APPENDIX 2 TO THE STANDARD CONTRACTUAL CLAUSES Sample Clauses

APPENDIX 2 TO THE STANDARD CONTRACTUAL CLAUSES. This Appendix forms part of the Clauses and must be completed by the parties. Description of the technical and organisational security measures implemented by the data importer in accordance with Clauses 4(d) and 5(c) (or document/legislation attached):
AutoNDA by SimpleDocs
APPENDIX 2 TO THE STANDARD CONTRACTUAL CLAUSES. Description of the technical and organisational security measures implemented by the data importer in accordance with Clauses 4(d) and 5(c) (or document/legislation attached):
APPENDIX 2 TO THE STANDARD CONTRACTUAL CLAUSES. This Appendix forms part of the Clauses and must be completed and signed by the parties. By signing the Agreement, the parties will be deemed to have signed this Appendix 2. Description of the technical and organisational security measures implemented by the data importer in accordance with Clauses 4(d) and 5(c)
APPENDIX 2 TO THE STANDARD CONTRACTUAL CLAUSES. This Appendix forms part of the Clauses and must be completed and signed by the parties. Capitalized terms used in this Appendix which are otherwise undefined in these Clauses have the meanings given to them in the Data Processing Agreement to which these Clauses are attached.Description of the technical and organizational security measures implemented by the data importer in accordance with Clauses 4(d) and 5(c) (or document/legislation attached):The Service Provider will implement and maintain technical and organisational security measures aimed at protecting Customer Data against a personal data breach or other accidental or unlawful destruction, loss, alteration, unauthorized disclosure or access, and shall include without limitation: (i) securing business facilities, data centers, paper files, servers, back-up systems and computing equipment; (ii) implementing network, device application, database and platform security; (iii) implementing and maintaining incident response policies and data retention policies for Customer Data; (iv) implementing authentication and access controls within media, applications, operating systems and equipment; (v) encrypting Customer Data transmitted over public or wireless networks; (vi) strictly segregating Customer Data from information of the Service Provider or its other customers; and (vii) implementing appropriate personnel security and integrity procedures and practices. DATA EXPORTER Name:......................................
APPENDIX 2 TO THE STANDARD CONTRACTUAL CLAUSES. This Appendix forms part of the Clauses and must be completed and signed by the parties If the Anaplan Service is subject to different technical support terms, as set forth in the respective Supplement or Order Schedule. In all other cases, the Description of the technical and organisational security measures implemented by the data importer in accordance with Clauses 4(d) and 5(c) (or document/legislation attached): Data importer will maintain administrative, physical, and technical safeguards for protection of the security, confidentiality and integrity of Personal Data uploaded to the Anaplan Service, as described in the Security Documentation applicable to the specific Anaplan Service purchased by data exporter, and accessible via xxxx://xxxx.xxxxxxx.xxx or otherwise made reasonably available by data importer, including Anaplan’s Data and Security Policy, which can be found at xxxxx://xxx.xxxxxxx.xxx/legal/policies/security. Data importer may change these at any time without notice by keeping a comparable or better level of security. This may mean that individual measures are replaced by new measures that serve the same purpose without materially diminishing the overall security of the Anaplan Service during a subscription term.
APPENDIX 2 TO THE STANDARD CONTRACTUAL CLAUSES. This Appendix forms part of the Clauses and must be completed and signed by the parties. Description of the technical and organizational security measures implemented by the data importer in accordance with Clauses 4(d) and 5(c) (or document/legislation attached): [Processor will implement and maintain the security measures set out in this Appendix 2 (“Security Measures”). Processor may update or modify such Security Measures from time to time provided that such updates and modifications do not result in the degradation of the overall security of the Services.
APPENDIX 2 TO THE STANDARD CONTRACTUAL CLAUSES. This Appendix forms part of the Clauses and must be completed and signed by the parties. Description of the technical and organisational security measures implemented by the data importer in accordance with Clauses 4(d) and 5(c) (or document/legislation attached): The Data Importer currently abides by the security standards in this Appendix 2. The Data Importer may update or modify these security standards from time to time provided such updates and modifications will not result in a degradation of the overall security of the Services during the term of the applicable Services Agreement. Security measures employed by TradeIX include the following: Physical access controls. TradeIX production systems are hosted on the Microsoft Azure cloud platform. Microsoft design and manage the Azure infrastructure to meet a broad set of international and industry-specific compliance standards, such as ISO 27001, HIPAA, FedRAMP, SOC 1, and SOC 2. Rigorous third-party audits, such as those done by the British Standards Institute (BSI), verify adherence to the strict security controls these standards mandate. System access controls. TradeIX will ensure that all its personnel are security authenticated and authorised before being granted access to Data Exporter’s systems, applications, or data. Authentication data such as passwords must not be stored in a form that allows the authentication data to be recovered in readable or decipherable form. Passwords will be created and stored in line with TradeIX’s Cybersecurity and Password policies. Malware protection. Where technically feasible, TradeIX will establish and maintain up-to-date protection against malicious code including protection against transferring malicious code to Data Exporter’s systems, customers and other third parties. At no time will removable media be used to transfer data. TradeIX will use only approved and secure data transfer programs. Policies and procedures. TradeIX has written, approved policies governing Acceptable Use, Information Security, and Risk Management. TradeIX’s staff are also trained in data protection and are obliged to promptly report any incidents. Data access controls. TradeIX may need access to your data for severity one support incidents or emergency maintenance only. Only specific personnel from our operations team will be pre-authorised to access your data in these emergency instances. This pre-authorisation is strictly controlled by us and any activity is carefully monitored and l...
