Input Control Sample Clauses

Input Control. The possibility to subsequently verify and determine whether, and by whom, personal data was entered into, changed or removed from data processing systems must be ensured. • Definition of entry authorisation • Logging of logins
AutoNDA by SimpleDocs
Input Control. Detection: We designed our infrastructure to log extensive information about the system behavior, traffic received, system authentication, and other application requests. Internal systems aggregate log data and alert appropriate employees of malicious, unintended, or anomalous activities. Our personnel, including security, operations, and support personnel, are responsive to known incidents. Response and tracking: We maintain a record of known security incidents that includes description, dates and times of relevant activities, and incident disposition. Suspected and confirmed security incidents are investigated by security, operations, or support personnel; and appropriate resolution steps are identified and documented. For any confirmed incidents, we will take appropriate steps to minimize product and Customer damage or unauthorized disclosure. Notification to you will be in accordance with the terms of the Agreement.
Input Control. Measures to ensure that it is possible to check and establish whether and by whom Customer Data has been input into data processing systems or removed, to include:
Input Control. The Personal Data source is under the control of the Customer, and Personal Data integration into the system, is managed by secured file transfer (i.e., via web services or entered into the application) from the Customer. Note that some Cloud Services permit Customers to use unencrypted file transfer protocols. In such cases, Customer is solely responsible for its decision to use such unencrypted field transfer protocols.
Input Control. Detection: Insycle designed its infrastructure to log extensive information about the system behavior, traffic received, system authentication, and other application requests. Internal systems aggregated log data and alert appropriate employees of malicious, unintended, or anomalous activities. Insycle personnel, including security, operations, and support personnel, are responsive to known incidents. Response and tracking: Insycle maintains a record of known security incidents that includes description, dates and times of relevant activities, and incident disposition. Suspected and confirmed security incidents are investigated by security, operations, or support personnel; and appropriate resolution steps are identified and documented. For any confirmed incidents, Insycle will take appropriate steps to minimize product and Customer damage or unauthorized disclosure. Communication: If Insycle becomes aware of unlawful access to Customer data stored within its products, Insycle will: 1) notify the affected Customers of the incident; 2) provide a description of the steps Insycle is taking to resolve the incident; and 3) provide status updates to the Customer contact, as Insycle deems necessary. Notification(s) of incidents, if any, will be delivered to one or more of the Customer’s contacts in a form Insycle selects, which may include via email or telephone.
Input Control. XXXXxx.xxx has implemented suitable measures to ensure that it is possible to check and establish whether and by whom Personal Data have been input into Personal Data Processing systems or removed. This is accomplished by: ● Authentication of the authorized personnel; ● Protective measures for Personal Data input into memory, as well as for the reading, alteration and deletion of stored Personal Data, including by documenting or logging material changes to account data or account settings; ● Segregation and protection of all stored Personal Data via database schemas, logical access controls, and/or encryption; ● Utilization of user identification credentials; ● Physical security of data processing facilities; ● Session timeouts.
Input Control. The input control is intended to document who is responsible for (un)permitted or erroneous data entry. The goal is the auditability of the input of personal data into the DP system, which also includes non-networked individual workstations, such as PCs. The data entry to be checked includes the first-time storage as well as the change and deletion (removal) of data.
AutoNDA by SimpleDocs
Input Control. Measures to ensure it is possible to check and retrospectively determine whether information has been entered into internal data processing systems, modified while in those systems, or removed from them, and by whom.
Input Control. It must be possible to assign the input, change, and deletion of personal data to the acting employee. The system must limit the change and deletion of datasets in order to effectively prevent accidental change or deletion.
Input Control. Measures for subsequent verification of whether and by whom data has been entered, changed or removed (deleted) are implemented to the extent necessary. In systems used to collect and process personal data, access is categorized and automatically recorded. The integrity of log information is ensured.
Time is Money Join Law Insider Premium to draft better contracts faster.