Security Disclosures Sample Clauses

Security Disclosures. SAP is committed to the security and integrity of Customer Data within the SAP Cloud Services. SAP uses industry best- practice security measures to protect against the loss, misuse or alteration of the Customer Data under SAP’s control. To prevent unauthorized access, maintain data accuracy, and ensure the correct use of Customer Data, SAP has put in place physical, electronic, and operational procedures to safeguard and secure the information we collect within the SAP Cloud Services, which include the following: (a) multiple level firewalls to segregate and secure network segments based on system roles; (b) encryption of data transmissions over unsecured networks using TLS technology; (c) use of server-side and client-side digital certificates; (d) role-based administrative access policies and procedures; (e) data center co-location facilities using access cards, biometric authentication, and 24-hour surveillance cameras, and guards, to 7.5 보안 공개. SAP 는 SAP 클라우드 서비스 내에서 고객 데이터의 보안과 무결성을 위해 노력합니다. SAP 는 SAP 가 관리하는 고객 데이터가 손실, 오용, 또는 변형되지 않도록 보호하기 위해 업계 모범 사례 보안 조치를 사용합니다. 무단 액세스 방지, 데이터의 정확성 유지 및 고객 데이터의 정확한 사용 보장을 위해 SAP 는 SAP 클라우드 서비스 내에서 수집하는 정보를 보호하고 안전을 담보하기 위한 물리적, 전자적, 운영 절차를 마련했으며, 여기에는 다음 사항이 포함됩니다. (a) 시스템 역할에 따라 여러 네트워크 부문을 구분하고 보호하는 다단계의 방화벽, (b) TLS 기술을 이용한 보호되지 않는 네트워크상의 데이터 트랜잭션 암호화, (c) 서버 측 및 고객 측 전자인증서 사용, (d) 역할 기반의 관리 액세스 정책 및 절차, (e) 데이터 센터와 같이 위치한 시설에서 물리적 출입을 통제하기 위한 출입증, 생체측정 인증, 24 시간 감시 카메라 및 경비원, (f)
AutoNDA by SimpleDocs
Security Disclosures. SAP is committed to the security and integrity of Customer Data within the SAP Cloud Services. SAP uses industry best-practice security measures to protect against the loss, misuse or alteration of the Customer Data under SAP’s control. To prevent unauthorized access, maintain data accuracy, and ensure the correct use of Customer Data, SAP has put in place physical, electronic, and operational procedures to safeguard and secure the information we collect within the SAP Cloud Services, which include the following: (a) multiple level firewalls to segregate and secure network segments based on system roles; (b) encryption of data transmissions over unsecured networks using TLS technology; (c) use of server-side and client-side digital certificates; (d) role-based administrative access policies and procedures; (e) data center co-location facilities using access cards, biometric authentication, and 24-hour surveillance cameras, and guards, to control physical access; (f) comprehensive in-house performance and security monitoring and auditing; (g) intrusion detection and analysis; (h) detailed security policy, processes and procedures; (i) security integration into the SAP Software Development Lifecycle; and (j) security auditing performed on a recurring basis by outside consulting agencies. To provide for the availability of service and information within SAP Cloud Services, SAP has implemented the SAP Service Level Agreement, as set forth in the Order Form. The SAP Technical Overview document for the specific SAP Cloud Service to which Customer is subscribed contains detailed information concerning policies, procedures and architecture and is made available by SAP to Customer upon request.
Security Disclosures. SAP is committed to the security and integrity of Customer Data within the SAP Cloud Services. SAP uses industry best-practice security measures to protect against the loss, misuse or alteration of the Customer Data under SAP’s control. To prevent unauthorized access, maintain data accuracy, and ensure the correct use of Customer Data, SAP has put in place physical, electronic, and operational procedures to safeguard and secure the information we collect within the SAP Cloud Services, which include the following: (a) multiple level firewalls to segregate and secure network segments based on system roles; (b) encryption of data transmissions over unsecured networks using TLS technology; (c) use of server-side and client-side digital certificates; (d) role-based administrative access policies and procedures; (e) data center co-location facilities using access cards, biometric authentication, and 24-hour surveillance cameras, and guards, to control physical access; (f) comprehensive in-house performance and security monitoring and auditing; (g) intrusion detection and analysis; (h) detailed security policy, processes and procedures; (i) security integration into the SAP Software Development Lifecycle; and (j) security auditing performed on a recurring basis by outside consulting agencies. To provide for the availability of service and information within Cloud Services, SAP has implemented the SAP Service Level Agreement, as set forth in the Order Form. The SAP Technical Overview Rahasia Pelanggan. Contoh analisis termasuk: mengoptimalkan sistem, sumber daya teknis, xxx dukungan, riset xxx pengembangan Layanan Cloud xxx Layanan Konsultasi, verifikasi integritas data xxx keamanan, perencanaan permintaan internal, statistik industri xxx makroekonomi, serta penentuan tolok ukur anonim dengan Pelanggan lain. SAP dapat mengumpulkan statistik anonim xxx terkumpul tentang penggunaan Layanan Cloud secara umum. 8.4 Penentuan tolok ukur opsional xxx Analitik. SAP menawarkan program penentuan tolok ukur opsional untuk memfasilitasi analisis yang lebih dalam tentang praktik manajemen pengeluaran untuk perusahaan yang ingin berpartisipasi. SAP mengoperasikan program SAP data analytics xxx SAP benchmarking sesuai standar yang melindungi kerahasiaan informasi setiap pelanggan. Program-program ini memungkinkan SAP untuk menawarkan tinjauan dengan pelanggan yang menunjukkan cara pelanggan menggunakan Layanan Cloud dibandingkan penggunaan biasa oleh pelanggan lainnya berdasarka...
