Security, risk and impact of the processing Sample Clauses

Security, risk and impact of the processing. All relevant Security Policies applicable to the parties and systems used in this proposal are available and listed in Appendix 1. A suitable process to document and monitor the security risk described in the Information Security and Governance Policies listed in Appendix 1. A Data Protection Impact assessment has been produced and is available as listed in Appendix 1. A competent, independent and free of conflicts of interests Data Protection Officer has been designated to inform the Data Controllers on the adequacy of this agreement and the corresponding compliance and any residual risks documented in the Data Protection Impact Assessment. The security measures put in place across the parties ensure that: [N/A] Wherever special categories of data are processed, the data will be encrypted at rest and in transit. [N/A] Wherever special categories of data are transmitted over network, Transport Layer Security (TLS) protocols will be applied. Exceptions will be documented in the DPIA and any residual risk will require approval by the SIRO of each organisation prior to processing such data. [ x ] If personal data is accidentally lost, altered or destroyed, it can be recovered to prevent any damage or distress to the individuals concerned. This is achieved through the following work instructions, policies and procedures (also listed in Appendix 1): The security controls applicable by each organisation will be: Jointly agreed between the parties x Independently decided by each party
AutoNDA by SimpleDocs
Security, risk and impact of the processing. ‌ [ ] All relevant Security Policies applicable to the parties and systems used in this proposal are available and listed in Appendix 1. [ ] A qualified Information Security Officer has reviewed the adequacy of the attached Security Policies and has advised on the technical and organisational security risk level. [ ] A suitable process to document and monitor the security risk described in the Information Security and Governance Policies listed in Appendix 1. [ ] A Data Protection Impact assessment has been produced and is available as listed in Appendix 1. [ ] A competent, independent and free of conflicts of interests Data Protection Officer has been designated to inform the Data Controllers on the adequacy of this agreement and the corresponding compliance and any residual risks documented in the Data Protection Impact Assessment. [ ] A Data Protection Impact assessment has been produced and is available as listed in Appendix 1. The security measures put in place across the parties ensure that: [ ] Wherever special categories of data are processed, the data will be encrypted at rest and in transit. [ ] Wherever special categories of data are transmitted over network, Transport Layer Security (TLS) protocols will be applied. Exceptions will be documented in the DPIA and any residual risk will require approval by the SIRO of each organisation prior to processing such data. [ ] only authorised individuals can access, alter, disclose or destroy data. This is achieved through the following work instructions, policies and procedures (also listed in Appendix 1): In the bullet points below, list any relevant policies/procedures that explain the arrangements between the parties for these controls.  [ ] authorised individuals act only within the scope of their authority. This is achieved through the following work instructions, policies and procedures (also listed in Appendix 1): In the bullet points below, list any relevant policies/procedures that explain the arrangements between the parties for these controls. [ ] if personal data is accidentally lost, altered or destroyed, it can be recovered to prevent any damage or distress to the individuals concerned. This is achieved through the following work instructions, policies and procedures (also listed in Appendix 1): In the bullet points below, list any relevant policies/procedures that explain the arrangements between the parties for these controls.  The security controls applicable by each organisation will ...

Related to Security, risk and impact of the processing

  • Details of the Processing The subject-matter of Processing of Personal Data by Data Processor is the performance of the Services pursuant to the Agreement. The duration of the Processing, the nature and purpose of the Processing, as well as the types of Personal Data Processed and categories of Data Subjects under this DPA are further specified in Schedule 1 (Details of the Processing) to this DPA.

  • Liquidity Risk Measurement Services Not Applicable.

  • RISK OF THE PROPERTY As from the time of the sale, the Property shall be at the sole risk of the Purchaser as regards to loss or damage of whatsoever nature or howsoever occurring including by fire or other accidents, state of cultivation, non-occupation or otherwise.

  • Nature of the processing MailChimp provides an email service, automation and marketing platform and other related services, as described in the Agreement.

  • Customer Equipment Customer represents and warrants that it owns or has the legal right and authority, and will continue to own or maintain the legal right and authority during the term of this Agreement, to place and use the Customer Equipment as contemplated by this Agreement. Customer further represents and warrants that its placement, arrangement, and use of the Customer Equipment in the Internet Data Centers complies with the Customer Equipment Manufacturer's environmental and other specifications.

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If CBB chooses to subtend a Verizon access Tandem, CBB’s NPA/NXX must be assigned by CBB to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG.

  • Liquidity risk The Exchange requires all structured product issuers to appoint a liquidity provider for each individual issue. The role of liquidity providers is to provide two way quotes to facilitate trading of their products. In the event that a liquidity provider defaults or ceases to fulfill its role, investors may not be able to buy or sell the product until a new liquidity provider has been assigned.

  • Dewatering 4.7.1 Where a part of a site is affected by surface water following a period of rain, thus rendering some areas unsafe for productive work, consistent with the Employer’s obligations under the OH&S Act, all non- trades employees shall assist in ‘dewatering’ their own work site or area if it is so affected. Such work to be paid at single time rates. Productive work will continue in areas not so affected.

  • Interconnection Facilities Engineering Procurement and Construction Interconnection Facilities, Network Upgrades, and Distribution Upgrades shall be studied, designed, and constructed pursuant to Good Utility Practice. Such studies, design and construction shall be based on the assumed accuracy and completeness of all technical information received by the Participating TO and the CAISO from the Interconnection Customer associated with interconnecting the Large Generating Facility.

  • System Upgrade Facilities and System Deliverability Upgrades Connecting Transmission Owner shall design, procure, construct, install, and own the System Upgrade Facilities and System Deliverability Upgrades described in Appendix A hereto. The responsibility of the Developer for costs related to System Upgrade Facilities and System Deliverability Upgrades shall be determined in accordance with the provisions of Attachment S to the NYISO OATT.

Time is Money Join Law Insider Premium to draft better contracts faster.