Common use of Security of processing Clause in Contracts

Security of processing. 4.1 Taking into account the state of the art, the costs of implementation and the nature, scope, context and purposes of processing as well as the risk of varying likelihood and severity for the rights and freedoms of natural persons, the controller and the processor shall implement appropriate technical and organisational measures to ensure a level of security appropriate to the risk, including inter alia as appropriate:

Appears in 20 contracts

Samples: Added Reseller Agreement, Added Reseller Agreement, Added Reseller Agreement

AutoNDA by SimpleDocs

Security of processing. 4.1 10.1. Taking into account the state of the art, the costs of implementation and the nature, scope, context and purposes of processing as well as the risk of varying likelihood and severity for the rights and freedoms of natural persons, the controller and the processor Company shall implement appropriate technical and organisational measures to ensure a level of security appropriate to the risk, including inter alia as the Company shall deem appropriate:

Appears in 1 contract

Samples: Data Processing Agreement

Security of processing. 4.1 10.1. Taking into account the state of the art, the costs of implementation and the nature, scope, context and purposes of processing as well as the risk of varying likelihood and severity for the rights and freedoms of natural persons, the controller and the processor Consultant shall implement appropriate technical and organisational measures to ensure a level of security appropriate to the risk, including inter alia as the Consultant shall deem appropriate:

Appears in 1 contract

Samples: Data Processing Agreement

AutoNDA by SimpleDocs

Security of processing. 4.1 5.1 Taking into account the state of the art, the costs of implementation and the nature, scope, context and purposes of processing as well as the risk of varying likelihood and severity for the rights and freedoms of natural persons, without prejudice to any other security standards agreed upon by the controller Parties, the Data Controller and the processor Data Processor shall implement appropriate technical and organisational measures to ensure a level of security of the processing of Personal Data appropriate to the risk, including inter alia . These measures shall include as appropriate:

Appears in 1 contract

Samples: Processing Agreement

Time is Money Join Law Insider Premium to draft better contracts faster.