Security Policy and Procedures. Data Processor has adopted security policies and follows documented procedures for the Processing and protection of Personal Data. They are appropriately conveyed to relevant staff. Security Resources, Training and Organization Security Resource(s) Data Processor shall have a security-oriented team dedicated to ensuring the security of Data Processor’s assets and of Data Processor’s client services, including Personal Data, and to reacting to security vulnerabilities. Security Training Data Processor shall be responsible for verifying all members of the Data Processor team are trained in security practices, including cybersecurity. Evidence must be provided to Data Controller via artifacts upon request. Trustworthy Data Processors Data Processor agrees to perform background investigation of all team members to the maximum extent allowed by law, in compliance with all federal, state, provincial, local and national laws. Security of Premises
Appears in 2 contracts
Samples: Data Processing Agreement, Data Processing Agreement
Security Policy and Procedures. Data Processor has adopted security policies and follows documented procedures for the Processing processing and protection of Personal Data. They are appropriately conveyed to relevant staff. Security Resources, Training and Organization Security Resource(s) Data Processor shall have a security-oriented team dedicated to ensuring the security of Data Processor’s Controller's assets and of Data Processor’s client services, including Personal Data, and to reacting to security vulnerabilities. Security Training Data Processor shall be responsible for verifying all members of the Data Processor team Processor’s organization are trained in security practices, including cybersecurity. Evidence must be provided to Data Controller via artifacts upon request. Trustworthy Data Processors Data Processor agrees to perform background investigation of all applicable team members to the maximum extent allowed required by law, in compliance with all federal, state, provincial, local and national laws. Security of Premises.
Appears in 1 contract
Samples: www.workfront.com
Security Policy and Procedures. Data Processor has adopted security policies and follows documented procedures for the Processing processing and protection of Personal Datapersonal data. They are appropriately conveyed to relevant staff. Security Resources, Training and Organization Security Resource(s) Data Processor shall have a security-oriented team dedicated to ensuring the security of Data Processor’s assets and of Data Processor’s client services, including Personal Datapersonal data, and to reacting to security vulnerabilities. Security Training Data Processor shall be responsible for verifying all members of the Data Processor team are trained in security practices, including cybersecurity. Evidence must be provided to Data Controller via artifacts upon request. Trustworthy Data Processors Data Processor agrees to perform background investigation of all team members to the maximum extent allowed by law, in compliance with all federal, state, provincial, local and national laws. Security of Premises
Appears in 1 contract
Samples: Data Processing Agreement