{"component": "clause", "props": {"groups": [{"samples": [{"hash": "huqBIEmlXkj", "uri": "/contracts/huqBIEmlXkj#data-secrecy", "label": "Advertiser Terms and Conditions", "score": 23.5954818726, "published": true}], "snippet_links": [{"key": "data-processor", "type": "definition", "offset": [4, 18]}, {"key": "the-data-controller", "type": "definition", "offset": [74, 93]}, {"key": "rules-of", "type": "definition", "offset": [158, 166]}], "snippet": "The Data Processor is bound by data secrecy whenever it processes data on the Data Controller\u2019s behalf, and the Data Processor undertakes to observe the same rules of secrecy which apply to the Data Controller.", "size": 2, "hash": "b48b8a12516f864b789857e6b32ada34", "id": 10}, {"samples": [{"hash": "6m4CB2z1ka2", "uri": "/contracts/6m4CB2z1ka2#data-secrecy", "label": "Data Processing Agreement", "score": 30.2743225098, "published": true}, {"hash": "jyeGE4d02gg", "uri": "/contracts/jyeGE4d02gg#data-secrecy", "label": "Data Processing Agreement", "score": 29.3729019165, "published": true}, {"hash": "1L0Qi2epjMC", "uri": "/contracts/1L0Qi2epjMC#data-secrecy", "label": "Data Processing Agreement", "score": 29.3729019165, "published": true}], "snippet_links": [{"key": "the-data", "type": "clause", "offset": [34, 42]}, {"key": "the-gdpr", "type": "definition", "offset": [109, 117]}, {"key": "preservation-of-confidentiality", "type": "clause", "offset": [125, 156]}, {"key": "in-accordance-with", "type": "clause", "offset": [157, 175]}, {"key": "employees-who", "type": "clause", "offset": [290, 303]}, {"key": "laws-applicable", "type": "clause", "offset": [397, 412]}, {"key": "obligation-of-the", "type": "clause", "offset": [434, 451]}, {"key": "employees-shall", "type": "clause", "offset": [464, 479]}, {"key": "after-termination", "type": "clause", "offset": [491, 508]}, {"key": "employment-contracts", "type": "definition", "offset": [518, 538]}, {"key": "obligations-of-the-processor", "type": "clause", "offset": [546, 574]}, {"key": "to-apply", "type": "clause", "offset": [590, 598]}, {"key": "termination-of-this-agreement", "type": "clause", "offset": [609, 638]}], "snippet": "The Processor is obliged to treat the data confidentially. The Processor shall comply with the provisions of the GDPR on the preservation of confidentiality in accordance with Art. 28 (3) (2nd sentence) (b), Art. 29 and Art. 32 (4) of the GDPR. Accordingly, the Processor shall only engage employees who are bound to confidentiality and have previously been made familiar with the data protection laws applicable. The confidentiality obligation of the Processor's employees shall also apply after termination of their employment contracts. These obligations of the Processor shall continue to apply after the termination of this Agreement.", "size": 8, "hash": "814235f90f4d03e94703aa3729899dd1", "id": 1}, {"samples": [{"hash": "kdVbgV0jL1b", "uri": "/contracts/kdVbgV0jL1b#data-secrecy", "label": "Data Protection Agreement", "score": 24.1718006134, "published": true}, {"hash": "hw4DNLYKT39", "uri": "/contracts/hw4DNLYKT39#data-secrecy", "label": "Data Protection Agreement", "score": 23.3545513153, "published": true}], "snippet_links": [{"key": "the-processor", "type": "clause", "offset": [0, 13]}, {"key": "the-controller", "type": "clause", "offset": [64, 78]}, {"key": "in-accordance-with", "type": "clause", "offset": [137, 155]}, {"key": "the-provisions-of", "type": "clause", "offset": [238, 255]}, {"key": "data-protection", "type": "definition", "offset": [256, 271]}, {"key": "every-person", "type": "definition", "offset": [308, 320]}, {"key": "subject-to-the", "type": "definition", "offset": [321, 335]}, {"key": "access-to-personal-data", "type": "clause", "offset": [356, 379]}, {"key": "powers-granted", "type": "clause", "offset": [471, 485]}, {"key": "in-this-agreement", "type": "definition", "offset": [486, 503]}, {"key": "the-data", "type": "clause", "offset": [541, 