Security of Personal Data Sample Clauses

Security of Personal Data. 5.1. Taking into account the state of the art, the costs of implementation and the nature, scope, context and purposes of Processing as well as the risk of varying likelihood and severity for the rights and freedoms of natural persons, Processor shall maintain appropriate technical and organizational measures to ensure a level of security appropriate to the risk of Processing Personal Data.
AutoNDA by SimpleDocs
Security of Personal Data. Taking into account the state of the art, the costs of implementation and the nature, scope, context and purposes of processing as well as the risk of varying likelihood and severity for the rights and freedoms of natural persons, Company shall maintain appropriate technical and organizational measures to ensure a level of security appropriate to the risk of processing Personal Data. Exhibit C sets forth additional information about Company’s technical and organizational security measures.
Security of Personal Data a. The Processor shall at a minimum implement the technical and organizational measures specified in Appendix 2 to ensure the security of the Personal Data. This includes protecting the Personal Data against a breach of security leading to accidental or unlawful destruction, loss, alteration, unauthorized disclosure or access to the Personal Data. In assessing the appropriate level of security, the parties shall take due account of the state of the art, the costs of implementation, the nature, scope, context and purposes of processing and the risks involved for the Data Subjects.
Security of Personal Data. 6.1 Taking into account the state of the art, the costs of implementation and the nature, scope, context and purposes of Processing as well as the risk of varying likelihood and severity for the rights and freedoms of natural persons, Zoom shall maintain appropriate technical and organizational measures to ensure a level of security appropriate to the risk of Processing Personal Data, including, but not limited to, the security measures set out in Exhibit B.
Security of Personal Data. We will take appropriate technical, physical and organisational measures to protect the Personal Data collected through the Website from misuse or accidental, unlawful or unauthorised destruction, loss, alteration, disclosure, acquisition or access, that are consistent with applicable privacy and data security laws and regulations. However, no internet-based site can be 100% secure and we cannot be held responsible for unauthorised or unintended access that is beyond our control. Our Website may contain links to other websites. We are not responsible for the privacy practices, content or security used by such other websites, which shall not be governed by this Privacy Policy. We advise you to always carefully read the privacy policies on these other websites.
Security of Personal Data a. Adobe has implemented and maintains reasonable and appropriate Technical and Organizational Measures for Cloud Services regarding the protection of Personal Data Processed under these terms, assessable via this link: xxxxx://xxx.xxxxx.xxx/go/CloudSvcsTOSM.
Security of Personal Data. (a) To effect the purposes of this Master Agreement, COMPANY, BPPR, or one of their respective Subsidiaries may from time to time provide EVERTEC with Personal Data in order for EVERTEC to provide the Services. EVERTEC shall comply with all Legal Requirements (including Legal Requirements regarding the protection, privacy and confidentiality of Personal Data) applicable to EVERTEC’s use, storage and other processing (including Data Processing) of Personal Data.
AutoNDA by SimpleDocs
Security of Personal Data. 6.1 Zoom may not update the Services in a way that would remove Customer's choice to apply end to end encryption to Meetings, introduce any functionality that would purposefully allow anyone not authorized by the Customer to gain access to Customer encryption keys or Customer content, or remove the ability to store recordings locally.
Security of Personal Data. Both organisations have responsibilities under the General Data Protection Regulation and the Data Protection Act and it is essential that all staff are trained in this regard and understand their responsibilities to ensure personal and organisational compliance in this area. PHSO and LGSCO have exchanged copies of appropriate information handling policies and both parties are satisfied that there are appropriate policies in place for handling and processing of personal data and Information Security, including the handling of information security breaches. Data Protection training is in place at both organisations and regularly rolled out to all staff. In the event of a security breach involving joint working information or staff, there must be liaison between the two bodies’ Data Protection Officers straightaway so that a risk assessment can be undertaken and decisions made about the best approach in terms of containment of the breach and any requirements to report the breach to the Information Commissioner’s Office. Each organisation’s Senior Information Risk Owner can decide to report a breach by their own organisation (while simultaneously discussing this with the other organisation). If one organisation’s SIRO becomes aware of a breach by the other organisation, they should raise it with the other organisation’s Data Protection Officer straightaway, but will reserve the right to report the breach even if the other organisation’s SIRO decides not to.
Security of Personal Data. The security of Client Personal Data is important to ReadyChek, but remember that no method of transmission over the Internet, or method of electronic storage is 100% secure. While ReadyChek will strive to use commercially acceptable means to protect the Client Personal Data, ReadyChek cannot guarantee its absolute security.
Time is Money Join Law Insider Premium to draft better contracts faster.