Continued Evaluation. AWS will conduct periodic reviews of the security of its AWS Network and adequacy of its information security program as measured against industry security standards and its policies and procedures. AWS will continually evaluate the security of its AWS Network and associated Services to determine whether additional or different security measures are required to respond to new security risks or findings generated by the periodic reviews.
Continued Evaluation. 4me will conduct periodic reviews of the security of its 4me Infrastructure and adequacy of its information security program as measured against industry security standards and its policies and procedures. 4me will continually evaluate the security of its 4me Infrastructure and associated Services to determine whether additional or different security measures are required to respond to new security risks or findings generated by the periodic reviews.
Continued Evaluation. Partner will conduct periodic reviews of the Security of its Partner Network and adequacy of its information security program as measured against industry security standards and its policies and procedures. Partner will continually evaluate the security of its Partner Network to determine whether additional or different security measures are required to respond to new security risks or findings generated by the periodic reviews.
Continued Evaluation. AWS will conduct periodic reviews of the security of its AWS Network and adequacy of its information security program as measured against industry security standards and its policies and procedures. AWS will continually evaluate the security of its AWS Network and associated Services to determine whether additional or different security measures are required to respond to new security risks or findings generated by the periodic reviews. For the purposes of Article 26(2) of Directive 95/46/EC for the transfer of personal data to processors established in third countries which do not ensure an adequate level of data protection HAVE AGREED on the following Contractual Clauses (the Clauses) in order to adduce adequate safeguards with respect to the protection of privacy and fundamental rights and freedoms of individuals for the transfer by the data exporter to the data importer of the personal data specified in Appendix 1.
Continued Evaluation. 4me will conduct periodic reviews of the security of its 4me Infrastructure and adequacy of its information security program as measured against industry security standards and its policies and procedures. 4me will continually evaluate the security of its 4me Infrastructure and associated Service to determine whether additional or different security measures are required to respond to new security risks or findings generated by the periodic reviews.
1. Name: Amazon Web Services Address: 000 Xxxxx Xxx North Seattle, WA 98109-5210 U.S.A. Attention: General Counsel Description of processing: Facilitating the Virtual Private Cloud Infrastructure (local data centers) to enable the Processor to provide the Service. Location of processing in Europe: Ireland and Germany
2. Name: Workato, Inc. Address: 000 Xxxxxx Xxxxxx, Suite 300 Mountain View, CA 94041 U.S.A. Attention: Chief Information Security Officer, xxxxxxx@xxxxxxx.xxx Description of processing: Workato provides a flexible business integration and automation service which is used by the Processor to provide the 4me Workflow Automator Service. Location of processing in Europe: Germany
1. The parties agree that the terms of the Standard Contractual Clauses are hereby incorporated by reference and shall apply to transfer of Customer Personal Data from the EEA to other countries that are not deemed as Adequate Countries.
2. Module Two (Controller to Processor) of the Standard Contractual Clauses shall apply where the transfer is effectuated by Customer as the data Controller of the Personal Data and 4me is the data Processor of the Personal Data.
3. The Parties agree that for the purpose of transfer of Customer Personal Data between Customer (as Data Exporter) and the 4me (as Data Importer), the following shall apply:
3.1. Clause 7 of the Standard Contractual Clauses shall not be applicable.
3.2. In Clause 9, option 2 (general written authorization) shall apply and the method for appointing and time period for prior notice of subprocessor changes shall be as set forth in the subprocessing Section 5 of the Addendum.
3.3. In Clause 11, the optional language will not apply, and data subjects shall not be able to lodge a complaint with an independent dispute resolution body.
3.4. In Clause 17, option 1 shall apply. The parties agree that the Standard Contractual Clauses shall be governed by the laws of the EU Member State in which the Customer is established (where applicable).
3.5. In Clause 18(b) the parties choo...
Continued Evaluation. Vercel will conduct periodic reviews of the security of its Vercel Network and adequacy of its information security program as measured against industry security standards and its policies and procedures. Vercel will continually evaluate the security of its Vercel Network and associated Services to determine whether additional or different security measures are required to respond to new security risks or findings generated by periodic reviews.
Continued Evaluation. Planon will conduct periodic reviews of the security of its infrastructure and adequacy of its information security program as measured against industry security
Continued Evaluation. If a Faculty Member is recommended for Continued Evaluation, the evaluation panel will be retained for this purpose. The panel will create an improvement plan containing the elements described in Article 8 Section 4(f)(3) and work with the Faculty Member for the semester following the one in which the rating was assigned. The panel will assist the evaluatee in improving in areas that led to the finding of continued evaluation, or recommend a mentoring process. The panel will submit a new evaluation report and recommendation to the Vice President of Instruction or Student Services, as appropriate, by the date of the appropriate semester as specified in subsection g. of this Section. In response to the report, the evaluatee may submit to the Vice President a written, signed statement which will be attached to the report. The Vice President, after reviewing the new evaluation report and recommendation with the panel, will change the rating to satisfactory, or in the event the panel again finds the evaluatee's performance unsatisfactory, an Augmented Evaluation will be initiated.
Continued Evaluation. MBBM VAS will conduct periodic reviews of the security of its MBBM VAS Network and adequacy of its information security program as measured against industry security standards and its policies and procedures. MBBM VAS will continually evaluate the security of its MBBM VAS Network and associated services to determine whether additional or different security measures are required to respond to new security risks or findings generated by the periodic reviews.
Continued Evaluation. Provider of hosting Facilities will conduct periodic reviews of the security of its Facilities and adequacy of its information security program as measured against industry security standards and its policies and procedures.