Security of the Processing Sample Clauses

Security of the Processing. 5.1 The Beyuna Independent Sales Representative takes the technical and organisational security measures as described in Appendix 2.
AutoNDA by SimpleDocs
Security of the Processing. Factorial shall implement and maintain appropriate technical and organisational measures to protect Client Personal Data against unauthorised or unlawful processing and against accidental loss, destruction, damage, theft, alteration or disclosure, in accordance with the DPA. Such measures shall be appropriate to the harm that could result from any unauthorised or unlawful processing, accidental loss, destruction, damage or theft of the Client Personal Data and appropriate to the nature of the Client Personal Data to be protected. In this sense, Factorial may update the technical and organisational measures, provided that such modifications do not diminish the general level of security. If Factorial becomes aware of and confirms any accidental, unauthorised or unlawful destruction, loss, alteration, disclosure or access to your Client Personal Data ("Security Breach") that we process in the course of providing the Platform we will notify you without undue delay and in any event no later than 48 hours.
Security of the Processing. The Processor is ISO 27001 certified. For an outline of Processor’s technical and organizational measures, please refer to Processor’s Information Security Policy. SUB-PROCESSORS Name and address Location CityNetwork International AB, 556630-7806 Xxxxxxxxxxxxxxxx 00, 000 00 Xxxxxxxxxx Xxxxxx Xxxxxx Outpost24 UK Ltd 5363691 Second floor (south) 000-000 Xxxxx Xxxxxxxx Xxxxxx, X0X0 XX Xxxxxx, Xxxxxx Xxxxxxx Xxxxxx Xxxxxxx Outpost 24, Inc. 00-0000000 00 Xxxxx, Xxxxxxxxxx, Xxxxx 000, Xxxxxxxxxx XX 00000XX 33132, USA USA Outpost24 Benelux BV 34177399 Xxxxxxxxxxxxxxx 00X, 0000 XX Xxxxxxxxx, xxx Xxxxxxxxxxx Xxxxxxxxxxx Outpost24 Belgium BVBA 670497157 Ubicenter, Xxxxxxxxxxx 0 xxx 00, 0000 Xxxxxx, Xxxxxxx Xxxxxxx Xxxxxxx00 Xxxxx SL B 87028643 Xxxx. Xx Xxxxxx 00, 0X, Xxxxxx Xxxxxxxxxxx Xx Xxxxxxxx, 00000 Al-cobendas Madrid, Spain Spain Snowflake, Inc. 000 Xxxxxx Xxxxx Xxx Xxxxx, XX, 00000 XXX Ireland and USA
Security of the Processing. 3.1 In an annex to this DPA (hereinafter referred to as “XXX annex”), the Contractual Partners shall agree on technical and organizational measures to adequately protect the data pursuant to Article 32 of the GDPR (hereinafter referred to as “XXX”), taking into account the state of the art; the costs of implementation; the nature, scope, circumstances and purposes of the processing; and the varying likelihood and severity of threats to the rights and freedoms of natural persons.
Security of the Processing. The Processor is ISO 27001 certified. For an outline of Processor’s technical and organizational measures, please refer to Processor’s Information Security Policy.
Security of the Processing. 5.1 The Processor will endeavour to implement adequate technical and organizational measures with regard to the processing operations of personal data to be carried out, against loss or any form of unlawful processing (such as unauthorized disclosure, deterioration, alteration or transmission of personal data).
AutoNDA by SimpleDocs
Security of the Processing. Taking into account the state of the art, the costs of implementation and the nature, scope, context and purposes of the Processing as well as the risks of varying likelihood and severity to the rights and freedoms of natural persons, Processor shall implement appropriate technical and organizational measures to ensure a level of security appropriate to the risk, including inter-alia as appropriate: (i) the pseudonymisation and encryption of the Processed Personal Data (as appropriate); (ii) the ability to ensure the ongoing confidentiality, integrity, availability and resilience of processing systems and services; (iii) the ability to restore the availability and access to the Processed Personal Data in a timely manner in the event of a physical or technical incident; (iv) a process for regularly testing, assessing and evaluating the effectiveness of technical and organizational measures for ensuring the security of the Processing. Processor is responsible for the sufficiency of the security, privacy, and confidentiality safeguards of all personnel with respect to the Processed Personal Data and liable for any failure by such personnel to meet the terms of this DPA. Processor takes reasonable steps to confirm that personnel are protecting the security, privacy and confidentiality of the Processed Personal Data consistent with the requirements of this DPA. The current security measures adopted by Processor are listed in Appendix 1, which forms an integral part of this DPA. Controller confirms that, considering the Controller’s use of Processor’s Services, it deems that such measures currently meet the requirements of the GDPR and ensure the adequate protection of the rights of the data subject. Processor shall notify Controller of any Personal Data Breach by Processor or its Sub- processors affecting the Processed Personal Data without undue delay and in any event not later than forty-eight (48) hours of becoming aware of a Personal Data Breach unless Processor is able to show that the Personal Data Breach is unlikely to result in a risk to the rights and freedoms of natural persons. Processor shall also provide Controller with full and ongoing assistance in relation to each Party’s obligations under the Data Protection Laws in accordance with any timescales reasonably required by the Controller and the Supervisory Authority concerned, when applicable.

