Encryption of Personal Data Clause Samples

Encryption of Personal Data. All data, including personal data, is encrypted in transit using TLS encryption technology. TLS connections are negotiated for at least 256-bit encryption or stronger.
Encryption of Personal Data. To the extent that Personal Data, and/or Director information (the “Data”) is held and/or processed by the Contractor, the Contractor shall comply at all times with the Data Protection Legislation and ensure that where such Personal Data and/or the Data is put onto removable media (including but not limited to memory sticks, diskettes, ZIP and JAZ) and laptops, such information transferred is kept at a minimum necessary to perform the Services. Where Personal Data or the Data is transferred onto removable media (including but not limited to memory sticks diskettes, ZIP and JAZ) and laptops, the Contractor shall employ industry standard encryption algorithm techniques approved by the Director. Unattended equipment must have appropriate security protection (locked screen savers, key-locks, encryption, terminal time-out, physical removal or physical security of the location)
Encryption of Personal Data. 1.1. Futurae has implemented encryption to adequately and effectively protect Personal Data using: 1.1.1. best-in-class encryption protocols designed to provide protection against active or passive attacks with resources known to be available to public authorities; 1.1.2. trustworthy public-key certification authorities and infrastructure; 1.1.3. effective encryption algorithms and parameterisation, such as a minimum of 256-bit key lengths for symmetric encryption, and at least 2048-bit RSA or 256-bit ECC key lengths for asymmetric algorithms.
Encryption of Personal Data. Encryption
Encryption of Personal Data. SDS must encrypt the personally identification information (ex. Social Security Number), the password, and the bio information, credit card number, bank account number when stored in database. However, if the password is stored, it shall be stored in one-way encryption so as not to be decrypted.
Encryption of Personal Data. Have in place appropriate and reasonable Technical and Organizational Measures to protect the security of Personal Data and Company Data and prevent a Data Security Breach, including, without limitation, a Data Security Breach resulting from or arising out of acting on behalf of VENDOR. VENDOR shall implement Technical and Organizational Measures to ensure a level of security appropriate to the risk, taking into account the state -of-the-art, the costs of implementation, and the nature, scope, context and purposes of Processing, as well as, in connection with Personal Data, the risks of varying likelihood and severity for the rights and freedoms of data subjects. Without limiting the generality of the foregoing, the VENDOR will implement measures designed to:

Related to Encryption of Personal Data

  • Protection of Personal Data 25.1 The Parties agree that they may obtain and have access to personal data for the duration of the Agreement for the fulfilment of the rights and obligations contained herein. In performing the obligations as set out in this Agreement, the Parties shall at all times ensure that: a) they process data only for the express purpose for which it was obtained; b) once processed for the purposes for which it was obtained, all data will be destroyed to an extent that it cannot be reconstructed to its original form; c) data is provided only to authorised personnel who strictly require the personal data to carry out the Parties’ respective obligations under this Agreement; d) they do not disclose personal data of the other Party, other than in terms of this Agreement; e) they have all reasonable technical and organisational measures in place to protect all personal data from unauthorised access and/or use; f) they have appropriate technical and organisational measures in place to safeguard the security, integrity and authenticity of all data in its possession or under its control in terms of this Agreement; g) such personal data is protected against unauthorised or unlawful processing, accidental loss, destruction or damage, alteration, disclosure or access. 25.2 The Parties agree that if personal data will be processed for additional purposes beyond the original purpose for which it was obtained, explicit consent must be obtained beforehand from those persons whose information will be subject to further processing. 25.3 Should it be necessary for either Party to disclose or otherwise make available the personal data to any third party (including sub-contractors and employees), it may do so only with the prior written permission of the other Party. The Party requiring such permission shall require of all such third parties, appropriate written undertakings to be provided, containing similar terms to that set forth in this clause 25, and dealing with that third party's obligations in respect of its processing of the personal data. Following approval by the other Party, the Party requiring permission agrees that the provisions of this clause 25 shall mutatis mutandis apply to all authorised third parties who process personal data. 25.4 The Parties shall ensure that any persons authorized to process data on their behalf (including employees and third parties) will safeguard the security, integrity and authenticity of all data. Where necessary to meet this requirement, the Parties shall keep all personal data and any analyses, profiles, or documents derived therefrom logically separated from all other data and documentation held by it. 25.5 The Parties shall carry out regular assessments to identify all reasonably foreseeable internal and external risks to the personal data in its possession or under its control. The Parties shall implement and maintain appropriate safeguards against the risks which it identifies and shall also regularly verify that the safeguards which it has in place has been effectively implemented. 25.6 The Parties agree that they will promptly return or destroy any personal data in their possession or control which belongs to the other Party once it no longer serves the purpose for which it was collected in relation to this Agreement, subject to any legal retention requirements. This may be at the request of the other Party and includes circumstances where a person has requested the Parties to delete all instances of their personal data. The information will be destroyed in such a manner that it cannot be reconstructed to its original form, linking it to any particular individual or organisation.

