Processing Activities Sample Clauses

Processing Activities. Dropbox, Dropbox personnel, and Sub-processors will only Process Customer Data to provide the Services and to fulfill Dropbox's obligations in this Agreement. The categories of Personal Data to be Processed by Dropbox and the Processing activities to be performed under this Agreement are set out in Exhibit A.
AutoNDA by SimpleDocs
Processing Activities. Oracle may Process Personal Information as necessary to perform the Services, including where applicable for hosting and storage; backup and disaster recovery; service change management; issue resolution; applying new product or system versions, patches, updates and upgrades; monitoring and testing system use and performance; IT security purposes including incident management; maintenance and performance of technical support systems and IT infrastructure; and migration, implementation, configuration and performance testing.
Processing Activities. The Processing activities that the Data Processor will perform under the Main Agreement are • Provision of services to Data ControllerTechnical Support including fault correction in accordance with Service Level Agreements (SLA)/ Maintenance & Support Agreements (M&S) • Application maintenanceApplication developmentTesting activities • Analysing and statistical activities • Marketing activities on behalf of Data Controller (when expressly agreed with Data Controller) • Data cleansing, correction of corrupted data 3 Categories of data subjects The categories of data subjects affected are • Data Controller´s employees and consultants and Data Controller´s representatives
Processing Activities. 2.1. Customer and Datasite agree that Customer is the Controller of Personal Data and Datasite is the Processor of such data, except when Customer acts as a processor of Personal Data, in which case Datasite is a subprocessor.
Processing Activities. Art. 4. (1) The Policy applies to all personal data processing activities of INTERCAPITAL MARKETS AD.
Processing Activities. The Processor may use such type of Processing activity that is necessary to provide the Service to the Customer, fulfil the terms of this DPA and Applicable Data Protection Legislation, such as: - any Processing activity or set of Processing which is performed on Personal data or on sets of Personal data, whether or not by automated means, in order to for example: create a User account, handle support cases, comply with the obligations stated in this DPA, the Terms of Service, the Terms of Use and to provide the Service. LOCATION FOR PROCESSING OF PERSONAL DATA Locations where Personal data will be Processed by the Processor: - Within EU/EEA and through Sub-processors located within or outside of the EU/EEA, as approved by the Controller (see Appendix 2).
AutoNDA by SimpleDocs
Processing Activities. The Data Processor will in agreement with Data Controller point out one or more administrator that can access the Data Controller’s setup and data in order to carry out support services. This includes, but is not limited to, the following processing activities: • Identification of information of the Data Controller’s projects, respondents and client companies • Identification of the Data Controller users • Identification of users and respondent’s technical setup in scope of using the service The processing activities will take place as long as the Services are provided under the Agreement and storing of Personal Data to the extent permissible under the DPA and applicable law.
Processing Activities. 3.1 The Supplier shall undertake the Processing Activities on the Personal Data for the Business Purpose and in compliance with the Customer’s instructions from time to time. In respect of the Processing Activities and the Personal Data, the Supplier shall only act on the instructions given by the Customer during the Term where those instructions are provided in writing
Processing Activities. The following processing activities will be carried out by the Processor on behalf of the Controller: [Collection of data on the Controller’s websites either via direct submissions from visitors on the Controller’s websites or from behavioral analytics tracking the Controller’s website, systematization and analysis of data and storing of data via sub-processors and thus transferring data to sub- processors. Data will be accessed by the Processor for the purpose of maintenance, global analytics or support to the Controller. Upon instruction from the Controller, the Processor forwards the Controller’s data to third parties appointed by the Controller.] PRE-APPROVED SUB-PROCESSORS The following sub-processors used by the Processor are pre-approved by the Controller: Amazon Web Services, Inc The Rocket Science Group, LLC (Mailchimp) Help Scout, Inc APPENDIX 2 This appendix constitutes a part of the DPA and must be filled out by the Parties. The Parties have agreed to the following security measures to be taken in connection with the Processors processing of personal data on behalf of the Controller: PHYSICAL ACCESS CONTROL Measures to prevent physical access of unauthorized persons to IT systems that handle personal data: [Buildings and systems used for data processing are safe. Data processing media is stored properly and is not available to unauthorized third parties, thus such media is kept locked when unattended. The Processor only uses high-quality hard- and software and continues to update these if relevant.] SYSTEM ACCESS CONTROL Measures to prevent unauthorized persons from using IT systems: [The Processor maintains an authentication system for accessing personal data processing systems. Employee accounts are not shared and inactive sessions are terminated after 30 minutes.] DATA ACCESS CONTROL Measures to ensure that the Processors employees only have access to the personal data pursuant to their access rights: [The access to personal data is role based. Data can only be accessed by the Processor or the Controller. The Processor has introduced login and password procedures ensuring that only employees with access rights have access to personal data. The Processor keeps a list of employees that have access to the Controller’s data, and only key employees have access to databases.] TRANSMISSION ACCESS CONTROL Measures to ensure that personal data cannot be read, copied, altered or deleted by unauthorized persons during electronic transmission or during ...
Time is Money Join Law Insider Premium to draft better contracts faster.