Risks of Data Processing and Mitigation Measures Sample Clauses

Risks of Data Processing and Mitigation Measures. [The parties have conducted data protection impact assessments dated [insert date] in respect of the Processing and sharing arrangements set out in the Contract.] The parties have determined the following risks may arise from Processing the Relevant Personal Data, and have agreed measures to remove or mitigate such risks, including those measures set out in the Contract: [Guidance note: before Processing any personal data, MOPAC should consider if a DPIA is required. In this instance (if the processing necessitates this – please refer to the DPIA policy) a joint DPIA will be required for the joint processing and a DPIA produced by MOPAC for the evaluation it will be undertaking.] If DPIAs have been undertaken leave in the wording in yellow and add the dates of the DPIAs. Even if a DPIA has not been undertaken, any perceived risks with the data Processing and mitigations should be included, for example if there was a concern that individuals may not know that their personal data would be processed in this way, the mitigation could be to update the privacy notice and journey to make this clear and if necessary have a pop up telling them their data is shared too at a certain point in the journey].
AutoNDA by SimpleDocs

Related to Risks of Data Processing and Mitigation Measures

  • Details of Data Processing (a) Subject matter: The subject matter of the data processing under this DPA is the Customer Data.

  • Mitigation Measures Company shall take commercially reasonable measures (except measures causing it to incur out-of-pocket expenses which BNYM does not agree in advance to reimburse) to mitigate losses or potential losses to BNYM, including taking verification, validation and reconciliation measures that are commercially reasonable or standard practice in the Company’s business.

  • Safeguard Measures 1. The Parties note the multilateral negotiations pursuant to Article X of GATS on the question of emergency safeguard measures based on the principle of non- discrimination. Upon the conclusion of such multilateral negotiations, the Parties shall conduct a review for the purpose of discussing appropriate amendments to this Agreement so as to incorporate the results of such multilateral negotiations.

  • Joint Network Implementation and Grooming Process Upon request of either Party, the Parties shall jointly develop an implementation and grooming process (the “Joint Grooming Process” or “Joint Process”) which may define and detail, inter alia:

  • Bilateral Safeguard Measures 1. Where, as a result of the reduction or elimination of a customs duty under this Agreement, any product originating in a Party is being imported into the territory of another Party in such increased quantities, in absolute terms or relative to domestic production, and under such conditions as to constitute a substantial cause of serious injury or threat thereof to the domestic industry of like or directly competitive products in the territory of the importing Party, the importing Party may take bilateral safeguard measures to the minimum extent necessary to remedy or prevent the injury, subject to the provisions of paragraphs 2 to 10.

  • Technical Safeguards 1. USAC and the Department will process the data matched and any data created by the match under the immediate supervision and control of authorized personnel to protect the confidentiality of the data, so unauthorized persons cannot retrieve any data by computer, remote terminal, or other means.

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes.

  • Safety Measures Awarded vendor shall take all reasonable precautions for the safety of employees on the worksite, and shall erect and properly maintain all necessary safeguards for protection of workers and the public. Awarded vendor shall post warning signs against all hazards created by the operation and work in progress. Proper precautions shall be taken pursuant to state law and standard practices to protect workers, general public and existing structures from injury or damage.

  • Switching System Hierarchy and Trunking Requirements For purposes of routing ECI traffic to Verizon, the subtending arrangements between Verizon Tandem Switches and Verizon End Office Switches shall be the same as the Tandem/End Office subtending arrangements Verizon maintains for the routing of its own or other carriers’ traffic (i.e., traffic will be routed to the appropriate Verizon Tandem subtended by the terminating End Office serving the Verizon Customer). For purposes of routing Verizon traffic to ECI, the subtending arrangements between ECI Tandem Switches and ECI End Office Switches shall be the same as the Tandem/End Office subtending arrangements that ECI maintains for the routing of its own or other carriers’ traffic.

  • Rights Protection Mechanisms and Abuse Mitigation ­‐ Registry Operator commits to implementing and performing the following protections for the TLD:

Time is Money Join Law Insider Premium to draft better contracts faster.