549]}, {"key": "obligation-to-secrecy", "type": "clause", "offset": [563, 584]}, {"key": "remain-in-force", "type": "clause", "offset": [590, 605]}, {"key": "the-work", "type": "definition", "offset": [612, 620]}], "snippet": "The Processor will ensure that employees involved in processing the Controller\u2019s personal data are required to safeguard confidentiality in accordance with articles 28 para. 3 clause 2.b, 29, 32 para. 4 GDPR and have been acquainted with the provisions of data protection relevant to them. The Processor and every person subject to the Processor that have access to personal data may only process this data in accordance with the Controller\u2019s instructions, including the powers granted in this agreement, unless they are required to process the data by law. This obligation to secrecy will remain in force after the work has finished.", "size": 2, "hash": "1b38e16c7e2660d020a0c2043bb99052", "id": 6}, {"samples": [{"hash": "C0zqN4GKJ8", "uri": "/contracts/C0zqN4GKJ8#data-secrecy", "label": "Personal Data Processing Agreement", "score": 26.5099239349, "published": true}, {"hash": "bHk7wVCR7n7", "uri": "/contracts/bHk7wVCR7n7#data-secrecy", "label": "Personal Data Processing Agreement", "score": 25.4353179932, "published": true}], "snippet_links": [{"key": "process-personal-data", "type": "definition", "offset": [3, 24]}, {"key": "data-protection-law", "type": "clause", "offset": [150, 169]}, {"key": "access-to-personal-data", "type": "clause", "offset": [240, 263]}, {"key": "data-security-and-data-privacy", "type": "clause", "offset": [267, 297]}], "snippet": "To process Personal Data, Docker and its Subprocessors will only use personnel who are bound to observe data and telecommunications secrecy under the Data Protection Law. Docker and its Subprocessors will regularly train individuals having access to Personal Data in data security and data privacy measures.", "size": 2, "hash": "b72bee9b1152610f1ec03577f842cbcb", "id": 7}, {"samples": [{"hash": "lkoD8ukGmEP", "uri": "/contracts/lkoD8ukGmEP#data-secrecy", "label": "Data Processing Agreement", "score": 25.3780670166, "published": true}, {"hash": "4m6LLMzwlWZ", "uri": "/contracts/4m6LLMzwlWZ#data-secrecy", "label": "Data Processing Agreement", "score": 23.081451416, "published": true}, {"hash": "aZCsUsUaAqw", "uri": "/contracts/aZCsUsUaAqw#data-secrecy", "label": "Data Processing Agreement", "score": 22.081451416, "published": true}], "snippet_links": [{"key": "processing-personal-data", "type": "definition", "offset": [4, 28]}, {"key": "subject-to", "type": "clause", "offset": [89, 99]}, {"key": "obligation-to", "type": "clause", "offset": [110, 123]}, {"key": "to-the-extent", "type": "clause", "offset": [179, 192]}, {"key": "data-protection-law", "type": "clause", "offset": [221, 240]}, {"key": "access-to-personal-data", "type": "clause", "offset": [347, 370]}, {"key": "data-security-and-data-privacy", "type": "clause", "offset": [374, 404]}], "snippet": "For processing Personal Data, SAP and its Subprocessors shall only use personnel who are subject to a binding obligation to observe data secrecy or secrecy of telecommunications, to the extent applicable, pursuant to the Data Protection Law. SAP shall itself and shall require that its Subprocessors regularly train individuals to whom they grant access to Personal Data in data security and data privacy.", "size": 8, "hash": "223136d2d2383172abdd5f7e37ef3734", "id": 2}, {"samples": [{"hash": "bF23SJOhR7R", "uri": "/contracts/bF23SJOhR7R#data-secrecy", "label": "Data Processing Agreement", "score": 35.7733306885, "published": true}, {"hash": "hI036gKuVXn", "uri": "/contracts/hI036gKuVXn#data-secrecy", "label": "Data Processing Agreement", "score": 35.525932312, "published": true}, {"hash": "DhFdBbRW4E", "uri": "/contracts/DhFdBbRW4E#data-secrecy", "label": "Data Processing Agreement", "score": 