Data Integrity Control Sample Clauses

Data Integrity Control. Personal Data will remain intact, complete and current during processing activities.
AutoNDA by SimpleDocs
Data Integrity Control. Personal Data will remain intact, complete and current during processing activities. Measures: SAP has implemented a multi-layered defense strategy as a protection against unauthorized modifications. In particular, SAP uses the following to implement the control and measure sections described above. In particular: • Firewalls; • Security Monitoring Center; • Antivirus software; • Backup and recovery; • External and internal penetration testing; • Regular external audits to prove security measures.
Data Integrity Control. SAP has implemented a multi-layered defense strategy as a protection against unauthorized modifications. • In particular, SAP uses the following to implement the control and measure sections described above. • Firewalls; • Security Monitoring Center; • Antivirus software; • Backup and recovery; • External and internal penetration testing and/or regular external audits to prove security measures. Appendix 3 to the DPA and, if applicable, the Standard Contractual Clauses The following table sets out the relevant Articles of GDPR and corresponding terms of the DPA for illustration purposes only.
Data Integrity Control. Personal Data will remain intact, complete and current during processing activities. Measures: SAP has implemented a multi-layered defense strategy as a protection against unauthorized modifications. In particular, SAP uses the following to implement the control and measure sections described above: • Firewalls; • Security Monitoring Center; • Antivirus software; • Backup and recovery; • External and internal penetration testing; • Regular external audits to prove security measures. Appendix 3 to the DPA and, if applicable, the Standard Contractual Clauses The following table sets out the relevant Articles of GDPR and corresponding terms of the DPA for illustration purposes only.
Data Integrity Control. Personal Data will remain intact, complete and current during processing activities. 1.9 Контроль целостности данных Персональные данные в процессе обработки останутся неизменными, полными и актуальными. Measures: Меры: SAP has implemented a multi-layered defense strategy as a protection against unauthorized modifications. SAP внедрила многоуровневую стратегию защиты от несанкционированных изменений. In particular, SAP uses the following to implement the control and measure sections described above: В частности, SAP использует следующие способы внедрения средств контроля, перечисленных в разделах о средствах контроля и мерах безопасности выше: • Firewalls; • брандмауэры; • Security Monitoring Center; • Центр мониторинга безопасности; • Antivirus software; • антивирусное ПО; • Backup and recovery; • резервное копирование и восстановление данных; • External and internal penetration testing; • внутренние и внешние тесты на проникновение; • Regular external audits to prove security measures. • регулярные независимые проверки эффективности мер безопасности.
Data Integrity Control. Personal Data will remain intact, complete and current during processing activities. // データ完全性制御 「個人データ」は、処理作業中、損なわれることなく、完全かつ最新✰状態に保たれる。 Measures: // 対策 SAP has implemented a multi-layered defense strategy as a protection against unauthorized modifications. // SAP は、権限外✰修正に対する保護対策として、複数階層✰防御戦略を導入している。 In particular, SAP uses the following to implement the control and measure sections described above. SAP では、以下を使用して上記✰管理と対策✰セクションを実施している。とりわけ、以下を指す。 • Firewalls; // ファイアウォール • Security Monitoring Center; // セキ➦リティ監視センター • Antivirus software; // アンチウィルスソフトウェア • Backup and recovery; // バックアップ及び復元 • External and internal penetration testing; // 外部及び内部✰侵入テスト • Regular external audits to prove security measures. // セキ➦リティ対策を証明する定期的な外部監査 TOMs SET 2 // 本技術的及び組織的対策(セット 2) (applies to TOMs Set 2 Services defined above) // (上記にて定義される本技術的及び組織的対策(そ✰2) サービスに適用される) Last Updated: May 4 2020 // 2020 年 5 月 4 日最終更新
