{"component": "clause", "props": {"groups": [{"snippet_links": [{"key": "about-the-system", "type": "definition", "offset": [71, 87]}, {"key": "other-application", "type": "definition", "offset": [143, 160]}, {"key": "internal-systems", "type": "definition", "offset": [171, 187]}, {"key": "log-data", "type": "clause", "offset": [198, 206]}, {"key": "employees-of", "type": "clause", "offset": [229, 241]}, {"key": "our-personnel", "type": "definition", "offset": [290, 303]}, {"key": "support-personnel", "type": "definition", "offset": [341, 358]}, {"key": "record-of", "type": "clause", "offset": [432, 441]}, {"key": "security-incidents", "type": "clause", "offset": [448, 466]}, {"key": "dates-and-times", "type": "clause", "offset": [494, 509]}, {"key": "resolution-steps", "type": "clause", "offset": [683, 699]}, {"key": "unauthorized-disclosure", "type": "clause", "offset": [834, 857]}, {"key": "notification-to", "type": "clause", "offset": [859, 874]}, {"key": "in-accordance-with", "type": "clause", "offset": [887, 905]}, {"key": "the-terms-of-the-agreement", "type": "clause", "offset": [906, 932]}], "samples": [{"hash": "3sYCM6hbgsk", "uri": "/contracts/3sYCM6hbgsk#input-control", "label": "Data Processing Agreement", "score": 35.8565940857, "published": true}, {"hash": "exwjvWUKhWy", "uri": "/contracts/exwjvWUKhWy#input-control", "label": "Data Processing Agreement", "score": 35.1686134338, "published": true}, {"hash": "br4WIwUShoP", "uri": "/contracts/br4WIwUShoP#input-control", "label": "Data Processing Agreement", "score": 34.968788147, "published": true}], "snippet": "Detection: We designed our infrastructure to log extensive information about the system behavior, traffic received, system authentication, and other application requests. Internal systems aggregate log data and alert appropriate employees of malicious, unintended, or anomalous activities. Our personnel, including security, operations, and support personnel, are responsive to known incidents. Response and tracking: We maintain a record of known security incidents that includes description, dates and times of relevant activities, and incident disposition. Suspected and confirmed security incidents are investigated by security, operations, or support personnel; and appropriate resolution steps are identified and documented. For any confirmed incidents, we will take appropriate steps to minimize product and Customer damage or unauthorized disclosure. Notification to you will be in accordance with the terms of the Agreement.", "size": 17, "hash": "6d1a439eb787858fe7be1bd243800722", "id": 1}, {"snippet_links": [{"key": "determine-whether", "type": "clause", "offset": [43, 60]}, {"key": "personal-data", "type": "definition", "offset": [75, 88]}, {"key": "entered-into", "type": "clause", "offset": [93, 105]}, {"key": "data-processing-systems", "type": "clause", "offset": [131, 154]}, {"key": "definition-of", "type": "clause", "offset": [174, 187]}], "samples": [{"hash": "3dYij1DlBxl", "uri": "/contracts/3dYij1DlBxl#input-control", "label": "Data Processing Agreement", "score": 33.4137001038, "published": true}, {"hash": "9BwjdtAw0JE", "uri": "/contracts/9BwjdtAw0JE#input-control", "label": "Data Processing Agreement", "score": 32.6019287109, "published": true}, {"hash": "4lma7mKwaFE", "uri": "/contracts/4lma7mKwaFE#input-control", "label": "Data Processing Agreement", "score": 32.4352874756, "published": true}], "snippet": "The possibility to subsequently verify and determine whether, and by whom, personal data was entered into, changed or removed from data processing systems must be ensured. \u2022 Definition of entry authorisation \u2022 Logging of logins", "size": 16, "hash": "e323541224fee4f35473f6ad035d5384", "id": 2}, {"snippet_links": [{"key": "to-ensure", "type": "clause", "offset": [9, 