Measures to ensure integrity Sample Clauses

Measures to ensure integrity. 1. Data integrity The installation or patching processes ensure appropriate backups are taken prior to any upgrade.
AutoNDA by SimpleDocs
Measures to ensure integrity. 2.1. Disclosure/transmission (Aspects of the disclosure (transmission) of personal data must be regulated: electronic transmission, data transport, and their control) ☒ There is a secure method of sending data between the Client, Contractor and third parties. ☒ Encrypted ZIP files are possible for email transmission. ☒ Use of VPN connections. ☒ Data exchange takes place via SSL (https) encryption. ☒ Documented management of mobile end devices and data storage media. ☒ Safe disposal/secure erasure of data storage media has been ensured. ☒ Use of document shredders (in accordance with DIN 66399).
Measures to ensure integrity. Data transfer control Measures for migration, transfer, transmission, or storage of data to or on data carriers (manually or electronically), and measures for subsequent review. The measures ensure that personal data or confidential data cannot be read, copied, altered or removed without authorization during their electronic transmission or during their transport or storage on data carriers and that it is possible to verify and establish the points to which personal data are to be transmitted by data transmission facilities. Description of controls in place / measures taken: - Clients’ data received for software support are received via secure communication channels and stored securely for the duration of the support ticket. Email attachments are not allowed. - An established acceptable use policy that is documented and regularly reviewed based on business and information security requirements. - Media containing information is protected against unauthorized access, misuse, or corruption during transportation. - Formal transfer policies, procedures, and controls are in place to protect or, where appropriate, prevent the transfer of information to removable media or communication facilities. - Information transferred within ASG’s electronic messaging is appropriately protected and encrypted. • Input control Measures for subsequent review whether and by whom data were input, modified, or removed (erased). The measures ensure that it can be subsequently verified and established whether and by whom personal data have been entered into, modified in or removed from computer systems. Description of controls in place / measures taken: - Unauthorized parties are prevented by appropriate measures such as firewalls, intrusion detection and prevention systems, logging and evaluation as well as multi- factor authentication and VPN. - All critical devices, systems, databases and applications must have logging enabled to capture sufficient information to establish a proper verifiability of occurring events. - Log information is protected against unauthorized access. - Access to systems, applications and the underlying data is always based on individual, personally associated user identifiers. - The use of privileged utility software is consistently logged and access is restricted. • Order Control - An established policy regarding commissioned data processing that is documented and regularly reviewed based on business and information security requirements. Employees are i...
Measures to ensure integrity. 1. Data integrity Measures to ensure that stored personal data cannot be corrupted by means of a malfunctioning of the system. Description of data integrity: Processor employs an automated testing system for new releases which verifies the correctness of the changed component. Components that fail these tests will not be deployed to a production environment. Changes to Processor’s main database are logged, can be audited and rolled back on a per change basis. To ensure against unintentional data corruption the production system is segregated from other environments.
Measures to ensure integrity. Integrity refers to ensuring the correctness (integrity) of data and the correct functioning of systems.
Measures to ensure integrity. 3.1 Transport and transfer control

Related to Measures to ensure integrity

  • Measures SAP protects its assets and facilities using the appropriate means based on the SAP Security Policy • In general, buildings are secured through access control systems (e.g., smart card access system). • As a minimum requirement, the outermost entrance points of the building must be fitted with a certified key system including modern, active key management. • Depending on the security classification, buildings, individual areas and surrounding premises may be further protected by additional measures. These include specific access profiles, video surveillance, intruder alarm systems and biometric access control systems. • Access rights are granted to authorized persons on an individual basis according to the System and Data Access Control measures (see Section 1.2 and 1.3 below). This also applies to visitor access. Guests and visitors to SAP buildings must register their names at reception and must be accompanied by authorized SAP personnel. • SAP employees and external personnel must wear their ID cards at all SAP locations.

  • Technical and Organisational Measures (1) Before the commencement of processing, the Supplier shall document the execution of the necessary Technical and Organisational Measures, set out in advance of the awarding of the Order or Contract, specifically with regard to the detailed execution of the contract, and shall present these documented measures to the Client for inspection. Upon acceptance by the Client, the documented measures become the foundation of the contract. Insofar as the inspection/audit by the Client shows the need for amendments, such amendments shall be implemented by mutual agreement.

  • Safeguards Monitoring and Reporting 8. The Borrower shall do the following or cause the Project Executing Agency to do the following:

  • Information Safeguards Business Associate will develop, document, implement, maintain and use appropriate administrative, technical and physical safeguards to preserve the integrity and confidentiality of and to prevent non-permitted use or disclosure of PHI created for or received from Recipient or its Subsidiaries. These safeguards must be appropriate to the size and complexity of Business Associate’s operations and the nature and scope of its activities. Business Associate agrees that these safeguards will meet any applicable requirements set forth by the U.S. Department of Health and Human Services, including (as of the effective date or as of the compliance date, whichever is applicable) any requirements set forth in the final HIPAA security regulations. Business Associate agrees to mitigate, to the extent practicable, any harmful effect that is known to Business Associate resulting from a use or disclosure of PHI by Business Associate in violation of the requirements of this Addendum.

  • Technical and Organizational Measures The following sections define SAP’s current technical and organizational measures. SAP may change these at any time without notice so long as it maintains a comparable or better level of security. Individual measures may be replaced by new measures that serve the same purpose without diminishing the security level protecting Personal Data.

  • Information Technology Enterprise Architecture Requirements If this Contract involves information technology-related products or services, the Contractor agrees that all such products or services are compatible with any of the technology standards found at xxxxx://xxx.xx.xxx/iot/2394.htm that are applicable, including the assistive technology standard. The State may terminate this Contract for default if the terms of this paragraph are breached.

  • Appropriate Technical and Organizational Measures SAP has implemented and will apply the technical and organizational measures set forth in Appendix 2. Customer has reviewed such measures and agrees that as to the Cloud Service selected by Customer in the Order Form the measures are appropriate taking into account the state of the art, the costs of implementation, nature, scope, context and purposes of the processing of Personal Data.

Time is Money Join Law Insider Premium to draft better contracts faster.