35.2966880798, "published": true}], "snippet_links": [{"key": "the-personal-data", "type": "definition", "offset": [16, 33]}, {"key": "the-processor", "type": "clause", "offset": [35, 48]}, {"key": "nature-of-the", "type": "clause", "offset": [112, 125]}, {"key": "the-services", "type": "definition", "offset": [160, 172]}, {"key": "in-accordance-with-the-agreement", "type": "definition", "offset": [173, 205]}, {"key": "access-to-personal-data", "type": "clause", "offset": [266, 289]}, {"key": "data-security-and-data-privacy", "type": "clause", "offset": [293, 323]}, {"key": "accepted-industry-practice", "type": "definition", "offset": [343, 369]}, {"key": "strictly-confidential", "type": "definition", "offset": [422, 443]}, {"key": "appropriate-technical-and-organizational-measures", "type": "clause", "offset": [478, 527]}, {"key": "protection-of-the-security", "type": "clause", "offset": [532, 558]}, {"key": "integrity-of", "type": "clause", "offset": [581, 593]}, {"key": "the-specifications", "type": "definition", "offset": [619, 637]}, {"key": "the-standards", "type": "clause", "offset": [645, 658]}, {"key": "mutually-agreed", "type": "clause", "offset": [659, 674]}, {"key": "in-writing", "type": "clause", "offset": [675, 685]}, {"key": "by-the-parties", "type": "clause", "offset": [686, 700]}], "snippet": "8.1. To Process the Personal Data, the Processor will use personnel who are\n8.1.1. Informed of the confidential nature of the Personal Data, and\n8.1.2. Perform the Services in accordance with the Agreement.\n8.2. The Processor will regularly train individuals having access to Personal Data in data security and data privacy in accordance with accepted industry practice and shall ensure that all the Personal Data is kept strictly confidential.\n8.3. The Processor will maintain appropriate technical and organizational measures for protection of the security, confidentiality, and integrity of the Personal Data as per the specifications as per the standards mutually agreed in writing by the Parties.", "size": 6, "hash": "8f58864f3c293a79e0e3fdf2cef75766", "id": 3}, {"samples": [{"hash": "ailEYJMP6Ky", "uri": "/contracts/ailEYJMP6Ky#data-secrecy", "label": "Emea Services Agreement", "score": 35.1399803162, "published": true}, {"hash": "kwna9EUqzK9", "uri": "/contracts/kwna9EUqzK9#data-secrecy", "label": "Emea Services Agreement", "score": 33.3701629639, "published": true}, {"hash": "4DbPgel9Hkp", "uri": "/contracts/4DbPgel9Hkp#data-secrecy", "label": "Software as a Service Addendum", "score": 32.4928436279, "published": true}], "snippet_links": [{"key": "confidential-nature-of-data", "type": "clause", "offset": [57, 84]}, {"key": "the-agreement", "type": "clause", "offset": [113, 126]}, {"key": "customer-personal-data", "type": "clause", "offset": [155, 177]}, {"key": "provider-personnel", "type": "definition", "offset": [231, 249]}, {"key": "saas-software", "type": "definition", "offset": [265, 278]}, {"key": "in-accordance-with", "type": "clause", "offset": [279, 297]}, {"key": "this-addendum", "type": "definition", "offset": [298, 311]}, {"key": "agreement-to-execute", "type": "clause", "offset": [320, 340]}, {"key": "confidentiality-agreements", "type": "definition", "offset": [341, 367]}, {"key": "relating-to", "type": "definition", "offset": [368, 379]}, {"key": "protection-of-data", "type": "clause", "offset": [384, 402]}, {"key": "provider-shall", "type": "clause", "offset": [438, 452]}, {"key": "obligations-survive", "type": "clause", "offset": [486, 505]}, {"key": "termination-of-employment-for", "type": "clause", "offset": [510, 539]}, {"key": "access-to-data", "type": "clause", "offset": [609, 623]}, {"key": "data-privacy-requirements", "type": "definition", "offset": [679, 704]}], "snippet": "Provider will only use personnel who are informed of the confidential nature of data deemed \u201cconfidential\u201d under the Agreement, including specifically the