Input Controls Sample Clauses

Input Controls. Data Processor shall take reasonable measures to provide that it is possible to check and establish whether and by whom service data has been entered into data processing systems, modified or removed. Data Processor shall take reasonable measures to ensure that (i) the Personal Data source is under the control of Data Controller; and (ii) Personal Data integrated into the Services is managed by secured transmission from Data Controller.
AutoNDA by SimpleDocs
Input Controls. Detection: We designed our infrastructure to log extensive information about the system behavior, traffic received, system authentication, and other application requests. Internal systems aggregate log data and alert appropriate personnel of malicious, unintended, or anomalous activities. Our personnel, including security, operations, and support personnel, are responsive to known incidents. Response and tracking: We maintain a record of known security incidents that includes description, dates and times of relevant activities, and incident disposition. Suspected and confirmed security incidents are investigated by security, operations, and/or support personnel; and appropriate resolution steps are identified and documented. For any confirmed incidents, we will take appropriate steps to minimize product and customer damage or unauthorized disclosure. Notifications will be in accordance with the terms of the Agreement.
Input Controls. Aircall shall take reasonable measures to provide that it is possible to check and establish whether and by whom Service Data has been entered into data processing systems, modified or removed. Aircall shall take reasonable measures to ensure that (i) the Personal Data source is under the control of the Customer; and (ii) Personal Data is integrated into the Service is managed by secured file transfer from the Customer.
Input Controls. Third-party service providers shall take reasonable measures designed to ensure that it is possible to check and establish whether and by whom Service Data has been entered into data processing systems, modified or removed; and, any of transfer of Service Data to a third-party service provider is made via a secure transmission.
Input Controls. The Contractor shall warrant that it can be subsequently verified and established whether and by whom personal data have been input, modified or removed in data processing systems. This shall be done by: ● central logging and log evaluation systems ● each employee having only the necessary access to the data required within the scope of his or her function/role (principle of minimum rights) ● application-level firewalls and intrusion detection systems being used to prevent and detect attacks
Input Controls. Our Sub-processors will take reasonable measures to ensure that it is possible to check and establish whether and by whom Service Data has been entered into data processing systems, modified or removed; and, any transfer of Service Data to a third-party service provider is made via a secure transmission.
Input Controls. Zendesk takes reasonable measures to provide that it is possible to check and establish whether and by whom Service Data has been entered into data processing systems, modified or removed; and, any transfer of Service Data to a third-party service provider is made via a secure transmission.
AutoNDA by SimpleDocs
Input Controls. Data Process shall take reasonable measures to provide that it is possible to check and establish whether and by whom Service Data has been entered into data processing systems, modified or removed; and, any transfer of Personal Data to a third-party service provider is made via a secure transmission.
Input Controls. Speexx shall take reasonable measures to provide that it is possible to check and establish whether and by whom Data has been entered into data processing systems, modified or removed. Measures implemented: Access rights based on job duties and utilizing least privilege. Approval process for access rights; periodical reviews and audits.
Input Controls the data importer shall take reasonable measures to provide that it is possible to check and establish whether and by whom personal data has been entered into data processing systems, modified or removed. Data importer shall take reasonable measures to ensure that (i) the personal data source is under the control of data exporter; and (ii) personal data integrated into data importer’s systems is managed by secured file transfer from the data importer and data subject.
Time is Money Join Law Insider Premium to draft better contracts faster.