Segregation control Sample Clauses

Segregation control. It is ensured that personal data collected for different purposes are not mixed in their processing. To this end, multitenant systems are used where necessary, or systems are physically or logically separated.
AutoNDA by SimpleDocs
Segregation control. The Service Provider must process data collected for different purposes separately (i.e. measures to provide for separate processing (storage, amendment, deletion, transmission) of data for different purposes must be in place). In addition, the Service Provider and any of its subcontractors will not store, process or access any data received from the ESM outside of the euro area without the ESM’s prior written consent. If the Service Provider or any of its subcontractors want to store, process or access any personal data received from the ESM outside of the European Economic Area, in addition to receiving the ESM’s prior written consent, the Parties will agree on adequate contractual safeguards with respect to the protection of personal data outside of the European Economic Area. The Service Provider is responsible for ensuring that all of its Employees, subcontractors and any other persons acting on behalf of the Service Provider in the performance of the Services will comply with all aspects of and all obligations arising out of this § 12 and Xxxxx XX and III and will be liable for any breach by them of these obligations. Without prejudice to Clause 1.5 (Reporting) of Xxxxx XX hereto the Service Provider shall report to the ESM any actual or suspected breach of confidentiality, integrity and/or availability of ESM data, including personal data, held by or processed by the Service Provider. Such reports shall be issued within 24 hours upon identifying the breach and shall contain details on the actions undertaken to investigate and repair such breach.
Segregation control. Personal data collected for different purposes is processed separately in compliance with Swedish legislation and Volvo security rules. Test and production environments are strictly separated from each other, according to Dealer rules, and a developer can never update the production environment. This ensures separation of duties. Data from different customers are in most cases divided from each other physically. However, the storage philosophy adopted by Volvo IT depends on shattering. This means that all information is split between different media, which in turn means that if one physical media would be compromised, the information would not be able to be recovered. Client data are stored via CIFS for internal Customers using ACL (Access Control List) in AD and for external customers Volvo IT has dedicated logical storage systems. NFS is the storage system holding export rights. Servers/data base via FCP are using LUN security in the storage system and Zoning in the SAN network, to secure correct access of server disks.
Segregation control. Processor undertakes the following measures to separate the Processing of Personal Data: • Data Processing for different controllers is made on server systems which are separated by a system of logical and physical access controls in the network as required such that each controller only has access to its own data.
Segregation control. Separation of personal data must be ensured by different storage locations or by client separation.
Segregation control. Personal data collected for different purposes is processed separately in compliance with Swedish legislation and VOLVO security rules. Test and production environments are strictly separated from each other, according to VOLVO rules, and a developer can never update the production environment. This ensures separa- tion of duties. Data from different customers are in most cases divided from each other physically. However, the storage philosophy adopt- ed by VOLVO IT depends on shattering. This means that all information is split between different media, which in turn means that if one physical media would be compromised, the information would not be able to be recovered. Client data are stored via CIFS for internal Customers using ACL (Access Control List) in AD and for external customers we have dedicated logical storage systems. NFS is the storage system holding export rights. Servers/data base via FCP are using LUN security in the stor- age system and Zoning in the SAN network, to secure correct access of server disks. Please note: Any requests for more information and further inquiries shall be directed to VOLVO in writing. since decades, the primary supplier of IT services to the VOL- VO Group. However, VOLVO IT as supplier is not compulsory and other suppliers may be chosen. The criteria for selecting an IT supplier, within the VOLVO Group as well as on the market as a whole, are primarily economy, availability, security and service level. Contracts between VOLVO Group companies and VOLVO IT are composed in the same way as contracts be- tween external customers and VOLVO IT in compliance with Version 1, January 2015 Appendix 4 - Template Driver Notice and Consent Form Data protection Notice and Consent: (the “Truck Owner”) has contracted Volvo Truck Corporation, a company incorporated according to the laws of Sweden under Reg. No. 556013-9700 (“VOLVO”), for the provision of certain services in relation to the telematic system of one or several of its VOLVO trucks. The Telematic System is a telematic based system developed by VOLVO to support truck owners with information on its VOLVO trucks, drivers and fleet performances, positioning, tracking, messaging and integration of third-party applications. The system collects, processes, monitors, analyses and sends certain data interactively over the wireless network from the VOLVO truck to VOLVO in order to enable VOLVO’s systems to further process the data and to provide certain services to the truck own...
Segregation control to ensure that data collected for different purposes and different customers of supplier maintains appropriate segregation. Supplier maintains a governance process to review services being introduced to the organization meet our security controls and practices and assess any residual risks. A part of this governance process is to ensure our data and environment is appropriately segregated from any other shared services. Data is segregated based on defined roles and responsibilities and the need to know principles.
AutoNDA by SimpleDocs
Segregation control. Personal data collected for different purposes is processed separately in compliance with Swedish legislation and VOLVO security rules. Test and production environments are strictly separated from each other, according to VOLVO rules, and a developer can never update the production environment. This ensures separa- tion of duties. Data from different customers are in most cases divided from each other physically. However, the storage philosophy adopt- ed by VOLVO IT depends on shattering. This means that all information is split between different media, which in turn means that if one physical media would be compromised, the information would not be able to be recovered. Client data are stored via CIFS for internal Customers using ACL (Access Control List) in AD and for external customers we have dedicated logical storage systems. NFS is the storage system holding export rights. Servers/data base via FCP are using LUN security in the stor- age system and Zoning in the SAN network, to secure correct access of server disks. Please note: Any requests for more information and further inquiries shall be directed to VOLVO in writing.
Segregation control. Service Provider undertakes the following measures to separate the Processing of collected data for different purposes: • Each data Processing is made on server systems which are separated by a system of logical and physical access controls in the network. • The Personal Data Processing is only made for the purpose specified in this Agreement.
Segregation control. Cheetah maintains controls designed to provide adequate segregation of duties among the Cheetah personnel, including access to systems and networks. Duties are assigned in such a manner that a person will not have the opportunity to conceal their errors or irregularities. Segregation of duties shall be maintained among and/or within the following functions: computer operations, network management, system administration, development, change management, and security administration.
Time is Money Join Law Insider Premium to draft better contracts faster.