18]}, {"key": "customer-data", "type": "clause", "offset": [82, 95]}, {"key": "data-processing-systems", "type": "clause", "offset": [116, 139]}, {"key": "authorized-personnel", "type": "definition", "offset": [189, 209]}, {"key": "protective-measures", "type": "definition", "offset": [214, 233]}, {"key": "data-input", "type": "clause", "offset": [242, 252]}, {"key": "deletion-of", "type": "clause", "offset": [309, 320]}, {"key": "stored-data", "type": "definition", "offset": [321, 332]}, {"key": "protection-of", "type": "definition", "offset": [353, 366]}, {"key": "logical-access-controls", "type": "definition", "offset": [404, 427]}, {"key": "data-importer", "type": "clause", "offset": [499, 512]}, {"key": "data-processing-facilities", "type": "clause", "offset": [589, 615]}, {"key": "computer-hardware", "type": "definition", "offset": [639, 656]}, {"key": "related-equipment", "type": "definition", "offset": [661, 678]}, {"key": "capable-of", "type": "definition", "offset": [684, 694]}], "samples": [{"hash": "hc1P5SBMhak", "uri": "/contracts/hc1P5SBMhak#input-control", "label": "Data Processing Addendum", "score": 27.4846000671, "published": true}, {"hash": "8TEvaxaXyKq", "uri": "/contracts/8TEvaxaXyKq#input-control", "label": "Data Processing Addendum", "score": 27.4846000671, "published": true}, {"hash": "6DintCqZd0U", "uri": "/contracts/6DintCqZd0U#input-control", "label": "Data Processing Addendum", "score": 26.7289524078, "published": true}], "snippet": "Measures to ensure that it is possible to check and establish whether and by whom Customer Data has been input into data processing systems or removed, to include:\na. authentication of the authorized personnel;\nb. protective measures for the data input into memory, as well as for the reading, alteration and deletion of stored data;\nc. Segregation and protection of stored data via database schemas and logical access controls;\nd. utilization of user codes (passwords);\ne. proof established within data importer\u2019s organization of the input authorization; and\nf. providing that entries to data processing facilities (the rooms housing the computer hardware and related equipment) are capable of being locked.", "size": 10, "hash": "e8d85ef09e21e50a3b71ae35eed0de94", "id": 3}, {"snippet_links": [{"key": "data-source", "type": "definition", "offset": [13, 24]}, {"key": "of-the-customer", "type": "clause", "offset": [46, 61]}, {"key": "data-integration", "type": "clause", "offset": [76, 92]}, {"key": "the-system", "type": "definition", "offset": [98, 108]}, {"key": "file-transfer", "type": "clause", "offset": [132, 145]}, {"key": "web-services", "type": "clause", "offset": [157, 169]}, {"key": "entered-into", "type": "clause", "offset": [173, 185]}, {"key": "the-application", "type": "clause", "offset": [186, 201]}, {"key": "cloud-services", "type": "clause", "offset": [237, 251]}, {"key": "in-such-cases", "type": "clause", "offset": [313, 326]}, {"key": "responsible-for", "type": "clause", "offset": [347, 362]}], "samples": [{"hash": "aPDSaDpovNF", "uri": "/contracts/aPDSaDpovNF#input-control", "label": "Data Processing Agreement", "score": 31.9805965424, "published": true}, {"hash": "f9ptSz3zCl1", "uri": "/contracts/f9ptSz3zCl1#input-control", "label": "Cloud Services Agreement", "score": 26.9027805328, "published": true}, {"hash": "jKkgHs175n", "uri": "/contracts/jKkgHs175n#input-control", "label": "Data Processing Agreement", "score": 21.9212875366, "published": true}], "snippet": "The Personal Data source is under the control of the Customer, and Personal Data integration into the system, is managed by secured file transfer (i.e., via web services or entered into the application) from the Customer. Note that some Cloud Services permit Customers to use unencrypted file transfer protocols. In such cases, Customer