Common use of Security Policy and Procedures Clause in Contracts

Security Policy and Procedures. Data Processor has adopted security policies and follows documented procedures for the Processing and protection of Personal Data. They are appropriately conveyed to relevant staff. Security Resources, Training and Organization Security Resource(s) Data Processor shall have a security-oriented team dedicated to ensuring the security of Data Processor’s assets and of Data Processor’s client services, including Personal Data, and to reacting to security vulnerabilities. Security Training Data Processor shall be responsible for verifying all members of the Data Processor team are trained in security practices, including cybersecurity. Evidence must be provided to Data Controller via artifacts upon request. Trustworthy Data Processors Data Processor agrees to perform background investigation of all team members to the maximum extent allowed by law, in compliance with all federal, state, provincial, local and national laws. Security of Premises

Appears in 2 contracts

Samples: Data Processing Agreement, Data Processing Agreement

AutoNDA by SimpleDocs

Security Policy and Procedures. Data Processor has adopted security policies and follows documented procedures for the Processing processing and protection of Personal Data. They are appropriately conveyed to relevant staff. Security Resources, Training and Organization Security Resource(s) Data Processor shall have a security-oriented team dedicated to ensuring the security of Data Processor’s Controller's assets and of Data Processor’s client services, including Personal Data, and to reacting to security vulnerabilities. Security Training Data Processor shall be responsible for verifying all members of the Data Processor team Processor’s organization are trained in security practices, including cybersecurity. Evidence must be provided to Data Controller via artifacts upon request. Trustworthy Data Processors Data Processor agrees to perform background investigation of all applicable team members to the maximum extent allowed required by law, in compliance with all federal, state, provincial, local and national laws. Security of Premises.

Appears in 1 contract

Samples: www.workfront.com

AutoNDA by SimpleDocs

Security Policy and Procedures. Data Processor has adopted security policies and follows documented procedures for the Processing processing and protection of Personal Datapersonal data. They are appropriately conveyed to relevant staff. Security Resources, Training and Organization Security Resource(s) Data Processor shall have a security-oriented team dedicated to ensuring the security of Data Processor’s assets and of Data Processor’s client services, including Personal Datapersonal data, and to reacting to security vulnerabilities. Security Training Data Processor shall be responsible for verifying all members of the Data Processor team are trained in security practices, including cybersecurity. Evidence must be provided to Data Controller via artifacts upon request. Trustworthy Data Processors Data Processor agrees to perform background investigation of all team members to the maximum extent allowed by law, in compliance with all federal, state, provincial, local and national laws. Security of Premises

Appears in 1 contract

Samples: Data Processing Agreement

Time is Money Join Law Insider Premium to draft better contracts faster.