Description of Technical and Organizational Measures Sample Clauses

Description of Technical and Organizational Measures. As from the Terms Effective Date, Wisetail will implement and maintain the Securi- ty Measures set out in this Schedule 2. Wisetail may update or modify such Security Measures from time to time provided that such updates and modifications do not result in the degradation of the overall security of the Services. xxxxx://xxx.xxxxxxxx.xxx/wisetail-technical-and-organizational-measures Personnel Security Wisetail employee competence is a key element of the control environment. Wise- tail is committed to training and developing its employees. This commitment to competence is expressed in the company's personnel policies and related human resource programs. At least annually, the Human Resources Team/Management per- forms a review of key talent by individual and role to ensure that critical talent is retained and to ensure that the organizational structure is aligned in a way that will support achievement of the company's objectives and strategies. Wisetail en- sures that personnel have the knowledge and training needed to perform their du- ties. New employees go through initial Security training during the New Hire Process. Wisetail personnel are required to conduct themselves in a manner consis- tent with the company’s guidelines regarding confidentiality, business ethics, ap- propriate usage, and professional standards. Wisetail conducts reasonably appro- priate backgrounds checks to the extent legally permissible and in accordance with applicable local labor law and statutory regulations. Personnel are required to ex- ecute a confidentiality agreement and must acknowledge receipt of, and compli- ance with, Wisetail confidentiality and privacy policies. Personnel are provided with security training. Personnel handling Customer Data are required to complete additional requirements appropriate to their role (eg., certifications). Wisetail personnel will not process Customer Data without authorization. Subprocessor Security Before onboarding Subprocessors, Wisetail conducts an audit of the security and privacy practices of Subprocessors to ensure Subprocessors provide a level of secu- rity and privacy appropriate to their access to data and the scope of the services they are engaged to provide. Once Wisetail has assessed the risks presented by the Subprocessor, then subject to the requirements of the Data Controller’s Require- ments for Subprocessor Engagement, the Subprocessor is required to enter into appropriate security, confidentiality and privacy contract ...
AutoNDA by SimpleDocs
Description of Technical and Organizational Measures. As from the Terms Effective Date, Playerlync will implement and maintain the Security Measures set out in this Schedule 2. Playerlync may update or modify such Security Measures from time to time provided that such updates and modifications do not result in the degradation of the overall security of the Services. Personnel Security Playerlync employee competence is a key element of the control environment. Playerlync is committed to training and developing its employees. This commitment to competence is expressed in the company's personnel policies and related human resource programs. At least annually, the Human Resources Team/Management performs a review of key talent by individual and role to ensure that critical talent is retained and to ensure that the organizational structure is aligned in a way that will support achievement of the company's objectives and strategies. Playerlync ensures that personnel have the knowledge and training needed to perform their duties. New employees go through initial Security training during the New Hire Process. Playerlync personnel are required to conduct themselves in a manner consistent with the company’s guidelines regarding confidentiality, business ethics, appropriate usage, and professional standards. Playerlync conducts reasonably appropriate backgrounds checks to the extent legally permissible and in accordance with applicable local labor law and statutory regulations. Personnel are required to execute a confidentiality agreement and must acknowledge receipt of, and compliance with, Playerlync confidentiality and privacy policies. Personnel are provided with security training. Personnel handling Customer Data are required to complete additional requirements appropriate to their role (eg., certifications). Playerlync personnel will not process Customer Data without authorization. Subprocessor Security Before onboarding Subprocessors, Playerlync conducts an audit of the security and privacy practices of Subprocessors to ensure Subprocessors provide a level of security and privacy appropriate to their access to data and the scope of the services they are engaged to provide. Once Playerlync has assessed the risks presented by the Subprocessor, then subject to the requirements of the Data Controller’s Requirements for Subprocessor Engagement, the Subprocessor is required to enter into appropriate security, confidentiality and privacy contract terms, in accordance with Section 6 of the Data Processing Agreement. Sche...
Description of Technical and Organizational Measures. This Xxxxx describes the technical and organizational security measures implemented by Capsa in accordance with Clauses 4(d) and 5(c) of the Standard Contractual Clauses: In addition to any technical and security measures described in the Security section of the DPA, Capsa implements the following measures: • Capsa maintains an annual ISO27001 IT security certification; • Capsa Products encrypt data in transit and at rest; • Capsa employees receive regular training on data security; and
Description of Technical and Organizational Measures. Description of the technical and organisational security measures implemented by the data importer: Confidentiality (Article 32(1) lit. (b) GDPR) • Physical Access Control No unauthorised access to Data Processing Facilities, e.g.: magnetic or chip cards, keys, electronic door openers, facility security services and/or entrance security staff, alarm systems, video/CCTV Systems • Electronic Access Control No unauthorised use of the Data Processing and Data Storage Systems, e.g.: (secure) passwords, automatic blocking/locking mechanisms, two-factor authentication, encryption of data carriers/storage mediaInternal Access Control (permissions for user rights of access to and amendment of data) No unauthorised Reading, Copying, Changes or Deletions of Data within the system, e.g. rights authorisation concept, need-based rights of access, logging of system access events • Isolation Control The isolated Processing of Data, which is collected for differing purposes, e.g. multiple Client support, sandboxing; and

Related to Description of Technical and Organizational Measures

  • Technical and Organizational Measures The following sections define SAP’s current technical and organizational measures. SAP may change these at any time without notice so long as it maintains a comparable or better level of security. Individual measures may be replaced by new measures that serve the same purpose without diminishing the security level protecting Personal Data.

