Security of processing
Security of processing The data importer and, during transmission, also the data exporter shall implement appropriate technical and organisational measures to ensure the security of the data, including protection against a breach of security leading to accidental or unlawful destruction, loss, alteration, unauthorised disclosure or access to that data (hereinafter “personal data breach”). In assessing the appropriate level of security, the Parties shall take due account of the state of the art, the costs of implementation, the nature, scope, context and purpose(s) of processing and the risks involved in the processing for the data subjects. The Parties shall in particular consider having recourse to encryption or pseudonymisation, including during transmission, where the purpose of processing can be fulfilled in that manner. In case of pseudonymisation, the additional information for attributing the personal data to a specific data subject shall, where possible, remain under the exclusive control of the data exporter. In complying with its obligations under this paragraph, the data importer shall at least implement the technical and organisational measures specified in Annex II. The data importer shall carry out regular checks to ensure that these measures continue to provide an appropriate level of security. The data importer shall grant access to the personal data to members of its personnel only to the extent strictly necessary for the implementation, management and monitoring of the contract. It shall ensure that persons authorised to process the personal data have committed themselves to confidentiality or are under an appropriate statutory obligation of confidentiality. In the event of a personal data breach concerning personal data processed by the data importer under these Clauses, the data importer shall take appropriate measures to address the breach, including measures to mitigate its adverse effects. The data importer shall also notify the data exporter without undue delay after having become aware of the breach. Such notification shall contain the details of a contact point where more information can be obtained, a description of the nature of the breach (including, where possible, categories and approximate number of data subjects and personal data records concerned), its likely consequences and the measures taken or proposed to address the breach including, where appropriate, measures to mitigate its possible adverse effects. Where, and in so far as, it...
Security of processing-Sicurezza del trattamento
Security of processing-Sécurité du traitement
Security of processing-Seguridad del tratamiento
Security of tenure You have security of tenure as an assured tenant as long as your Home is your only or principal home. NCHA can only bring the assured tenancy to an end by obtaining a court order for possession of your Home on one of the grounds listed in Schedule 2 to the Housing Xxx 0000 (the “Grounds”). A complete list of the Grounds is in the Housing Xxx 0000 as amended by the Housing Xxx 0000. You can get a copy of all the grounds from NCHA at the address, telephone number or e-mail address on page 1 of this agreement. In summary the Grounds include : Ground 8 at least 8 weeks rent is due when notice is served and at the date of the hearing; Ground 10 you have not paid the rent due; Ground 12 you have broken or failed to perform any of the obligations of the Tenancy. Ground 13 you or another occupier has caused damage to, or failed to look after your Home, the Estate or any of the common parts; Ground 14 you or another occupier has been guilty of conduct causing or likely to cause nuisance or annoyance to a person living, visiting or lawfully in the area, or has been convicted of an indictable offence committed in your Home or area or for using your Home for immoral or illegal purposes; Ground 7 where the Tenancy has been passed on under the will or intestacy of a previous tenant in certain circumstances; Ground 9 if suitable alternative accommodation is available to you; Ground 6 where, in certain circumstances, vacant possession is necessary to carry out work to your Home; Ground 14a where your partner has left because you have been violent against them or a member of the family. For the avoidance of doubt, the above summary is for information purposes only and does not in any way restrict the Grounds as set out in Schedule 2 of the Housing Xxx 0000.
Security of processing The level of security shall take into account that the processing may involve confidential and special catgetories of personal data (ref. Article 9 GDPR), depending of the scope of the assignment. Confidential information may be social security number, salary, bank account numbers, etc. Special categories may include trade union membership and health information (sick leaves, etc.). The data processor shall hereafter be entitled and under obligation to make decisions about the technical and organisational security measures that are to be applied to create the necessary level of data security. The data processor shall however - in any event and at a minimum - implement the following measures that have been agreed with the data controller: All systems require personal logon with password. All systems containing confidental information have muliti factor authentication logon All computers may be remotely locked and erased by IT department. All employees must annualy complete a security awareness program. Access to systems, mail, etc. via phones, pads, etc, have the same security measures as computers. Data is encrypted during transfer. There is access control at all locations, and all data centeres have a high level physical access control C.3. Assistance to the data controller The data processor shall insofar as this is possible - within the scope and the extent of the assistance specified below - assist the data controller in accordance with Clause 9.1. and 9.2. The data subjects primary contact is the data controller. If the data processor is contacted by the data subject with regards to Clause 9.1, the data processor will forward the request ot the data controller. The data processor will assist the data controller in the data controller's compliance with the rights mentioned in Clause 8.1. The data controller will invoice such assistance according to the current price list. Such request from the data controller may be adressed to the data processor's regular case handler, or through the form found on Amesto Trust Center (xxxxx://xxx.xxxxxx.xxx/amesto-trust-center/security/notification/). If the data controller does not assist the data subjects in compliance with GDPR, and the data processor is obliged to assist the data subject according to the same legislation, the data controller will invoice the data controller according to the current price list. The data processor will inform the data controller of such assistance, and will give the data ...
Security of. Staff, Students & Property A The right of individuals to protect themselves and others consistent with the law shall not be denied to unit mem- bers as a condition of their employment. B The Board will take precautions to prevent theft, dam- age, and/or other types of vandalism on Board property. All unit members have the responsibility to develop in students habits of good citizenship and good behavior. All unit members share responsibility to work with stu- dents to reduce vandalism.
Security of processing 2 Scc Aíticlc 2®(4) or Rcg"latio⭲ (EU) 2016/679 a⭲d, wkcíc tkc co⭲tíollcí is a⭲ EU i⭲stit"tio⭲ oí bodQ, Aíticlc 29(4) or Rcg"latio⭲ (EU) 201®/1725.
Security of. Employees are held responsible for all monies advanced to them by the Corporation and in their own interest should take precautions for safekeeping. Allowances Claims for travel expenses will be allowed for the following items, subject to the limitations contained in other sections of this policy.