Sub-processor Security Sample Clauses

Sub-processor Security. Prior to onboarding sub-processors that will handle any data provided by a Data Exporter, the Data Importer conducts an assessment of the security and privacy practices of the sub-processor to help ensure that the sub-processor provides a level of security and data protection controls appropriate to their access to data and the scope of the services they are engaged to provide.
AutoNDA by SimpleDocs
Sub-processor Security. Sightengine will only onboard Sub-processors who provide adequate levels of security and privacy to data and scope of services they are engaged to provide. Sightengine maintains an up-to-date list of Sub-processors on its website.
Sub-processor Security. Algolia conducts audit of security and privacy practices of Sub-processors prior to onboarding the Sub- processors in order to ensure adequate level of security and privacy to data and scope of services they are engaged to provide. Once the Sub-processor audit is performed and associated risk is evaluated, the Sub- processor enters into appropriate privacy, confidentiality and security contract terms.
Sub-processor Security. Where Company subcontracts its obligations, it shall do so only by way of a written agreement with the sub-processor which imposes contractual obligations that are at least equivalent to those obligations imposed on Company under this Addendum.
Sub-processor Security. Before engagement, all Sub-processors must go through an internal vendor review and approval process which includes review by Sprout Social’s security, legal, privacy, and finance teams. The Sprout Social security team performs due diligence of our Sub-processors on an annual basis to ensure continued compliance with information security controls.

Related to Sub-processor Security

  • Contractor Security Clearance Customers may designate certain duties and/or positions as positions of “special trust” because they involve special trust responsibilities, are located in sensitive locations, or have key capabilities with access to sensitive or confidential information. The designation of a special trust position or duties is at the sole discretion of the Customer. Contractor or Contractor’s employees and Staff who, in the performance of this Contract, will be assigned to work in positions determined by the Customer to be positions of special trust, may be required to submit to background screening and be approved by the Customer to work on this Contract.

  • Password Security You are responsible for maintaining adequate security and control of any and all User IDs, Passwords, hints, personal identification numbers (PINs), or any other codes that you use to access the Account. Do not discuss, compare, or share information about your account number or password unless you are willing to give them full use of your money. Any loss or compromise of the foregoing information and/or your personal information may result in unauthorized access to your Account by third-parties and the loss or theft of any funds held in your Account and any associated accounts, including your Account. Checks and electronic withdrawals are processed by automated methods, and anyone who obtains your account number or access device could use it to withdraw money from your account, with or without your permission. You are responsible for keeping your email address and telephone number up to date in order to receive any notices or alerts that we may send you. We assume no responsibility for any loss that you may sustain due to compromise of your account login credentials due to no fault of ours and/or your failure to follow or act on any notices or alerts that we may send to you. If you believe your Account information has been compromised, or that someone has transferred or may transfer money from your account without your permission, contact us immediately, through Synapse, at xxxx@xxxxxxxxx.xxx or call at +0(000) 000-0000. You agree to promptly review all Account and transaction records and other Communications that we make available to you and to promptly report any discrepancy to us.

  • Transfers of Registered Notes 2.1 Transfers of interests in Registered Global Notes Transfers of beneficial interests in Registered Global Notes will be effected by Euroclear or Clearstream, Luxembourg, as the case may be, and, in turn, by other participants and, if appropriate, indirect participants in such clearing systems acting on behalf of transferors and transferees of such interests. A beneficial interest in a Registered Global Note will, subject to compliance with all applicable legal and regulatory restrictions, be transferable for Notes in definitive form or for a beneficial interest in another Registered Global Note of the same series only in the authorised denominations set out in the applicable Final Terms and only in accordance with the rules and operating procedures for the time being of Euroclear or Clearstream, Luxembourg, as the case may be, and in accordance with the terms and conditions specified in the Agency Agreement.

  • Additional Security This guarantee is in addition to and is not in any way prejudiced by any other guarantee or security now or subsequently held by any Finance Party.

  • Server Security Servers containing unencrypted PHI COUNTY discloses to 4 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY 5 must have sufficient administrative, physical, and technical controls in place to protect that data, based 6 upon a risk assessment/system security review.

Time is Money Join Law Insider Premium to draft better contracts faster.