Description of Data Processing Clause Samples

POPULAR SAMPLE Copied 1 times
Description of Data Processing. Subject of the Data Processing
Description of Data Processing. Subject of the Data Processing Operation of a social media management tool that allows the client to centrally manage various social media channels, communicate with users of the social media channels, and schedule and publish content.
Description of Data Processing. ● Subject : Client data; ● Duration : the duration of data retention depends on the Customer's choice except in the event of a legitimate request in particular from a judicial or administrative authority, in which case the duration of data retention will depend on the legal limitation period; ● Nature and purpose of the processing: the Service provided may include storage operations, data calculation or any other service defined within the Contract; ● Categories of data: any categories of data uploaded in the context of the use of a Service subscribed through Client’s Scaleway account;
Description of Data Processing. Please see Appendix 2 of the DPA for a description of the data subjects, categories of data, special categories of data and processing operations.
Description of Data Processing a. Subject matter and duration. The subject matter of the processing of Personal Data is the performance of the Product including compatible services. The duration of data processing is for the Term.
Description of Data Processing. The description of data processing services provided by Jitterbit relates to the specific features/ services of the Jitterbit Platform Customer has selected, which is reflected in Customer’s Order Form, and a processing Annex is incorporated into the DPA by this reference, as applicable. Jitterbit Harmony ▇▇▇▇▇://▇▇▇.▇▇▇▇▇▇▇▇▇.▇▇▇/wp-content/uploads/Annex-I-Description-of-Data- Processing-Jitterbit-Harmony-rev-08.31.pdf Jitterbit Vinyl ▇▇▇▇▇://▇▇▇.▇▇▇▇▇▇▇▇▇.▇▇▇/wp-content/uploads/Annex-I-Description-of-Data- Processing-Jitterbit-Vinyl-rev-08.31.pdf Jitterbit Harmony EDI + eiCloud ▇▇▇▇▇://▇▇▇.▇▇▇▇▇▇▇▇▇.▇▇▇/wp-content/uploads/Annex-I-Description-of-Data- Processing-Jitterbit-Harmony-EDI-eiCloud-rev-10.04-clean.pdf ▇▇▇▇▇ ▇▇ TECHNICAL AND ORGANISATIONAL MEASURES INCLUDING TECHNICAL AND ORGANISATIONAL MEASURES TO ENSURE THE SECURITY OF THE DATA Description of the technical and organisational measures implemented by the data importer(s) (including any relevant certifications) to ensure an appropriate level of security, taking into account the nature, scope, context and purpose of the processing, and the risks for the rights and freedoms of natural persons.
Description of Data Processing. Categories of Data Subjects Customer clients (or Customer’s customers’ clients) Categories of Customer Personal Data Name, Bank Account, Payment Details Duration of Processing Duration of the supply of the Services Nature and purpose of Processing To process payments in accordance with the description of the Services 11.1 Each party may be given access to Confidential Information from the other party in order to perform its obligations under this Agreement. A party's Confidential Information shall not be deemed to include information that: 11.1.1 is or becomes publicly known other than through any act or omission of the receiving party; 11.1.2 was in the other party's lawful possession before the disclosure; 11.1.3 is lawfully disclosed to the receiving party by a third party without restriction on disclosure; 11.1.4 is independently developed by the receiving party, which independent development can be shown by written evidence; or 11.1.5 is required to be disclosed by law, by any court of competent jurisdiction or by any regulatory or administrative body. 11.2 Each party shall (i) hold the other's Confidential Information in confidence and, unless required by law, not make the other's Confidential Information available to any third party, or use the other's Confidential Information for any purpose other than the implementation of this Agreement; and (ii) take all reasonable steps to ensure that the other's Confidential Information to which it has access is not disclosed or distributed by its employees or agents in violation of the terms of this Agreement. Neither party shall be responsible for any loss, destruction, alteration or disclosure of Confidential Information caused by any third-party. 11.3 Customer acknowledges that details of the Software, Documentations, Services, Development Services, APT Data, feedback on the Services and the results of any performance (including security) tests of the Services, constitute APT's Confidential Information. APT acknowledges that the Customer Data is the Confidential Information of Customer. 11.4 On termination of this Agreement or when requested to do so in writing by the disclosing party, the receiving party shall promptly: 11.4.1 permanently delete, destroy and erase all electronic copies of the Confidential Information from any computer or data storage system into which the Confidential Information was entered; and 11.4.2 make no further use of the Confidential Information. Clause 11.4.1 shall not apply to ...
Description of Data Processing. The data processing activities carried out by Uniform under the Agreement may be described as follows:
Description of Data Processing. Please see Section 3.4 (Details of Processing) of DPA for a description of the data subjects, categories of data, special categories of data and processing operations.
Description of Data Processing. (a) The personal data covered by this order processing and the purposes of the processing are described in Appendix 1 to this Agreement. Appendix 1 forms an integral part of this Agreement and may be amended unilaterally by the Controller from time to time. (a) The Controller shall ensure: (1) that the transfer of personal data and the processing of such data by the Processor as set out in this Agreement are permissible under applicable law and the Controller ensures that the transfer to the Contractor is carried out in accordance with applicable law; and (2) that no other statutory provision prohibits the transfer of data processing.