Customer Personal Data, to process any such data. Provider will require all Provider personnel supporting the SaaS Software in accordance with this Addendum and the Agreement to execute confidentiality agreements relating to the protection of data, including Customer Personal Data. Provider shall ensure that such confidentiality obligations survive the termination of employment for any such personnel. Provider will regularly train individuals having access to data, including Customer Personal Data in data security and data privacy requirements and principles.", "size": 5, "hash": "46f6bcb818563b4a68e96f3974278228", "id": 4}, {"samples": [{"hash": "ad34mMg8BM3", "uri": "/contracts/ad34mMg8BM3#data-secrecy", "label": "Supplier Terms and Conditions", "score": 31.5908756256, "published": true}, {"hash": "iFlbzloMy5h", "uri": "/contracts/iFlbzloMy5h#data-secrecy", "label": "Transition Services Agreement (V F Corp)", "score": 30.3880901337, "published": true}, {"hash": "9QWsEHmjqmY", "uri": "/contracts/9QWsEHmjqmY#data-secrecy", "label": "Transition Services Agreement (Kontoor Brands, Inc.)", "score": 30.245721817, "published": true}], "snippet_links": [{"key": "the-processor", "type": "clause", "offset": [4, 17]}, {"key": "to-ensure", "type": "clause", "offset": [35, 44]}, {"key": "the-personal-data", "type": "definition", "offset": [80, 97]}, {"key": "on-behalf-of", "type": "definition", "offset": [98, 110]}, {"key": "the-controller", "type": "clause", "offset": [111, 125]}, {"key": "in-particular", "type": "clause", "offset": [127, 140]}, {"key": "employees-of", "type": "clause", "offset": [141, 153]}, {"key": "their-employees", "type": "definition", "offset": [198, 213]}, {"key": "an-appropriate", "type": "clause", "offset": [273, 287]}, {"key": "obligation-of-confidentiality", "type": "clause", "offset": [298, 327]}, {"key": "relating-to", "type": "definition", "offset": [328, 339]}, {"key": "covered-by", "type": "definition", "offset": [384, 394]}, {"key": "upon-request", "type": "clause", "offset": [405, 417]}, {"key": "compliance-with", "type": "definition", "offset": [446, 461]}], "snippet": "5.1 The Processor shall be obliged to ensure that persons authorized to process the Personal Data on behalf of the Controller, in particular employees of Processor and any Sub-processors, including their employees, have committed themselves to confidentiality or are under an appropriate statutory obligation of confidentiality relating to the Personal Data and processing activities covered by this DPA. Upon request, Processor will demonstrate compliance with this obligation.", "size": 3, "hash": "fe62fade290e81b9e07e2ecb31f750e2", "id": 5}, {"samples": [{"hash": "dFlXA48Oxrf", "uri": "/contracts/dFlXA48Oxrf#data-secrecy", "label": "Personal Data Processing Agreement", "score": 24.4209442139, "published": true}, {"hash": "egKUxb6AgPk", "uri": "/contracts/egKUxb6AgPk#data-secrecy", "label": "Personal Data Processing Agreement", "score": 24.3223819733, "published": true}], "snippet_links": [{"key": "process-personal-data", "type": "definition", "offset": [3, 24]}, {"key": "data-protection-law", "type": "clause", "offset": [152, 171]}, {"key": "access-to-personal-data", "type": "clause", "offset": [244, 267]}, {"key": "data-security-and-data-privacy", "type": "clause", "offset": [271, 301]}], "snippet": "To process Personal Data, HRMantra and its Subprocessors will only use personnel who are bound to observe data and telecommunications secrecy under the Data Protection Law. HRMantra and its Subprocessors will regularly train individuals having access to Personal Data in data security and data privacy measures.", "size": 2, "hash": "6269d089535c15b337a99c17492b7217", "id": 8}, {"samples": [{"hash": "fTquMGHmu7W", "uri": "/contracts/fTquMGHmu7W#data-secrecy", "label": "Data Protection Agreement", "score": 31.224067688, "published": true}, {"hash": "aGE3jZ4BAEI", "uri": "/contracts/aGE3jZ4BAEI#data-secrecy", "label": "Data