Security Disclosures. SAP is committed to the security and integrity of Customer Data within the SAP Cloud Services. SAP uses industry best-practice security measures to protect against the loss, misuse or alteration of the Customer Data under SAP’s control. To prevent unauthorized access, maintain data accuracy, and ensure the correct use of Customer Data, SAP has put in place physical, electronic, and operational procedures to safeguard and secure the information we collect within the SAP Cloud Services, which include the following: (a) multiple level firewalls to segregate and secure network segments based on system roles; (b) encryption of data transmissions over unsecured networks using TLS technology; (c) use of server-side and client-side digital certificates; (d) role- based administrative access policies and procedures; (e) data center co-location facilities using access cards, biometric authentication, and 24-hour surveillance cameras, and guards, to control physical access; (f) comprehensive in-house performance and security monitoring and auditing; (g) intrusion detection and analysis; (h) detailed security policy, processes and procedures; (i) security integration into the SAP Software Development Lifecycle; and (j) security auditing performed on a recurring basis by outside consulting agencies. To provide for the availability of service and information within SAP Cloud Services, SAP has implemented the SAP Service Level Agreement, as set forth in the Order Form. The SAP Technical Overview document for the specific SAP Cloud Service to which Customer is subscribed contains detailed information concerning policies, procedures and architecture and is made available by SAP to Customer upon request. 安全披露。SAP 致力于保证 SAP 云服务中的客户数据的安全性和完整性。SAP 采用行业最佳实践安全措施保护其所控制的客户数据免遭丢失、滥用或修改。为防止未经授权的访问、维持数据准确性并确保正确使用客户数据,SAP 实施了一系列物理、电子和操作程序来保障和保护我们在执行 SAP 云服务的过程中收集的信息,具体包括以下措施:(a)建立多级防火墙,基于系统角色隔离和保护网段的安全;(b) 使用 TLS 技术对通过没有安全保障的网络进行的数据传输实施加密;(c) 使用服务器端和客户端数字证书;(d) 基于角色的管理访问政策和程序;(e) 数据中心同地办公设施采用门禁卡、生物认证和 24 小时监控摄像头以及门卫来实施物理访问控制;(f) 综合内部绩效和安全监控和审查;(g) 入侵侦测和分析;(h) 详尽的安全政策、流程和程序;(i) 与 SAP 软件开发生命周期的安全集成;以及 (j) 由外部咨询机构定期执行的安全审查。为确保 SAP 云服务中的服务和信息的可用性,SAP 按照订购单中的相关规定实施了 SAP 服务水平协议。适用于客户所租用的特定 SAP 云服务的 SAP 技术概览文档包含与政策、程序和架构有关的详细信息,并由 SAP 根据请求提供给客户。
Security Disclosures. SAP is committed to the security and integrity of Customer Data within the SAP Cloud Services. SAP uses industry best-practice security measures to protect against the loss, misuse or alteration of the Customer Data under SAP’s control. To prevent unauthorized access, maintain data accuracy, and ensure the correct use of Customer Data, SAP has put in place physical, electronic, and operational procedures to safeguard and secure the information we collect within the SAP Cloud Services, which include the following: (a) multiple level firewalls to segregate and secure network segments based on system roles; (b) encryption of data transmissions over unsecured networks using TLS technology; (c) use of server-side and client-side digital certificates; (d) role-based administrative access policies and procedures; (e) data center co-location facilities using access cards, biometric authentication, and 24-hour surveillance cameras, and guards, to control physical access; (f) comprehensive in-house performance and security monitoring and auditing; (g) intrusion detection and analysis;
Security Disclosures. SAP is committed to the security and integrity of Customer Data within the SAP Cloud Services. SAP uses industry best-practice security measures to protect against the loss, misuse or alteration of the Customer Data under SAP’s control. To Sourcing Professional), untuk meningkatkan visibilitas Pelanggan terhadap calon pemasok, SAP dapat menganalisis secara sistematis aktivitas sourcing tertentu oleh Pelanggan dalam aplikasi Ariba Sourcing Professional xxx xxxxxx anonim berupaya untuk mencocokkan Pelanggan dengan calon pemasok baru atau menyoroti pemasok yang mungkin menarik bagi Pelanggan.
Security Disclosures. SAP is committed to the security and integrity of Customer Data within the SAP Cloud Services. SAP uses industry best-practice security measures to protect against the loss, misuse or alteration of the Customer Data under SAP’s control. To prevent unauthorized access, maintain data accuracy, and ensure the correct use of Customer Data, SAP has put in place physical, electronic, and operational procedures to safeguard and secure the information we collect within the SAP Cloud Services, which include the following: (a) multiple level firewalls to segregate and secure network segments based on system roles; (b) encryption of data transmissions over unsecured networks using TLS technology; (c) use of server-side and client-side digital certificates; (d) role-based administrative access policies and procedures;
AutoNDA by SimpleDocs

