Common use of Security of processing Clause in Contracts

Security of processing. (a) The processor shall at least implement the technical and organisational measures specified in Annex III to ensure the security of the personal data. This includes protecting the data against a breach of security leading to accidental or unlawful destruction, loss, alteration, unauthorised disclosure or access to the data (personal data breach). In assessing the appropriate level of security, the Parties shall take due account of the state of the art, the costs of implementation, the nature, scope, context and purposes of processing and the risks involved for the data subjects.

Appears in 57 contracts

Samples: Processing Agreement, Remote System Agreement, Processing Agreement

AutoNDA by SimpleDocs

Security of processing. (a) The a)The processor shall at least implement the technical and organisational measures specified in Annex III to ensure the security of the personal data. This includes protecting the data against a breach of security leading to accidental or unlawful destruction, loss, alteration, unauthorised disclosure or access to the data (personal data breach). In assessing the appropriate level of security, the Parties shall take due account of the state of the art, the costs of implementation, the nature, scope, context and purposes of processing and the risks involved for the data subjects.

Appears in 3 contracts

Samples: help.mypurecloud.com, help.mypurecloud.com, www.igenomix.eu

Security of processing. (a) The processor shall at least implement the technical and organisational measures specified in Annex III to ensure the security of the personal data. This includes protecting the data against a breach of security leading to accidental or unlawful destruction, loss, alteration, unauthorised disclosure or access to the data (personal data breach). In assessing the appropriate level of security, the Parties shall take due account of the state of the art, the costs of implementation, the nature, scope, context and purposes of processing and the risks involved for the data subjects.

Appears in 3 contracts

Samples: Data Processing Agreement, assets.website-files.com, www.ait.ac.at

Security of processing. (a) The processor shall at least implement the technical and organisational organizational measures specified in Annex III to ensure the security of the personal dataPersonal Data. This includes protecting the data against a breach of security leading to accidental or unlawful destruction, loss, alteration, unauthorised unauthorized disclosure or access to the data (personal data Personal Data breach). In assessing the appropriate level of security, the Parties shall take due account of the state of the art, the costs of implementation, the nature, scope, context and purposes of processing and the risks involved for the data subjects.

Appears in 3 contracts

Samples: Data Processing Agreement, Data Processing Agreement, Data Processing Agreement

Security of processing. (a) The processor shall at least implement the technical and organisational measures specified in Annex III to ensure the security of the personal data. This includes protecting the data against a breach of security leading to accidental or unlawful destruction, loss, alteration, unauthorised disclosure disclosure, or access to the data (personal data breach). In assessing the appropriate level of security, the Parties shall take due account of the state of the art, the costs of implementation, the nature, scope, context and purposes of processing and the risks involved for the data subjects.

Appears in 2 contracts

Samples: Cost Action Grant Agreement, Cost Action Grant Agreement

Security of processing. (a) The processor shall at least implement the technical and organisational measures specified spec- ified in Annex III Xxxxx XXX to ensure the security of the personal data. This includes protecting the data against a breach of security leading to accidental or unlawful destruction, loss, alterationalter- ation, unauthorised disclosure or access to the data (personal data breach). In assessing the appropriate level of security, the Parties shall take due account of the state of the art, the costs of implementation, the nature, scope, context and purposes of processing and the risks involved for the data subjects.

Appears in 1 contract

Samples: License Agreement

Security of processing. (a) The processor shall at least implement the technical and organisational measures specified in Annex III II to ensure the security of the personal data. This includes protecting the data against a breach of security leading to accidental or unlawful destruction, loss, alteration, unauthorised disclosure or access ac- cess to the data (personal data breachhereinafter “Personal Data Breach). In assessing the appropriate level of security, the Parties shall take due account of the state of the art, the costs of implementation, the nature, scope, context and purposes of processing and the risks involved for the data subjects.

Appears in 1 contract

Samples: cdn-ecom.dish.co

Security of processing. (a) The processor shall at least implement the technical and organisational measures specified in Annex III to ensure the security of the personal data. This includes protecting the data against a breach of security leading to accidental or unlawful destruction, loss, alteration, unauthorised disclosure or access to the data (personal data breach). In assessing the appropriate level of security, the Parties shall take due account of the state of the art, the costs of implementation, the nature, scope, context and purposes of processing and the risks involved for the data subjectssub- jects.

Appears in 1 contract

Samples: Administrative Support Services Agreement

AutoNDA by SimpleDocs

Security of processing. (a) The processor shall at least implement the technical and organisational measures specified in Annex III IV to ensure the security of the personal data. This includes protecting the data against a breach of security leading to accidental or unlawful destruction, loss, alteration, unauthorised disclosure or access to the data (personal data breach). In assessing the appropriate level of security, the Parties shall take due account of the state of the art, the costs of implementation, the nature, scope, context and purposes of processing and the risks involved for the data subjects.

Appears in 1 contract

Samples: lawpilots.com

Security of processing. (a) The processor shall at least implement the technical and organisational measures specified in Annex III to ensure the security of the personal data. This includes protecting the data against a breach of security leading to accidental or unlawful destruction, loss, alteration, unauthorised disclosure or access oraccess to the data (personal data breach). In assessing the appropriate level of security, the Parties shall take due account of the state of the art, the costs of implementation, the nature, scope, context and purposes of processing and the risks involved for the data subjects.

Appears in 1 contract

Samples: www.payex.fi

Security of processing. (a) The processor shall at least implement the technical and organisational organizational measures specified in Annex III Xxxxx XXX to ensure the security of the personal data. This includes protecting the data against a breach of security leading to accidental or unlawful destruction, loss, alteration, unauthorised unauthorized disclosure or access to the data (personal data breach). In assessing the appropriate level of security, the Parties shall take due account of the state of the art, the costs of implementation, the nature, scope, context and purposes of processing and the risks involved for the data subjects.

Appears in 1 contract

Samples: strategy-compass.com

Security of processing. (a) 6.4.1 The processor shall at least implement the technical and organisational measures specified in Annex III to ensure the security of the personal dataPersonal Data. This includes protecting the data against a breach of security leading to accidental or unlawful destruction, loss, alteration, unauthorised disclosure or access to the data (personal data breacha “Personal Data Breach”). In assessing the appropriate level of security, the Parties shall take due account of the state of the art, the costs of implementation, the nature, scope, context and purposes of processing and the risks involved for the data subjects.

Appears in 1 contract

Samples: Consultancy Agreement (Centogene N.V.)

Security of processing. (a) The processor shall at least implement the technical and organisational organizational measures specified in Annex III to ensure the security of the personal data. This includes protecting the data against a breach of security leading to accidental or unlawful destruction, loss, alteration, unauthorised unauthorized disclosure or access to the data (personal data breach). In assessing the appropriate level of security, the Parties shall take due account of the state of the art, the costs of implementation, the nature, scope, context and purposes of processing and the risks involved for the data subjects.

Appears in 1 contract

Samples: Data Protection Agreement

Time is Money Join Law Insider Premium to draft better contracts faster.