is solely responsible for its decision to use such unencrypted field transfer protocols.", "size": 10, "hash": "4616d9872c94e5105fb2755d8e331cfd", "id": 4}, {"snippet_links": [{"key": "deletion-of-personal-data", "type": "clause", "offset": [53, 78]}, {"key": "acting-employee", "type": "clause", "offset": [86, 101]}, {"key": "the-system", "type": "definition", "offset": [103, 113]}, {"key": "in-order-to", "type": "clause", "offset": [161, 172]}, {"key": "the-company-has", "type": "clause", "offset": [224, 239]}, {"key": "the-requirements", "type": "clause", "offset": [252, 268]}, {"key": "monitoring-and-logging", "type": "clause", "offset": [420, 442]}, {"key": "data-processing", "type": "clause", "offset": [453, 468]}, {"key": "random-check", "type": "clause", "offset": [469, 481]}], "samples": [{"hash": "hvl8C7E6TVg", "uri": "/contracts/hvl8C7E6TVg#input-control", "label": "Data Protection Agreement", "score": 31.1675987244, "published": true}, {"hash": "iTmyEOQyMdb", "uri": "/contracts/iTmyEOQyMdb#input-control", "label": "Data Protection Agreement", "score": 29.8536624908, "published": true}, {"hash": "38LdCtC1Vfv", "uri": "/contracts/38LdCtC1Vfv#input-control", "label": "Data Protection Agreement", "score": 29.8536624908, "published": true}], "snippet": "It must be possible to assign the input, change, and deletion of personal data to the acting employee. The system must limit the change and deletion of datasets in order to effectively prevent accidental change or deletion. The company has implemented the requirements as follows: Traceability of inputs, changes, and deletions by personalized users Traceability in assigning, changing, and deleting user authorizations Monitoring and logging automated data processing Random check of automated data processing", "size": 10, "hash": "741b65250ceb99f4ff2397272dde4e55", "id": 5}, {"snippet_links": [{"key": "responsible-for", "type": "clause", "offset": [49, 64]}, {"key": "data-entry", "type": "definition", "offset": [92, 102]}, {"key": "personal-data", "type": "definition", "offset": [149, 162]}, {"key": "dp-system", "type": "definition", "offset": [172, 181]}, {"key": "the-data", "type": "clause", "offset": [255, 263]}], "samples": [{"hash": "jRLTQvTfXvE", "uri": "/contracts/jRLTQvTfXvE#input-control", "label": "Data Privacy & Security", "score": 33.1686134338, "published": true}, {"hash": "e9MCEu56hgA", "uri": "/contracts/e9MCEu56hgA#input-control", "label": "Data Privacy & Security", "score": 33.1686134338, "published": true}, {"hash": "kqB3pCA9Fg5", "uri": "/contracts/kqB3pCA9Fg5#input-control", "label": "Data Protection Agreement", "score": 31.1698665619, "published": true}], "snippet": "The input control is intended to document who is responsible for (un)permitted or erroneous data entry. The goal is the auditability of the input of personal data into the DP system, which also includes non-networked individual workstations, such as PCs. The data entry to be checked includes the first-time storage as well as the change and deletion (removal) of data.", "size": 7, "hash": "f09c0b34298b344ed6fd7f147b3a8059", "id": 6}, {"snippet_links": [{"key": "personal-data", "type": "definition", "offset": [90, 103]}, {"key": "entered-into", "type": "clause", "offset": [114, 126]}, {"key": "data-processing-systems", "type": "clause", "offset": [127, 150]}], "samples": [{"hash": "7XoaNj1SLmL", "uri": "/contracts/7XoaNj1SLmL#input-control", "label": "Data Processing Addendum", "score": 33.4642486572, "published": true}, {"hash": "5l0azKYi3U7", "uri": "/contracts/5l0azKYi3U7#input-control", "label": "Data Processing Addendum", "score": 33.2588233948, "published": true}, {"hash": "9VXGphKDWju", "uri": "/contracts/9VXGphKDWju#input-control", "label": "Data Processing Addendum", "score": 32.4540672302, "published": true}], "snippet": "It