057\u3066\u3001\u8907\u6570\u968e\u5c64\u2730\u9632\u5fa1\u6226\u7565\u3092\u5c0e\u5165\u3057\u3066\u3044\u308b\u3002 In particular, SAP uses the following to implement the control and measure sections described above. SAP \u3067\u306f\u3001\u4ee5\u4e0b\u3092\u4f7f\u7528\u3057\u3066\u4e0a\u8a18\u2730\u7ba1\u7406\u3068\u5bfe\u7b56\u2730\u30bb\u30af\u30b7\u30e7\u30f3\u3092\u5b9f\u65bd\u3057\u3066\u3044\u308b\u3002\u3068\u308a\u308f\u3051\u3001\u4ee5\u4e0b\u3092\u6307\u3059\u3002 \u2022 Firewalls; // \u30d5\u30a1\u30a4\u30a2\u30a6\u30a9\u30fc\u30eb \u2022 Security Monitoring Center; // \u30bb\u30ad\u27a6\u30ea\u30c6\u30a3\u76e3\u8996\u30bb\u30f3\u30bf\u30fc \u2022 Antivirus software; // \u30a2\u30f3\u30c1\u30a6\u30a3\u30eb\u30b9\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2 \u2022 Backup and recovery; // \u30d0\u30c3\u30af\u30a2\u30c3\u30d7\u53ca\u3073\u5fa9\u5143 \u2022 External and internal penetration testing; // \u5916\u90e8\u53ca\u3073\u5185\u90e8\u2730\u4fb5\u5165\u30c6\u30b9\u30c8 \u2022 Regular external audits to prove security measures. // \u30bb\u30ad\u27a6\u30ea\u30c6\u30a3\u5bfe\u7b56\u3092\u8a3c\u660e\u3059\u308b\u5b9a\u671f\u7684\u306a\u5916\u90e8\u76e3\u67fb (applies to TOMs Set 2 Services defined above) // (\u4e0a\u8a18\u306b\u3066\u5b9a\u7fa9\u3055\u308c\u308b\u672c\u6280\u8853\u7684\u53ca\u3073\u7d44\u7e54\u7684\u5bfe\u7b56(\u305d\u27302) \u30b5\u30fc\u30d3\u30b9\u306b\u9069\u7528\u3055\u308c\u308b)\n1. TECHNICAL AND ORGANIZATIONAL MEASURES // \u6280\u8853\u7684\u53ca\u3073\u7d44\u7e54\u7684\u5bfe\u7b56", "snippet_links": [{"key": "personal-data", "type": "definition", "offset": [0, 13]}, {"key": "processing-activities", "type": "definition", "offset": [62, 83]}, {"key": "unauthorized-modifications", "type": "clause", "offset": [231, 257]}, {"key": "in-particular", "type": "clause", "offset": [304, 317]}, {"key": "monitoring-center", "type": "clause", "offset": [489, 506]}, {"key": "antivirus-software", "type": "definition", "offset": [526, 544]}, {"key": "backup-and-recovery", "type": "clause", "offset": [565, 584]}, {"key": "penetration-testing", "type": "definition", "offset": [624, 643]}, {"key": "external-audits", "type": "clause", "offset": [671, 686]}, {"key": "security-measures", "type": "definition", "offset": [696, 713]}, {"key": "applies-to", "type": "clause", "offset": [741, 751]}, {"key": "defined-above", "type": "clause", "offset": [772, 785]}, {"key": "technical-and-organizational-measures", "type": "clause", "offset": [832, 869]}], "samples": [{"hash": "a6H6hcr51Ep", "uri": "/contracts/a6H6hcr51Ep#data-integrity-control", "label": "Personal Data Processing Agreement", "score": 29.4950675964, "published": true}, {"hash": "jIQEKPRWeBl", "uri": "/contracts/jIQEKPRWeBl#data-integrity-control", "label": "Personal Data Processing Agreement", "score": 29.4622192383, "published": true}], "hash": "7cc7c448afd93436ba7f989903fd053f", "id": 10}, {"size": 30, "snippet": "SAP has implemented a multi-layered defense strategy as a protection against unauthorized modifications. \u2022 In particular, SAP uses the following to implement the control and measure sections described above. \u2022 Firewalls; \u2022 Security Monitoring Center; \u2022 Antivirus software; \u2022 Backup and recovery; \u2022 External and internal penetration testing and/or regular external audits to prove security measures. The following table sets out the relevant Articles of GDPR and corresponding terms of the DPA for illustration purposes