AutoNDA by SimpleDocs
APPENDIX 2 TO THE STANDARD CONTRACTUAL CLAUSES. This Appendix forms part of the Clauses and must be completed and signed by the parties. Description of the technical and organisational security measures implemented by the data importer in accordance with Clauses 4(d) and 5(c) (or document/legislation attached): ………………………………………………………………………………………………………………………… ………………………………………………………………………………………………………………………… …………………………………………………………………………………………………………………………
APPENDIX 2 TO THE STANDARD CONTRACTUAL CLAUSES. Description of the technical and organisational security measures implemented by the data importer in accordance with Clauses 4(d) and 5(c) (or document/legislation attached): SaaS Consulting Group, LLC (SCG) shall, at all times, deploy and maintain appropriate control measures designed to prevent or detect data privacy or information security breaches or violations by a SCG employee, contractor, or agent performing or delivering the Services. Specifically, SCG agrees that: (a) it will only access portions of the Customer’s IT Environment for which Customer has explicitly granted or provisioned to SCG, (b) it will only share such access with its employees, contractors or agents on a need-to-know basis and only as it relates to the performance or delivery of the Services, and (c) it will not act or engage in practices that could in any way subvert or compromise the security, integrity, or operating effectiveness of Customer’s IT Environment, or the accuracy and authentication of transactions processed by and through Customer’s Application.
APPENDIX 2 TO THE STANDARD CONTRACTUAL CLAUSES. This Appendix forms part of the Clauses and must be completed and signed by the parties. Description of the technical and organisational security measures implemented by the data importer in accordance with Clauses 4(d) and 5(c) (or document/legislation attached): Campaign Monitor will maintain administrative, physical, and technical safeguards for protection of the security, confidentiality and integrity of personal data uploaded to the Campaign Monitor Services, as described on Campaign Monitor’s Security Page: xxxxx://xxx.xxxxxxxxxxxxxxx.xxx/trust/security/. On behalf of the data exporter: (Company Legal Name): [ ] ] [ Name (written out in full): ] ] [ [ Position: Address: Other information necessary in order for the contract to be binding (if any): Signature………………………………………. (stamp of organisation) On behalf of the data importer: Campaign Monitor Pty Ltd Name (written out in full): [_Herry Wipukra ] Position: [ CIO ] Address: Level 00, 000 Xxxxxxxxx Xxxxxx, Sydney NSW 2000, Australia. Signature………………………………………. (stamp of organisation) ATTACHMENT 2 LIST OF CURRENT SUB-PROCESSORS (LAST UPDATED 05/10/2018) Customer Data (List of third party service providers, “Sub-processors”, that process personal data of Customers) • Internal Communication/Collaboration o Google G Suite o Slack • Billing/Invoicing/Payment o PayPal o NetSuite o Stripe (Payment/Collections) • User Support/Communication o Olark (In-app Support Communication) o Intercom (In-app communication) o TalkDesk (Sales Call Center) o Atlassian (Ticketing and Productivity Suite) o Citrix SendFile (Secure File Sharing) o Solvvy (Support Resource Management) o Livesize (Virtual Meetings) o GoToMeeting (Virtual Meeting) o Zoom (Virtual Meetings) o Droplr (Support Screen Shots) o Sprout Social (Social Media Support) o Dropbox (File Sharing) o Litmus (Email Testing) o Email on Acid (Email Testing) • User Analytics/Tracking o Gravatar o Mixpanel o MaxMind o DeviceAtlas (Device Identification) o HotJar (User Testing) o UserVoice (User Feedback) • Operations/Management o Groove App (Salesforce Sync) o Salesforce (CRM) o Aha! (Project Management) o Basecamp (Project Management) o Docusign (Contract Management) o Evernote (Project Management) o SnapLogic (Data Analytics) o DB Visualizer (Data Analytics) • Security o Splunk (Security Monitoring) o E-Hawk LLC (Anti-abuse/Security Measures) o SiftScience (Anti-abuse/Security Measures) Subscriber Personal Data Subprocessing (List of third party service providers, “S...
Time is Money Join Law Insider Premium to draft better contracts faster.