  • Use of Personal Data By executing this Stock Agreement, Participant acknowledges and agrees to the collection, use, processing and transfer of certain personal data, including his or her name, salary, nationality, job title, position and details of all past Awards and current Awards outstanding under the Plan (“Data”), for the purpose of managing and administering the Plan. The Participant is not obliged to consent to such collection, use, processing and transfer of personal data, but a refusal to provide such consent may affect his or her ability to participate in the Plan. The Company, or its Subsidiaries, may transfer Data among themselves or to third parties as necessary for the purpose of implementation, administration and management of the Plan. These various recipients of Data may be located elsewhere throughout the world. The Participant authorizes these various recipients of Data to receive, possess, use, retain and transfer the Data, in electronic or other form, for the purposes of implementing, administering and managing the Plan. The Participant may, at any time, review Data with respect to the Participant and require any necessary amendments to such Data. The Participant may withdraw his or her consent to use Data herein by notifying the Company in writing; however, the Participant understands that by withdrawing his or her consent to use Data, the Participant may affect his or her ability to participate in the Plan.

  • Processing of Personal Data 1.1. With regard to the Processing of Personal Data, You are the controller and determine the purposes and means of Processing of Personal Data You provide to Us (“Controller”) and You appoint Us as a processor (“Processor”) to process such Personal Data (hereinafter, “Data”) on Your behalf (hereinafter, “Processing”). 1.2. The details of the type and purpose of Processing are defined in the Exhibits attached hereto. Except where the DPA stipulates obligations beyond the Term of the Agreement, the duration of this DPA shall be the same as the Agreement Term. 1.3. You shall be solely responsible for compliance with Your obligations under the applicable Data Protection Laws, including, but not limited to, the lawful disclosure and transfer of Personal Data to Us by upload of source data into the Cloud Service or otherwise. 1.4. Processing shall include all activities detailed in this Agreement and the instructions issued by You. You may, in writing, modify, amend, or replace such instructions by issuing such further instructions to the point of contact designated by Us. Instructions not foreseen in or covered by the Agreement shall be treated as requests for changes. You shall, without undue delay, confirm in writing any instruction issued orally. Where We believe that an instruction would be in breach of applicable law, We shall notify You of such belief without undue delay. We shall be entitled to suspend performance on such instruction until You confirm or modify such instruction. 1.5. We shall ensure that all personnel involved in Processing of Customer Data and other such persons as may be involved in Processing shall only do so within the scope of the instructions. We shall ensure that any person Processing Customer Data is subject to confidentiality obligations similar to the confidentiality terms of the Agreement. All such confidentiality obligations shall survive the termination or expiration of such Processing.

  • Types of Personal Data Contact Information, the extent of which is determined and controlled by the Customer in its sole discretion, and other Personal Data such as navigational data (including website usage information), email data, system usage data, application integration data, and other electronic data submitted, stored, sent, or received by end users via the Subscription Service.

  • Transfer of Personal Data The Participant authorizes, agrees and unambiguously consents to the transmission by the Company (or any Subsidiary) of any personal data information related to the RSUs awarded under this Agreement for legitimate business purposes (including, without limitation, the administration of the Plan). This authorization and consent is freely given by the Participant.