only.", "snippet_links": [{"key": "unauthorized-modifications", "type": "clause", "offset": [77, 103]}, {"key": "in-particular", "type": "clause", "offset": [107, 120]}, {"key": "monitoring-center", "type": "clause", "offset": [232, 249]}, {"key": "antivirus-software", "type": "definition", "offset": [253, 271]}, {"key": "backup-and-recovery", "type": "clause", "offset": [275, 294]}, {"key": "penetration-testing", "type": "definition", "offset": [320, 339]}, {"key": "external-audits", "type": "clause", "offset": [355, 370]}, {"key": "security-measures", "type": "definition", "offset": [380, 397]}, {"key": "the-relevant", "type": "clause", "offset": [428, 440]}, {"key": "terms-of-the", "type": "clause", "offset": [476, 488]}, {"key": "for-illustration-purposes-only", "type": "clause", "offset": [493, 523]}], "samples": [{"hash": "5scs28ehptK", "uri": "/contracts/5scs28ehptK#data-integrity-control", "label": "Personal Data Processing Agreement", "score": 29.5306529999, "published": true}, {"hash": "kfbWLu92lcn", "uri": "/contracts/kfbWLu92lcn#data-integrity-control", "label": "Personal Data Processing Agreement", "score": 29.4950675964, "published": true}, {"hash": "jXHgk7cPWaG", "uri": "/contracts/jXHgk7cPWaG#data-integrity-control", "label": "Personal Data Processing Agreement", "score": 29.4950675964, "published": true}], "hash": "095e8679a679b494cb00fdc91b02f843", "id": 2}, {"size": 139, "snippet": "Personal Data will remain intact, complete and current during processing activities.", "snippet_links": [{"key": "personal-data", "type": "definition", "offset": [0, 13]}, {"key": "processing-activities", "type": "definition", "offset": [62, 83]}], "samples": [{"hash": "Xl1jNZTaEC", "uri": "/contracts/Xl1jNZTaEC#data-integrity-control", "label": "Order Form", "score": 32.2249832153, "published": true}, {"hash": "kEDBpgOHYp8", "uri": "/contracts/kEDBpgOHYp8#data-integrity-control", "label": "General Terms and Conditions for Cloud Services", "score": 31.873840332, "published": true}, {"hash": "8H6yka0ZUAL", "uri": "/contracts/8H6yka0ZUAL#data-integrity-control", "label": "Personal Data Processing Agreement", "score": 30.7633285522, "published": true}], "hash": "7de5c49a39ad677bc313e2b3558dd6cb", "id": 1}, {"size": 17, "snippet": "Personal Data will remain intact, complete and current during processing activities. Appendix 3 to the DPA and, if applicable, the Standard Contractual Clauses", "snippet_links": [{"key": "personal-data", "type": "definition", "offset": [0, 13]}, {"key": "processing-activities", "type": "definition", "offset": [62, 83]}, {"key": "appendix-3-to-the-dpa", "type": "clause", "offset": [85, 106]}, {"key": "if-applicable", "type": "clause", "offset": [112, 125]}, {"key": "standard-contractual-clauses", "type": "definition", "offset": [131, 159]}], "samples": [{"hash": "gsaT8myoHVY", "uri": "/contracts/gsaT8myoHVY#data-integrity-control", "label": "Personal Data Processing Agreement", "score": 28.6711196899, "published": true}, {"hash": "9k0gaprbEAC", "uri": "/contracts/9k0gaprbEAC#data-integrity-control", "label": "Personal Data Processing Agreement", "score": 28.5725746155, "published": true}, {"hash": "3UdZbZFnyPy", "uri": "/contracts/3UdZbZFnyPy#data-integrity-control", "label": "Personal Data Processing Agreement", "score": 28.1948184967, "published": true}], "hash": "688b90cf6626b730c07ccd33519a136a", "id": 3}, {"size": 6, "snippet": "Personal Data will remain intact, complete and current during \u6570\u636e\u5b8c\u6574\u6027\u63a7\u5236\u3002\u5728\u5904\u7406\u6d3b\u52a8\u4e2d\u786e\u4fdd\u4e2a\u4eba\u6570\u636e\u4e0d\u53d7\u635f\u3001\u5b8c\u6574\u548c\u5b9e\u65f6\u3002 Article of GDPR GDPR \u6761\u6b3e Section of DPA DPA \u5c0f\u8282 Click on link to see Section \u5355\u51fb\u94fe\u63a5\u67e5\u770b\u76f8\u5173\u5c0f\u8282", "snippet_links": [{"key": "personal-data", "type": "definition", "offset": [0, 13]}, {"key": "click-on", "type": "clause", "offset": [139, 147]}, {"key": "link-to", "type": "clause", "offset": [148, 155]}], "samples": [{"hash": "6bQnu9IcIS7", "uri": "/contracts/6bQnu9IcIS7#data-integrity-control", "label": "Personal Data Processing Agreement", "score": 29.5306529999, "published": true}, {"hash": "8sSprxNCgg0", "uri": "/contracts/8sSprxNCgg0#data-integrity-control", "label": "Personal Data Processing Agreement", "score": 27.535112381, "published": true}], "hash": "036eb6bf5b7c9f2ceb34cbf3300801cd", "id": 4}, {"size": 5, "snippet": "Personal Data will remain intact, complete and current during processing activities./ Kendali Integritas Data. Data Pribadi akan tetap terjaga, lengkap, dan masih berlaku selama kegiatan pemrosesan. Last Updated: May 4, 2020/ Terakhir Diperbaharui: 4 Mei 2020\n1. TECHNICAL AND ORGANIZATIONAL MEASURES/ TINDAKAN TEKNIS DAN ORGANISASIONAL", "snippet_links": [{"key": "personal-data", "type": "definition", "offset": [0, 13]}, {"key": "data-pribadi", "type": "definition", "offset": [111, 123]}, {"key": "last-updated", "type": "definition", "offset": [199, 211]}, {"key": "technical-and", "type": "clause", "offset": [263, 276]}], "samples": [{"hash": "9NJ7jW2g30F", "uri": "/contracts/9NJ7jW2g30F#data-integrity-control", "label": "Personal Data Processing Agreement", "score": 30.4622192383, "published": true}, {"hash": "9XqbiVi6mlG", "uri": "/contracts/9XqbiVi6mlG#data-integrity-control", "label": "Personal Data Processing Agreement", "score": 30.3390369415, "published": true}], "hash": "9516d33545c3aa98f333ca2b05d511b0", "id": 5}, {"size": 4, "snippet": "Personal Data will remain intact, complete and current during processing activities./ Kendali Integritas Data. Data Pribadi akan tetap terjaga, lengkap, dan masih berlaku selama kegiatan pemrosesan. Appendix 3 to the DPA and, if applicable, the Standard Contractual Clauses/ Lampiran 3 terhadap DPA dan, jika berlaku, Klausul Kontrak Standar Article of GDPR/ Pasal GDPR Section of DPA/ Bagian DPA Click on link to see Section/ Klik pada tautan untuk melihat Bagian", "snippet_links": [{"key": "personal-data", "type": "definition", "offset": [0, 13]}, {"key": "data-pribadi", "type": "definition", "offset": [111, 123]}, {"key": "appendix-3-to-the-dpa", "type": "clause", "offset": [199, 220]}, {"key": "if-applicable", "type": "clause", "offset": [226, 239]}, {"key": "the-standard", "type": "clause", "offset": [241, 253]}, {"key": "click-on", "type": "clause", "offset": [397, 405]}, {"key": "link-to", "type": "clause", "offset": [406, 413]}], "samples": [{"hash": "awnzLlwZ4v1", "uri": "/contracts/awnzLlwZ4v1#data-integrity-control", "label": "Personal Data Processing Agreement", "score": 28.4201431274, "published": true}], "hash": "dff597161ef17e947c6ea04f12fd5048", "id": 6}, {"size": 3, "snippet": "Kendali Integritas Data. Appendix 3 to the DPA and, if applicable, the Standard Contractual Clauses/ Lampiran 3 terhadap DPA dan, jika berlaku, Klausul Kontrak Standar Article of GDPR/ Pasal GDPR Section of DPA/ Bagian DPA Click on link to see Sectin/ Klik pada tautan untuk melihat Bagian", "snippet_links": [{"key": "appendix-3-to-the-dpa", "type": "clause", "offset": [25, 