SubprocessorSecurity Sample Clauses

SubprocessorSecurity. Before onboarding Subprocessors, Processor conducts an audit of the security and privacy practices of Subprocessorsto ensure Subprocessors provide a level of security and privacy appropriate to their access to data andthe scopeof the services they are engagedto provide. Once Processor hasassessedthe riskspresented by the Subprocessor, then subject always to the requirements set out in Section 11.3 (Requirements for Subprocessor Engagement) of this Data Processing Agreement, the Subprocessor is required to enter into appropriate security, confidentiality and privacy contract terms. Appendix 3: Subprocessors Defiant uses the following subprocessorsin the performance of the Service: Subprocessor Location AmazonWeb Services United States ByteGrid United States Twilio United States Freshworks United States Mode Analytics United States Standard Contractual Clauses(processors) for the purposesof Article 26(2)of Directive 95/46/ECforthe transfer of personal data to processors establishedin third countries whichdo not ensurean adequate level of data protection TheCustomeraccepting the Clauses(the “Data Exporter”) And Defiant, Inc., 8005th XxxXxx 0000,Xxxxxxx, XX 00000,XXX (the “Data Importer”) eacha “party”; together“the parties”, AGREE on the following Contractual Clauses(the Clauses)in order to adduceadequate safeguardswith respect to the protection of privacy and fundamentalrightsandfreedoms ofindividualsfor the transfer by the Data Exporter to the Data Importer of the personal data specified in Appendix1. The Clauses(includingappendices1 and 2) are effective from the date the Customerentity hasboth: (i); executeda valid Wordfence terms of useagreement anddata processingagreement (collectively the “Agreement”) or is otherwise an authorizedcustomeraffiliate under suchAgreement; and(ii) executedthese Clausesagreement. If you are executingon behalfof the Data Exporter,you represent andwarrant that: (i) you have full legal authority to bindyour employer, or the applicableentity, to these terms andconditions;(ii) you haveread and understandthe Clauses;and(iii) you agree, onbehalf of the party that you represent, to the Clauses.The Clausesshall automatically expire on the termination or expiry of the Agreement. Clause 1
AutoNDA by SimpleDocs

Related to SubprocessorSecurity

  • Subprocessors Provider shall enter into written agreements with all Subprocessors performing functions for the Provider in order for the Provider to provide the Services pursuant to the Service Agreement, whereby the Subprocessors agree to protect Student Data in a manner no less stringent than the terms of this DPA.

  • Subprocessor For the purposes of this DPA, the term “Subprocessor” (sometimes referred to as the “Subcontractor”) means a party other than LEA or Provider, who Provider uses for data collection, analytics, storage, or other service to operate and/or improve its service, and who has access to Student Data.

  • Subprocessing 1. The data importer shall not subcontract any of its processing operations performed on behalf of the data exporter under the Clauses without the prior written consent of the data exporter. Where the data importer subcontracts its obligations under the Clauses, with the consent of the data exporter, it shall do so only by way of a written agreement with the subprocessor which imposes the same obligations on the subprocessor as are imposed on the data importer under the Clauses. Where the subprocessor fails to fulfil its data protection obligations under such written agreement the data importer shall remain fully liable to the data exporter for the performance of the subprocessor's obligations under such agreement.

  • Subprocessor Security Before onboarding Subprocessors, Google conducts an audit of the security and privacy practices of Subprocessors to ensure Subprocessors provide a level of security and privacy appropriate to their access to data and the scope of the services they are engaged to provide. Once Google has assessed the risks presented by the Subprocessor, then subject to the requirements described in Section 11.3 (Requirements for Subprocessor Engagement) of this Data Processing Amendment, the Subprocessor is required to enter into appropriate security, confidentiality and privacy contract terms.

  • New Subprocessors SAP’s use of Subprocessors is at its discretion, provided that:

  • Interconnection Customer Obligations The Interconnection Customer shall maintain the Large Generating Facility and the Interconnection Customer’s Interconnection Facilities in a safe and reliable manner and in accordance with this LGIA.

  • SS7 Network Interconnection 9.7.1 SS7 Network Interconnection is the interconnection of Global Connection local signaling transfer point switches or Global Connection local or tandem switching systems with BellSouth signaling transfer point switches. This interconnection provides connectivity that enables the exchange of SS7 messages among BellSouth switching systems and databases, Global Connection local or tandem switching systems, and other third-party switching systems directly connected to the XxxxXxxxx XX0 network.

  • Network Interconnection 26.1 Interconnection between the networks of different SERVICE PROVIDERs shall be as per National Standards of CCS No.7 issued from time to time by Telecom Engineering Centre (TEC) and also subject to technical feasibility and technical integrity of the Networks and shall be within the overall framework of interconnection regulations issued by the TRAI from time to time. However, if situation so arises, INTERCONNECTION with R2MF signaling may be permitted by LICENSOR.

  • Security Protocols Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.

  • SECURITY PROCESSES If requested by an Authorized User as part the Request for Quote process, Contractor shall complete a Consensus Assessment Initiative Questionnaire (CAIQ) including on an annual basis thereafter, if requested by the Authorized User. The CAIQ is available at Cloud Security Alliance (xxxxx://xxxxxxxxxxxxxxxxxxxxx.xxx/). The CAIQ may be used to assist the Authorized User in building the necessary assessment processes when engaging with Contractors. In addition to a request for a CAIQ, Contractor shall cooperate with all reasonable Authorized User requests for a Written description of Contractor’s physical/virtual security and/or internal control processes. The Authorized User shall have the right to reject any Contractor’s RFQ response or terminate an Authorized User Agreement when such a request has been denied. For example, Federal, State and local regulations and/or laws may require that Contractors operate within the Authorized User’s regulatory environment. In order to ensure that security is adequate and free of gaps in control coverage, the Authorized User may require information from the Contractor’s Service Organization Controls (SOC) audit report.

Time is Money Join Law Insider Premium to draft better contracts faster.