Processing Control Clause Samples

Processing Control. All processing by Sprinklr is conducted on behalf and at the instruction of the Customer. Processes and technical controls in place to enforce this control are reviewed on a periodic basis. All data critical for the operation of Sprinklr’s services including sensitive and Customer Data are protected by multiple controls to ensure continuous protection of such data. These controls include runtime mechanisms including redundant storage of operational data, multiple backups, and other industry standard controls as applicable.
Processing Control. Ensuring compliant data processing in accordance with instructions. Measures (technical/organizational) for defining the responsibilities between the Client and the Supplier: ● The software and system architecture allow for the implementation of instructions from the client regarding the input, modification, or removal of personal data. ● The selection of subcontractors by the Supplier has been conducted with careful consideration, particularly regarding data security. ● Control rights over the Supplier have been defined. ● The Supplier’s employees are bound by confidentiality obligations. ● Data destruction after the completion of the assignment is ensured.
Processing Control. Control of contract performance • The contract contains detailed information on the purpose of the controller’s personal data as well as the prohibition of use of the personal data by the processor not specified in the contract • The contract contains detailed information on the nature of the data processing and the use of personal data by the controller • The processor designated a data protection officer and ensures appropriate and effective involvement in relevant operational processesData Processing Agreements are in place with all other relevant processors • A comprehensive order procedure is in place including the existence of an offer and orderPlacing an order is a formalised procedure (form) • A general security concept is in place • All employees with access rights have committed themselves to confidentiality in written form • All employees received instructions/guidelines/leaflets giving information on measures implemented to ensure a security of data as well as IT security • If an error occurs with regards to the processing of data or if the processor becomes aware of a personal data breach they will inform the controller immediately

Related to Processing Control

  • Data Input Control It will be possible to retrospectively examine and establish whether and by whom Personal Data have been entered, modified or removed from SAP data processing systems.

  • Data Processing Agreement The Data Processing Agreement, including the Approved Data Transfer Mechanisms (as defined in the Data Processing Agreement) that apply to your use of the Services and transfer of Personal Data, is incorporated into this Agreement by this reference. Each party will comply with the terms of the Data Processing Agreement and will train its employees on DP Law.

  • Input Control Detection: We designed our infrastructure to log extensive information about the system behavior, traffic received, system authentication, and other application requests. Internal systems aggregate log data and alert appropriate employees of malicious, unintended, or anomalous activities. Our personnel, including security, operations, and support personnel, are responsive to known incidents. Response and tracking: We maintain a record of known security incidents that includes description, dates and times of relevant activities, and incident disposition. Suspected and confirmed security incidents are investigated by security, operations, or support personnel; and appropriate resolution steps are identified and documented. For any confirmed incidents, we will take appropriate steps to minimize product and Customer damage or unauthorized disclosure. Notification to you will be in accordance with the terms of the Agreement.