46]}, {"key": "if-applicable", "type": "clause", "offset": [52, 65]}, {"key": "the-standard", "type": "clause", "offset": [67, 79]}, {"key": "click-on", "type": "clause", "offset": [223, 231]}, {"key": "link-to", "type": "clause", "offset": [232, 239]}], "samples": [{"hash": "bAfFwCXTPny", "uri": "/contracts/bAfFwCXTPny#data-integrity-control", "label": "Personal Data Processing Agreement", "score": 30.4950675964, "published": true}, {"hash": "9NJ7jW2g30F", "uri": "/contracts/9NJ7jW2g30F#data-integrity-control", "label": "Personal Data Processing Agreement", "score": 30.4622192383, "published": true}, {"hash": "9XqbiVi6mlG", "uri": "/contracts/9XqbiVi6mlG#data-integrity-control", "label": "Personal Data Processing Agreement", "score": 30.3390369415, "published": true}], "hash": "290cea3870ad0ea391361c10462a2c34", "id": 7}, {"size": 3, "snippet": "Ensures that Agreement Personal Data will remain intact, complete and current during processing activities: Measures: The Supplier has implemented a defence strategy in several layers as a protection against unauthorized modifications. This refers to controls as stated in the control and measure sections as described above. In particular: Firewalls; Security Monitoring Centre; Antivirus software; Backup and recovery; External and internal penetration testing; Regular external audits to prove security measures.", "snippet_links": [{"key": "agreement-personal-data", "type": "definition", "offset": [13, 36]}, {"key": "processing-activities", "type": "definition", "offset": [85, 106]}, {"key": "the-supplier", "type": "definition", "offset": [118, 130]}, {"key": "unauthorized-modifications", "type": "clause", "offset": [208, 234]}, {"key": "in-particular", "type": "clause", "offset": [326, 339]}, {"key": "security-monitoring", "type": "clause", "offset": [352, 371]}, {"key": "antivirus-software", "type": "definition", "offset": [380, 398]}, {"key": "backup-and-recovery", "type": "clause", "offset": [400, 419]}, {"key": "penetration-testing", "type": "definition", "offset": [443, 462]}, {"key": "external-audits", "type": "clause", "offset": [472, 487]}, {"key": "security-measures", "type": "definition", "offset": [497, 514]}], "samples": [{"hash": "1U6x6Wgswsy", "uri": "/contracts/1U6x6Wgswsy#data-integrity-control", "label": "Data Processing Agreement", "score": 25.0472278595, "published": true}, {"hash": "9KFhiLLiAII", "uri": "/contracts/9KFhiLLiAII#data-integrity-control", "label": "Data Processing Agreement", "score": 24.0472278595, "published": true}, {"hash": "4tdDpWEaP5o", "uri": "/contracts/4tdDpWEaP5o#data-integrity-control", "label": "Data Processing Agreement", "score": 23.0472278595, "published": true}], "hash": "c9981cd4d5e9c8aa67efe2234f6f7703", "id": 8}, {"size": 3, "snippet": "SAP has implemented a multi-layered defense strategy as a protection against unauthorized modifications. // SAP \u306f\u3001\u6a29\u9650\u5916\u2730\u4fee\u6b63\u306b\u5bfe\u3059\u308b\u4fdd\u8b77\u5bfe\u7b56\u3068\u3057\u3066\u3001\u8907\u6570\u968e\u5c64\u2730\u9632\u5fa1\u6226\u7565\u3092\u5c0e\u5165\u3057\u3066\u3044\u308b\u3002 In particular, SAP uses the following to implement the control and measure sections described above. SAP \u3067\u306f\u3001\u4ee5\u4e0b\u3092\u4f7f\u7528\u3057\u3066\u4e0a\u8a18\u2730\u7ba1\u7406\u3068\u5bfe\u7b56\u2730\u30bb\u30af\u30b7\u30e7\u30f3\u3092\u5b9f\u65bd\u3057\u3066\u3044\u308b\u3002\u3068\u308a\u308f\u3051\u3001\u4ee5\u4e0b\u3092\u6307\u3059\u3002 \u2022 Firewalls; // \u30d5\u30a1\u30a4\u30a2\u30a6\u30a9\u30fc\u30eb \u2022 Security Monitoring Center; // \u30bb\u30ad\u27a6\u30ea\u30c6\u30a3\u76e3\u8996\u30bb\u30f3\u30bf\u30fc \u2022 Antivirus software; // \u30a2\u30f3\u30c1\u30a6\u30a3\u30eb\u30b9\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2 \u2022 Backup and recovery; // \u30d0\u30c3\u30af\u30a2\u30c3\u30d7\u53ca\u3073\u5fa9\u5143 \u2022 External and internal penetration testing and/or regular external audits to prove security measures. // \u5916\u90e8\u53ca\u3073\u5185\u90e8\u2730\u4fb5\u5165\u30c6\u30b9\u30c8\u53ca\u3073/\u53c8\u306f\u30bb\u30ad\u27a6\u30ea\u30c6\u30a3\u5bfe\u7b56\u3092\u8a3c\u660e\u3059\u308b\u5b9a\u671f\u7684\u306a\u5916\u90e8\u76e3\u67fb The following table sets out the relevant Articles of GDPR and corresponding terms of the DPA for illustration purposes only. // \u4ee5\u4e0b\u2730\u8868\u306b\u306f\u3001GDPR \u2730\u95a2\u9023\u3059\u308b\u6761\u9805\u3068\u5bfe\u5fdc\u3059\u308b DPA \u2730\u9805\u76ee\u3092\u3001\u5c02\u3089\u8aac\u660e\u76ee\u7684\u3067\u8a18\u8f09\u3057\u3066\u3044\u308b\u3002", "snippet_links": [{"key": "unauthorized-modifications", "type": "clause", "offset": [77, 103]}, {"key": "in-particular", "type": "clause", "offset": [150, 163]}, {"key": "monitoring-center", "type": "clause", "offset": [335, 352]}, {"key": "antivirus-software", "type": "definition", "offset": [372, 390]}, {"key": "backup-and-recovery", "type": "clause", "offset": [411, 430]}, {"key": "penetration-testing", "type": "definition", "offset": [470, 489]}, {"key": "external-audits", "type": "clause", "offset": [505, 520]}, {"key": "security-measures", "type": "definition", "offset": [530, 547]}, {"key": "the-relevant", "type": "clause", "offset": [620, 632]}, {"key": "terms-of-the", "type": "clause", "offset": [668, 680]}, {"key": "for-illustration-purposes-only", "type": "clause", "offset": [685, 715]}], "samples": [{"hash": "a6H6hcr51Ep", "uri": "/contracts/a6H6hcr51Ep#data-integrity-control", "label": "Personal Data Processing Agreement", "score": 29.4950675964, "published": true}, {"hash": "jIQEKPRWeBl", "uri": "/contracts/jIQEKPRWeBl#data-integrity-control", "label": "Personal Data Processing Agreement", "score": 29.4622192383, "published": true}], "hash": "c14be5dee773f39094c0fe767adedf11", "id": 9}], "next_curs": "Cl8SWWoVc35sYXdpbnNpZGVyY29udHJhY3RzcjsLEhZDbGF1c2VTbmlwcGV0R3JvdXBfdjU2Ih9kYXRhLWludGVncml0eS1jb250cm9sIzAwMDAwMDBhDKIBAmVuGAAgAA==", "clause": {"size": 203, "parents": [["definitions", "Definitions"], ["technical-and-organizational-measures", "TECHNICAL AND ORGANIZATIONAL MEASURES"], ["data-integrity-control", "Data Integrity Control"], ["miscellaneous", "Miscellaneous"], ["documentation-records-of-processing", "DOCUMENTATION; RECORDS OF PROCESSING"]], "children": [["physical-access-control", "Physical Access Control"], ["system-access-control", "System Access Control"], ["data-access-control", "Data Access Control"], ["data-integrity-control", "Data Integrity Control"], ["data-separation-control", "Data Separation Control"]], "title": "Data Integrity Control", "id": "data-integrity-control", "related": [["data-integrity", "Data Integrity", "Data Integrity"], ["quality-control", "Quality Control", "Quality Control"], ["data-input-control", "Data Input Control", "Data Input Control"], ["quality-control-system", "Quality control system", "Quality control system"], ["security-controls", "Security Controls", "Security Controls"]], "related_snippets": [], "updated": "2025-07-10T04:27:38+00:00"}, "json": true, "cursor": ""}}