Common use of Input Control Clause in Contracts

Input Control. XXXXxx.xxx has implemented suitable measures to ensure that it is possible to check and establish whether and by whom Personal Data have been input into Personal Data Processing systems or removed. This is accomplished by: ● Authentication of the authorized personnel; ● Protective measures for Personal Data input into memory, as well as for the reading, alteration and deletion of stored Personal Data, including by documenting or logging material changes to account data or account settings; ● Segregation and protection of all stored Personal Data via database schemas, logical access controls, and/or encryption; ● Utilization of user identification credentials; ● Physical security of data processing facilities; ● Session timeouts.

Appears in 2 contracts

Samples: Data Processing Agreement, Data Processing Agreement

AutoNDA by SimpleDocs

Input Control. XXXXxx.xxx Xxxxxxxx.xx has implemented suitable measures to ensure that it is possible to check and establish whether and by whom Personal Data have been input into Personal Data Processing systems or removed. This is accomplished by: ● Authentication of the authorized personnel; ● Protective measures for Personal Data input into memory, as well as for the reading, alteration and deletion of stored Personal Data, including by documenting or logging material changes to account data or account settings; ● Segregation and protection of all stored Personal Data via database schemas, logical access controls, and/or encryption; ● Utilization of user identification credentials; ● Physical security of data processing facilities; ● Session timeouts.

Appears in 1 contract

Samples: Data Processing Agreement

Input Control. XXXXxx.xxx UNIZEN has implemented suitable measures to ensure that it is possible to check and establish whether and by whom Personal Customer Data have been input entered into Personal Data Processing systems or removed. This is accomplished by: ● Authentication of the authorized personnel; ● Protective measures for Personal Data input into memory, as well as for the reading, alteration and deletion of stored Personal Data, including by documenting or logging material changes to account data or account settings; ● Segregation and protection of all stored Personal Data via database schemas, logical access controls, and/or encryption; ● Utilization of user identification credentials; ● Physical security of data processing facilities; ● Session timeouts.

Appears in 1 contract

Samples: go.teamleader.eu

Input Control. XXXXxx.xxx Commuty has implemented suitable measures to ensure that it is possible to check and establish whether and by whom Personal Data have been input into Personal Data Processing systems or removed. This is accomplished by: Authentication of the authorized personnel; Protective measures for Personal Data input into memory, as well as for the reading, alteration and deletion of stored Personal Data, including by documenting or logging material changes to account data or account settings; Segregation and protection of all stored Personal Data via database schemas, logical access controls, and/or encryption; Utilization of user identification credentials; Physical security of data processing facilities; Session timeouts.

Appears in 1 contract

Samples: Data Processing Agreement

AutoNDA by SimpleDocs

Input Control. XXXXxx.xxx Platformly has implemented suitable measures to ensure that it is possible to check and establish whether and by whom Personal Data have been input into Personal Data Processing systems or removed. This is accomplished by: ● Authentication of the authorized personnel; ● Protective measures for Personal Data input into memory, as well as for the reading, alteration and deletion of stored Personal Data, including by documenting or logging material changes to account data or account settings; ● Segregation and protection of all stored Personal Data via database schemas, logical access controls, and/or encryption; ● Utilization of user identification credentials; ● Physical security of data processing facilities; ● Session timeouts.

Appears in 1 contract

Samples: Data Processing Agreement

Time is Money Join Law Insider Premium to draft better contracts faster.