Common use of Technical Security Controls Clause in Contracts

Technical Security Controls. Access Policy R3’s internal access control processes and policies are designed to prevent unauthorized persons and/or systems from gaining access to systems used to process personal data. R3’s information security manager ensures only authorized users have access to personal data and all users are allocated unique user IDs for access to systems processing personal information. Data Production systems containing personal information will be logically segregated from development systems. Appropriate authentication schemes will be maintained for systems processing personal information. Systems processing personal data will adequately protect that information at rest and in transit. Personal Data will be deleted in accordance to Data Retention and Deletion section above. Subprocessor Security

Appears in 4 contracts

Samples: Corda Enterprise Software Evaluation License Agreement, Corda Enterprise Software Evaluation License Agreement, Corda Enterprise Software Evaluation License Agreement

AutoNDA by SimpleDocs
Time is Money Join Law Insider Premium to draft better contracts faster.