must be ensured that it can be subsequently checked and determined whether and by whom personal data have been entered into data processing systems, changed or removed.", "size": 7, "hash": "13a863f168fe84f0099fba074f30834d", "id": 7}, {"snippet_links": [{"key": "about-the-system", "type": "definition", "offset": [76, 92]}, {"key": "other-application", "type": "definition", "offset": [148, 165]}, {"key": "internal-systems", "type": "definition", "offset": [176, 192]}, {"key": "log-data", "type": "clause", "offset": [204, 212]}, {"key": "employees-of", "type": "clause", "offset": [235, 247]}, {"key": "support-personnel", "type": "definition", "offset": [351, 368]}, {"key": "record-of", "type": "clause", "offset": [448, 457]}, {"key": "security-incidents", "type": "clause", "offset": [464, 482]}, {"key": "dates-and-times", "type": "clause", "offset": [510, 525]}, {"key": "resolution-steps", "type": "clause", "offset": [699, 715]}, {"key": "unauthorized-disclosure", "type": "clause", "offset": [855, 878]}, {"key": "access-to-customer-data", "type": "clause", "offset": [932, 955]}, {"key": "notify-the", "type": "clause", "offset": [1001, 1011]}, {"key": "provide-a", "type": "definition", "offset": [1051, 1060]}, {"key": "description-of-the", "type": "definition", "offset": [1061, 1079]}, {"key": "status-updates", "type": "clause", "offset": [1144, 1158]}, {"key": "customer-contact", "type": "clause", "offset": [1166, 1182]}, {"key": "of-the-customer", "type": "clause", "offset": [1283, 1298]}], "samples": [{"hash": "8NaMI4NnlOK", "uri": "/contracts/8NaMI4NnlOK#input-control", "label": "Data Processing Agreement", "score": 26.9466114044, "published": true}, {"hash": "fHIAg0n97Rd", "uri": "/contracts/fHIAg0n97Rd#input-control", "label": "Data Processing Agreement", "score": 25.1971244812, "published": true}], "snippet": "Detection: Insycle designed its infrastructure to log extensive information about the system behavior, traffic received, system authentication, and other application requests. Internal systems aggregated log data and alert appropriate employees of malicious, unintended, or anomalous activities. Insycle personnel, including security, operations, and support personnel, are responsive to known incidents. Response and tracking: Insycle maintains a record of known security incidents that includes description, dates and times of relevant activities, and incident disposition. Suspected and confirmed security incidents are investigated by security, operations, or support personnel; and appropriate resolution steps are identified and documented. For any confirmed incidents, Insycle will take appropriate steps to minimize product and Customer damage or unauthorized disclosure. Communication: If Insycle becomes aware of unlawful access to Customer data stored within its products, Insycle will: 1) notify the affected Customers of the incident; 2) provide a description of the steps Insycle is taking to resolve the incident; and 3) provide status updates to the Customer contact, as Insycle deems necessary. Notification(s) of incidents, if any, will be delivered to one or more of the Customer\u2019s contacts in a form Insycle selects, which may include via email or telephone.", "size": 6, "hash": "252fe969f8d8ee7f4539e3479c638e1a", "id": 8}, {"snippet_links": [{"key": "to-ensure", "type": "clause", "offset": [45, 54]}, {"key": "data-processing-systems", "type": "clause", "offset": [162, 185]}, {"key": "authorized-personnel", "type": "definition", "offset": [247, 267]}, {"key": "protective-measures", "type": "definition", "offset": [271, 290]}, {"key": "data-input", "type": "clause", "offset": [304, 314]}, {"key": "deletion-of", "type": "clause", "offset": [371, 382]}, {"key": "account-data", "type": "definition", "offset": [461, 