Data Access Controls Sample Clauses

Data Access Controls. Data Processor shall take reasonable measures to provide that Personal Data is accessible and manageable only by properly authorized staff, direct database query access is restricted and application access rights are established and enforced to ensure that persons entitled to use a data processing system only have access to the Personal Data to which they have privilege of access; and, that Personal Data cannot be read, copied, modified or removed without authorization in the course of Processing.
AutoNDA by SimpleDocs
Data Access Controls. Zendesk takes reasonable measures to provide that Service Data is accessible and manageable only by properly authorised staff.
Data Access Controls. Our Sub-processors will take reasonable measures to ensure that Service Data is accessible and manageable only by properly authorised staff, direct database query access is restricted and application access rights are established and enforced to ensure that persons entitled to access Service Data only have access to Service Data to which they have privilege of access; and, that Service Data cannot be read, copied, modified or removed without authorisation in the course of processing. Vendor will implement and maintain an access policy under which access to its system environment, to data processing systems, to Service Data, and other data is restricted to authorised personnel only.
Data Access Controls. Vendor shall take reasonable measures to provide that personal data is accessible and manageable only by properly authorized staff, direct database query access is restricted and application access rights are established and enforced to ensure that persons entitled to use a data processing system only have access to the personal data to which they have privilege of access; and, that personal data cannot be read, copied, modified or removed without authorization in the course of processing.
Data Access Controls. Aircall shall take reasonable measures to provide that Personal Data is accessible and manageable only by properly authorized staff, direct database query access is restricted and application access rights are established and enforced to ensure that persons entitled to use a data processing system only have access to the Personal Data to which they have the privilege of access; and, that Personal Data cannot be read, copied, modified or removed without authorization in the course of Processing.
Data Access Controls. Q4, as a Data processor, shall take reasonable measures to provide that Personal Data is accessible and manageable only by properly authorized staff, direct database query access is restricted and application access rights are established and enforced to ensure that persons entitled to use a data processing system only have access to the Personal Data to which they have privilege of access.
Data Access Controls. Data Processor shall take reasonable measures to provide that Personal Data is accessible and manageable only by properly authorized staff.
AutoNDA by SimpleDocs
Data Access Controls. Third-party service providers shall take reasonable measures to provide that Service Data is accessible and manageable only by properly authorized staff, direct database query access is restricted and application access rights are established and enforced to ensure that persons entitled to access Service Data only have access to Service Data to which they have privilege of access; and, that Service Data cannot be read, copied, modified or removed without authorization in the course of processing.
Data Access Controls. Unless otherwise provided for in the service provider terms, Contractor will provide access to Purchasing Entity’s Data only to those Contractor employees, contractors and subcontractors (“Contractor Staff”) who need to access the Data to fulfill Contractor’s obligations under this Agreement. Contractor shall not access a Purchasing Entity’s user accounts or Data, except on the course of data center operations, response to service or technical issues, as required by the express terms of this Master Agreement, or at a Purchasing Entity’s written request. Contractor may not share a Purchasing Entity’s Data with its parent corporation, other affiliates, or any other third party without the Purchasing Entity’s express written consent. Contractor will ensure that, prior to being granted access to the Data, Contractor Staff who perform work under this Agreement have successfully completed annual instruction of a nature sufficient to enable them to effectively comply with all Data protection provisions of this Agreement; and possess all qualifications appropriate to the nature of the employees’ duties and the sensitivity of the Data they will be handling.
Data Access Controls. The data processor shall take reasonable measures to provide that personal data is accessible and manageable only by properly authorized staff, direct database query access is restricted and application access rights are established and enforced to ensure that persons entitled to use a data processing system only have access to the personal data to which they have privilege of access; and, that personal data cannot be read, copied, modified or removed without authorization in the course of processing. The data processor shall take reasonable measures to implement an access policy under which access to its system environment, to personal data and other data is by authorized personnel only. Access control to devices and laptops The data processor will implement and maintain commercially reasonable security measures with respect to mobile devices and laptops that are used to process personal data. Transmission and disclosure control The data processor will implement and maintain commercially reasonable measures to prevent personal data from being read, copied, modified or removed without authorization during electronic transmission or transport. In order to enable the data processor to check and establish to which bodies the transfer of personal data by means of data transmission facilities is envisaged. The data processor will maintain technology and processes designed to minimize access for illegitimate processing, including technology for the encryption of personal data. Regular testing of security measures The data processor will frequently test, assess and evaluate the effectiveness of its technical and organizational security measures.
Time is Money Join Law Insider Premium to draft better contracts faster.