Data Integrity Control. SAP has implemented a multi-layered defense strategy as a protection against unauthorized modifications. // SAP は、権限外✰修正に対する保護対策として、複数階層✰防御戦略を導入している。 In particular, SAP uses the following to implement the control and measure sections described above. SAP では、以下を使用して上記✰管理と対策✰セクションを実施している。とりわけ、以下を指す。 • Firewalls; // ファイアウォール • Security Monitoring Center; // セキ➦リティ監視センター • Antivirus software; // アンチウィルスソフトウェア • Backup and recovery; // バックアップ及び復元 • External and internal penetration testing and/or regular external audits to prove security measures. // 外部及び内部✰侵入テスト及び/又はセキ➦リティ対策を証明する定期的な外部監査 Appendix 3 to the DPA and, if applicable, the Standard Contractual Clauses The following table sets out the relevant Articles of GDPR and corresponding terms of the DPA for illustration purposes only. // 以下✰表には、GDPR ✰関連する条項と対応する DPA ✰項目を、専ら説明目的で記載している。
AutoNDA by SimpleDocs
Data Integrity Control. Personal Data will remain intact, complete and current during processing activities. // データ完全性制御 「個人データ」は、処理作業中、損なわれることなく、完全かつ最新の状態に保たれる。 Measures: // 対 策 SAP has implemented a multi-layered defense strategy as a protection against unauthorized modifications. // SAP は、権限外の修正に対する保護対策として、複数階層の防御戦略を導入している。 In particular, SAP uses the following to implement the control and measure sections described above. SAP では、以下を使用して上記の管理と対策のセクションを実施している。とりわけ、以下を指す。 • Firewalls; // ファイアウォール • Security Monitoring Center; // セキュリティ監視センター • Antivirus software; // アンチウィルスソフトウェア • Backup and recovery; // バックアップ及び復元 • External and internal penetration testing; // 外部及び内部の侵入テスト • Regular external audits to prove security measures. // セキュリティ対策を証明する定期的な外部監査 Appendix 3 to the DPA and, if applicable, the Standard Contractual Clauses DPA (該当する場合は標準契約条項)の付属書 3 The following table sets out the relevant Articles of GDPR and corresponding terms of the DPA for illustration purposes only. // 以下の表には、GDPR の関連する条項と対応する DPA の項目を、専ら説明目的で記載している。 Article of GDPR GDPR の条項 Section of DPA DPA のセクション Click on link to see Section リンクをクリックするとそのセクションに移動します 28(1) 28(1) 2 and Appendix 2 2 及び付属書 2 Security of Processing and Appendix 2, Technical and Organizational Measures. // 処理のセキュリティ及び付属書 2、技術的及び組 織的対策 28(2), 28(3) (d) and 28 (4) 6 SUBPROCESSORS 28(2)、28(3) (d) 及び 28 (4) 6 // 処理外注先
Data Integrity Control. Kendali Integritas Data. • SAP has implemented a multi-layered defense strategy as a protection against unauthorized modifications./ SAP telah mengimplementasikan strategi pertahanan multi-lapisan sebagai perlindungan terhadap modifikasi-modifikasi yang tidak resmi. • In particular, SAP uses the following to implement the control and measure sections described above. Khususnya, SAP menggunakan hal-hal berikut ini untuk mengimplementasikan pasal tindakan dan kendali yang dideskripsikan di atas. • Firewall; • Security Monitoring Center;/ Pusat Pemantauan Keamanan; • Antivirus software;/ Perangkat lunak antivirus; • Backup and recovery;/ Pencadangan dan pemulihan; • External and internal penetration testing and/or regular external audits to prove security measures./ Pengujian penetrasi eksternal dan internal dan/atau audit eksternal berkala untuk membuktikan tindakan keamanan. Appendix 3 to the DPA and, if applicable, the Standard Contractual Clauses/ Lampiran 3 terhadap DPA dan, jika berlaku, Klausul Kontrak Standar The following table sets out the relevant Articles of GDPR and corresponding terms of the DPA for illustration purposes only./ Tabel berikut menjelaskan Pasal yang relevan dari GDPR dan ketentuan terkait DPA untuk tujuan ilustrasi saja. Article of GDPR/ Pasal GDPR Section of DPA/ Bagian DPA Click on link to see Sectin/ Klik pada tautan untuk melihat Bagian 28(1) 2 and Xxxxxxxx 0/ 0 xxx Xxxxxxxx 2 Security of Processing and Appendix 2, Technical and Organizational Measures./ Security of Processing/Keamanan Pemrosesan dan Xxxxxxxx 0, Xxxxxxxx Teknis dan Organisasional. 28(2), 28(3) (d) and 28 (4)/ 28(2), 28(3) (d) dan 28 (4) 6 Subprocessors Subprosesor
Data Integrity Control. Ensures that Agreement Personal Data will remain intact, complete and current during processing activities: Measures: The Supplier has implemented a defence strategy in several layers as a protection against unauthorized modifications. This refers to controls as stated in the control and measure sections as described above. In particular: Firewalls; Security Monitoring Centre; Antivirus software; Backup and recovery; External and internal penetration testing; Regular external audits to prove security measures.
Time is Money Join Law Insider Premium to draft better contracts faster.