473]}, {"key": "account-settings", "type": "clause", "offset": [477, 493]}, {"key": "protection-of", "type": "definition", "offset": [513, 526]}, {"key": "logical-access-controls", "type": "definition", "offset": [574, 597]}, {"key": "identification-credentials", "type": "definition", "offset": [640, 666]}, {"key": "data-processing-facilities", "type": "clause", "offset": [691, 717]}], "samples": [{"hash": "2U8IEtz1qxC", "uri": "/contracts/2U8IEtz1qxC#input-control", "label": "Data Processing Agreement", "score": 31.5261936188, "published": true}, {"hash": "egQJdjFUJTK", "uri": "/contracts/egQJdjFUJTK#input-control", "label": "Data Processing Agreement", "score": 24.527721405, "published": true}], "snippet": "\u2587\u2587\u2587\u2587\u2587\u2587.\u2587\u2587\u2587 has implemented suitable measures to ensure that it is possible to check and establish whether and by whom Personal Data have been input into Personal Data Processing systems or removed. This is accomplished by: \u25cf Authentication of the authorized personnel; \u25cf Protective measures for Personal Data input into memory, as well as for the reading, alteration and deletion of stored Personal Data, including by documenting or logging material changes to account data or account settings; \u25cf Segregation and protection of all stored Personal Data via database schemas, logical access controls, and/or encryption; \u25cf Utilization of user identification credentials; \u25cf Physical security of data processing facilities; \u25cf Session timeouts.", "size": 6, "hash": "98c6734c2725ced8580d70b805bd3fd2", "id": 9}, {"snippet_links": [{"key": "personal-data-processed", "type": "clause", "offset": [40, 63]}, {"key": "required-to-work", "type": "clause", "offset": [129, 145]}, {"key": "at-all-times", "type": "definition", "offset": [170, 182]}, {"key": "user-accounts", "type": "definition", "offset": [184, 197]}, {"key": "other-persons", "type": "definition", "offset": [237, 250]}], "samples": [{"hash": "8GQRKAP8zwc", "uri": "/contracts/8GQRKAP8zwc#input-control", "label": "Data Processing Agreement", "score": 33.3301200867, "published": true}, {"hash": "9DixehkB9GN", "uri": "/contracts/9DixehkB9GN#input-control", "label": "Data Processing Agreement", "score": 32.924987793, "published": true}, {"hash": "cDjcpBUeBMp", "uri": "/contracts/cDjcpBUeBMp#input-control", "label": "Data Processing Agreement", "score": 32.7662200928, "published": true}], "snippet": "The entry, modification and deletion of personal data processed by \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587.\u2587\u2587\u2587 on behalf is gen- erally logged. Employees are required to work with their own accounts at all times. User accounts may not be shared or used jointly with other persons.", "size": 5, "hash": "50940e76fa28c8d1e6fb35b2a6448e66", "id": 10}], "next_curs": "ClYSUGoVc35sYXdpbnNpZGVyY29udHJhY3RzcjILEhZDbGF1c2VTbmlwcGV0R3JvdXBfdjU2IhZpbnB1dC1jb250cm9sIzAwMDAwMDBhDKIBAmVuGAAgAA==", "clause": {"children": [["", ""], ["detection", "Detection"], ["availability-control", "Availability Control"], ["incident-response-management", "Incident Response Management"], ["review", "Review"]], "title": "Input Control", "parents": [["miscellaneous", "Miscellaneous"], ["integrity", "Integrity"], ["other-rights", "Other rights"], ["competent-supervisory-authority", "COMPETENT SUPERVISORY AUTHORITY"], ["final-provisions", "Final provisions"]], "size": 358, "id": "input-control", "related": [["data-input-control", "Data Input Control", "Data <strong>Input Control</strong>"], ["cost-control", "Cost Control", "Cost Control"], ["job-control", "Job Control", "Job Control"], ["traffic-control", "Traffic Control", "Traffic Control"], ["pest-control", "Pest Control", "Pest Control"]], "related_snippets": [], "updated": "2025-07-24T06:49:08+00:00"}, "json": true, "cursor": ""}}