Related to Security Disclosures

  • Mandatory Disclosures In accordance with 2 CFR Part II, §200.113, Party must disclose, in a timely manner, in writing to the State, all violations of Federal criminal law involving fraud, bribery, or gratuity violations potentially affecting the Federal award. Failure to make required disclosures may result in the imposition of sanctions which may include disallowance of costs incurred, withholding of payments, termination of the Agreement, suspension/debarment, etc.

  • Certain Disclosures A Controlled Affiliate shall make adequate disclosure in contracting with third parties and in disseminating public statements of 1) the structure of the Blue Cross and Blue Shield System; and 2) the independent nature of every licensee; and 3) the Controlled Affiliate's financial condition.

  • ADV Disclosure The Adviser has provided the Trust with a copy of its Form ADV as most recently filed with the Commission and will, promptly after filing any amendment to its Form ADV with the Commission, furnish a copy of such amendments to the Trust. The information contained in the Adviser’s Form ADV is accurate and complete in all material respects and does not omit to state any material fact necessary in order to make the statements made, in light of the circumstances under which they were made, not misleading.

  • Mandatory Disclosure In the event that either party or their respective directors, officers, employees, consultants or agents are requested or required by legal process to disclose any of the Confidential Information of the other party, the party required to make such disclosure shall give prompt notice so that the other party may seek a protective order or other appropriate relief. In the event that such protective order is not obtained, the party required to make such disclosure shall disclose only that portion of the Confidential Information, which its counsel advises that it is legally required to disclose.