Protection Agreement", "score": 31.224067688, "published": true}], "snippet_links": [{"key": "supplier-shall", "type": "clause", "offset": [0, 14]}, {"key": "third-parties", "type": "definition", "offset": [112, 125]}, {"key": "authorized-by", "type": "definition", "offset": [133, 146]}, {"key": "juniper-networks", "type": "definition", "offset": [147, 163]}, {"key": "access-to", "type": "definition", "offset": [186, 195]}, {"key": "the-supplier", "type": "clause", "offset": [250, 262]}, {"key": "the-contract", "type": "clause", "offset": [296, 308]}, {"key": "for-supplier", "type": "clause", "offset": [374, 386]}, {"key": "confidentiality-obligations", "type": "definition", "offset": [421, 448]}, {"key": "termination-of-this", "type": "clause", "offset": [516, 535]}], "snippet": "Supplier shall protect the confidentiality of Juniper Data Processed and shall not disclose Juniper Data to any third parties unless authorized by Juniper Networks. Supplier shall limit access to Juniper Data to those persons who need access to meet the Supplier's obligations under this DPA and the Contract. Supplier shall ensure that all persons who Process Juniper Data for Supplier have appropriate written or legal confidentiality obligations. Data secrecy requirements shall continue even after expiration or termination of this DPA and/or the Contract.", "size": 2, "hash": "1f522a990fb7cb92e05afbf75530c350", "id": 9}], "next_curs": "ClUST2oVc35sYXdpbnNpZGVyY29udHJhY3RzcjELEhZDbGF1c2VTbmlwcGV0R3JvdXBfdjU2IhVkYXRhLXNlY3JlY3kjMDAwMDAwMGEMogECZW4YACAA", "clause": {"parents": [["saas-security", "Saas Security"], ["severability", "Severability"], ["general", "General"], ["entire-agreement", "Entire Agreement"], ["sap-obligations", "Sap Obligations"]], "title": "Data Secrecy", "children": [["", ""], ["aplikasi-dokumen-klausul-kontraktual-standar", "Aplikasi Dokumen Klausul Kontraktual Standar"], ["cooperation", "Cooperation"], ["kerahasiaan-data", "Kerahasiaan Data"], ["technical-and-organizational-measures", "TECHNICAL AND ORGANIZATIONAL MEASURES"]], "size": 51, "id": "data-secrecy", "related": [["privacy-and-data-security", "Privacy and Data Security", "Privacy and Data Security"], ["confidentiality-and-data-security", "Confidentiality and Data Security", "Confidentiality and Data Security"], ["privacy-and-data-protection", "Privacy and Data Protection", "Privacy and Data Protection"], ["data-protection-and-confidentiality", "Data Protection and Confidentiality", "Data Protection and Confidentiality"], ["data-security", "Data Security", "Data Security"]], "related_snippets": [], "updated": "2025-07-24T06:49:03+00:00", "also_ask": ["What are the essential elements to include for robust data secrecy protection?", "How can data secrecy clauses be tailored to address cross-border data transfers?", "What are the most common pitfalls that render data secrecy clauses unenforceable?", "How do courts typically interpret and enforce data secrecy provisions?", "What negotiation leverage points exist when defining the scope of protected data?"], "drafting_tip": "Define confidential information precisely to avoid ambiguity, specify permitted disclosures to ensure compliance, and outline security measures to protect sensitive data.", "explanation": "The Data Secrecy clause is designed to protect confidential or sensitive information shared between parties during the course of their relationship. It typically requires each party to keep such information private, restricts disclosure to unauthorized third parties, and may outline specific measures for safeguarding data, such as encryption or secure storage. By establishing clear obligations regarding the handling of confidential data, this clause helps prevent unauthorized access or leaks, thereby reducing the risk of data breaches and maintaining trust between the parties."}, "json": true, "cursor": ""}}