Related to Security of the Processing

  • Details of the Processing The subject-matter of Processing of Personal Data by Data Processor is the performance of the Services pursuant to the Agreement. The duration of the Processing, the nature and purpose of the Processing, as well as the types of Personal Data Processed and categories of Data Subjects under this DPA are further specified in Schedule 1 (Details of the Processing) to this DPA.

  • Security of processing (a) The data importer and, during transmission, also the data exporter shall implement appropriate technical and organisational measures to ensure the security of the data, including protection against a breach of security leading to accidental or unlawful destruction, loss, alteration, unauthorised disclosure or access to that data (hereinafter ‘personal data breach’). In assessing the appropriate level of security, the Parties shall take due account of the state of the art, the costs of implementation, the nature, scope, context and purpose(s) of processing and the risks involved in the processing for the data subjects. The Parties shall in particular consider having recourse to encryption or pseudonymisation, including during transmission, where the purpose of processing can be fulfilled in that manner. In case of pseudonymisation, the additional information for attributing the personal data to a specific data subject shall, where possible, remain under the exclusive control of the data exporter. In complying with its obligations under this paragraph, the data importer shall at least implement the technical and organisational measures specified in Annex II. The data importer shall carry out regular checks to ensure that these measures continue to provide an appropriate level of security.

  • Duration of the Processing Personal Data will be Processed for the duration of the Agreement, subject to Section 4 of this DPA.

  • Nature of the processing MailChimp provides an email service, automation and marketing platform and other related services, as described in the Agreement.

  • Procurement of the Site 10.3.1 Pursuant to the notice specified in Clause 4.1.2, the Authority Representative and the Concessionaire shall, on a mutually agreed date and time, inspect the Site and prepare a memorandum containing an inventory of the Site including the vacant and unencumbered land, buildings, structures, road works, trees and any other immovable property on or attached to the Site. Such memorandum shall have appended thereto an appendix (the “Appendix”) specifying in reasonable detail those parts of the Site to which vacant access and Right of Way has not been granted to the Concessionaire. Signing of the memorandum, in two counterparts (each of which shall constitute an original), by the authorised representatives of the Parties shall, subject to the provisions of Clause 10.2.2, be deemed to constitute a valid licence and Right of Way to the Concessionaire for free and unrestricted use and development of the vacant and unencumbered Site during the Concession Period under and in accordance with the provisions of this Agreement and for no other purpose whatsoever. For the avoidance of doubt, it is agreed that valid licence and Right of Way with respect to the parts of the Site as set forth in the Appendix shall be deemed to have been granted to the Concessionaire upon vacant access thereto being provided by the Authority to the Concessionaire.

  • Priority of Documents The documents forming the Contract are to be taken as mutually explanatory of one another. For the purposes of interpretation, the priority of the documents shall be in accordance with the following sequence:

  • Purpose of the Processing The provision of the Services by the Data Processor to the Data Controller.

  • Control and Maintenance of the Property Unless required by Applicable Law, Lender, or a receiver appointed under Applicable Law, is not obligated to enter upon, take control of, or maintain the Property before or after giving notice of Default to Borrower. However, Xxxxxx, or a receiver appointed under Applicable Law, may do so at any time when Borrower is in Default, subject to Applicable Law.

  • Details of Processing 3.1. For details of how personal data is processed under this Agreement, please register to see our "GDPR Portal" at xxxxx://xxxxxx- xxxxxxx.xxxxx.xxx/Xxxxxxx/x/xxxx-xxx. You may also request a copy of the Product Fact Sheet from Your Access Account Manager.

  • Warehousing Provide materials and supplies, including storage, ordering, and inventory management.

Time is Money Join Law Insider Premium to draft better contracts faster.