  • Data Disclosure Under Minnesota Statute § 270C.65, Subdivision 3 and other applicable law, the Contractor consents to disclosure of its social security number, federal employer tax identification number, and/or Minnesota tax identification number, already provided to the State, to federal and state agencies and state personnel involved in the payment of state obligations. These identification numbers may be used in the enforcement of federal and state laws which could result in action requiring the Contractor to file state tax returns, pay delinquent state tax liabilities, if any, or pay other state liabilities.

  • NEPOTISM DISCLOSURE A. In this section the term “relative” means:

  • Documentation of Disclosures Business Associate agrees to document disclosures of PHI and information related to such disclosures as would be required for a Covered Entity to respond to a request by an individual for an accounting of disclosures of PHI in accordance with 45 C.F.R. 164.528 and HITECH.

  • Transactions Affecting Disclosure to Nasd 2.18.1 Finder’s Fees. There are no claims, payments, arrangements, agreements or understandings relating to the payment of a finder’s, consulting or origination fee by the Company or any Existing Stockholder with respect to the sale of the Securities hereunder or any other arrangements, agreements or understandings of the Company or any Existing Stockholder that may affect the Underwriters’ compensation, as determined by the NASD.

  • Continuing Disclosure The Creditor may be required to provide you with regular statements. The statements will give you information about your account. Statements will be provided every six months if required. What Could Happen if You Fail to Meet Your Commitments: Security interestThe Creditor has an interest in the property listed below to secure performance of your obligations under the contract, or the payment of money payable under the contract, or both. If you fail to meet your commitments under the contract, including by granting a security interest over this property to another person, then to the extent of the security interest, the Creditor may be entitled to repossess and sell this property. If the sale of the property does not cover the whole of your liability to the Creditor, you will remain liable for the shortfall.Make: Model: Year: Registration No.: _ Chassis / Serial No.: Vin No: Colour: _ Default Interest Charges and Default FeesIn the event of a default in payment and while the default continues you must pay the Default Interest Charges. In the event of a breach of the contract or on the enforcement of the contract, the Default Fees specified below are payable. Your credit contract allows the Creditor to vary these fees and charges. Default Interest ChargesDefault interest is calculated at the rate of % per annum plus the annual interest rate referred to in the “Interest” section above. If you fail to make any payment (whether interest or otherwise) on the due date, you must, upon demand by the Creditor, pay the Creditor default interest on the overdue amount from the due date until the date that the Creditor receives full payment of that overdue amount. Default Fees $ dishonour fee, in respect of each payment which is dishonoured, or for which an automatic payment fails. The fee is payable and will be debited to your account at the time the relevant payment was due. $ late payment fee, in respect of each payment which is not made on its due date and remains outstanding for seven days after its due date. The fee is payable and will be debited to your account seven days after the due date for payment. $ repossession action fee, in respect of the Creditor commencing repossession of the Goods. The fee is payable and will be debited to your account at the time such repossession is commenced. $ post repossession fee. The fee is payable and will be debited to your account after realisation of the Goods or abandonment of realisation.An early repayment recovery amount as described in the “Full Prepayment” section below may be payable by you on the enforcement of the contract on demand by the Creditor. The method for calculating the early repayment recovery amount is further described in the General Conditions (Consumer).Costs incurred by the Creditor in connection with the enforcement of, taking advice on or taking any action pursuant to the contract, or otherwise in connection with the contract, are payable by you on demand by the Creditor on a full indemnity basis.

  • Disclosures Vendor and TIPS affirms that he/she or any authorized employees or agents has not given, offered to give, nor intends to give at any time hereafter any economic opportunity, future employment, gift, loan, gratuity, special discount, trip, favor or service to a public servant in connection with this Agreement. • Vendor shall attach, in writing, a complete description of any and all relationships that might be considered a conflict of interest in doing business with the TIPS program. • The Vendor affirms that, to the best of his/her knowledge, the offer has been arrived at independently, and is submitted without collusion with anyone to obtain information or gain any favoritism that would in any way limit competition or give an unfair advantage over other vendors in the award of this Agreement.

Time is Money Join Law Insider Premium to draft better contracts faster.