  • Appropriate Technical and Organizational Measures SAP has implemented and will apply the technical and organizational measures set forth in Appendix 2. Customer has reviewed such measures and agrees that as to the Cloud Service selected by Customer in the Order Form the measures are appropriate taking into account the state of the art, the costs of implementation, nature, scope, context and purposes of the processing of Personal Data.

  • Technical and Organisational Measures (1) Before the commencement of processing, the Supplier shall document the execution of the necessary Technical and Organisational Measures, set out in advance of the awarding of the Order or Contract, specifically with regard to the detailed execution of the contract, and shall present these documented measures to the Client for inspection. Upon acceptance by the Client, the documented measures become the foundation of the contract. Insofar as the inspection/audit by the Client shows the need for amendments, such amendments shall be implemented by mutual agreement.

  • Certification Regarding Business with Certain Countries and Organizations Pursuant to Subchapter F, Chapter 2252, Texas Government Code, PROVIDER certifies it is not engaged in business with Iran, Sudan, or a foreign terrorist organization. PROVIDER acknowledges this Purchase Order may be terminated if this certification is or becomes inaccurate.

  • Contractor Certification regarding Business with Certain Countries and Organizations Pursuant to Subchapter F, Chapter 2252, Texas Government Code], Contractor certifies Contractor is not engaged in business with Iran, Sudan, or a foreign terrorist organization. Contractor acknowledges this Agreement may be terminated and payment withheld if this certification is inaccurate.

  • Information Technology Accessibility Standards Any information technology related products or services purchased, used or maintained through this Grant must be compatible with the principles and goals contained in the Electronic and Information Technology Accessibility Standards adopted by the Architectural and Transportation Barriers Compliance Board under Section 508 of the federal Rehabilitation Act of 1973 (29 U.S.C. §794d), as amended. The federal Electronic and Information Technology Accessibility Standards can be found at: xxxx://xxx.xxxxxx-xxxxx.xxx/508.htm.

  • Scaling Locations, Rules, and Organizations All logs from timber sold under the terms and conditions of this contract shall be: (1) scaled at a location approved in writing by STATE; (2) scaled by a third-party scaling organization with a current agreement with STATE; and (3) scaled using the Official Log Scaling and Grading Rules (as adopted by the Northwest Log Rules Advisory Group) and STATE special service scaling instructions in effect at the time the logs are scaled. Utilization scale shall be handled in accordance with the section titled, “Utilization Scale.” PURCHASER shall enter into a written agreement with a third-party scaling organization for the scaling of logs removed from the timber sale area. PURCHASER shall furnish STATE with a copy of the scaling agreement upon request. If logs are delivered when a TPSO scaler is not present, PURCHASER must provide STATE with a method to assure protection and accountability. PURCHASER shall provide STATE with remote check scaling opportunities for logs scaled under this contract. The last two loads at each delivery point shall be continuously available for checking. They shall remain available for a minimum of 48 hours unless replaced by other STATE loads. They shall be available as originally presented for scaling; i.e., if truck scaled, they shall be presented in bunks. In the event scaling is suspended for any reason, hauling operations shall be immediately suspended until approved alternate scaling services are provided, or service by the scaling organization is resumed.

  • Accessibility of Web-Based Information and Applications For State Agency Authorized User Acquisitions: Any web-based information and applications development, or programming delivered pursuant to the contract or procurement, will comply with New York State Enterprise IT Policy NYS-P08-005, Accessibility of Web-Based Information and Applications as follows: Any web-based information and applications development, or programming delivered pursuant to the contract or procurement, will comply with New York State Enterprise IT Policy NYS-P08- 005, Accessibility of Web-Based Information and Applications as such policy may be amended, modified or superseded, which requires that state agency web-based information and applications are accessible to persons with disabilities. Web-based information and applications must conform to New York State Enterprise IT Policy NYS-P08-005 as determined by quality assurance testing. Such quality assurance testing will be conducted by the State Agency Authorized User and the results of such testing must be satisfactory to the Authorized User before web-based information and applications will be considered a qualified deliverable under the contract or procurement.

  • CONTRACTOR NAME CHANGE An amendment is required to change the Contractor's name as listed on this Agreement. Upon receipt of legal documentation of the name change the State will process the amendment. Payment of invoices presented with a new name cannot be paid prior to approval of said amendment.

  • DEVELOPMENT OR ASSISTANCE IN DEVELOPMENT OF SPECIFICATIONS REQUIREMENTS/ STATEMENTS OF WORK Firms and/or individuals that assisted in the development or drafting of the specifications, requirements, statements of work, or solicitation documents contained herein are excluded from competing for this solicitation. This shall not be applicable to firms and/or individuals providing responses to a publicly posted Request for Information (RFI) associated with a solicitation.

Time is Money Join Law Insider Premium to draft better contracts faster.