Data Security Measures. Without prejudice to Data Controller’s security risk assessment obligations under Section 3.2 (Security Risk Assessment) above, Data Processor shall maintain appropriate technical and organizational safeguards to protect the security, confidentiality, and integrity of Customer Data, including any Personal Data contained therein, as described in Section 2 (Physical, Technical, and Administrative Security Measures) of the Data Security Guide. Such measures are designed to protect Customer Data from loss, alteration, unauthorized access, acquisition, use, disclosure, or accidental or unlawful destruction, and include:
Data Security Measures. Broadridge and Ridge will maintain commercially reasonable security measures, including, without limitation, without limitation those described in Exhibit B (Ridge Data Security Measures) attached hereto, designed to ensure that access to the Xxxxxx or Client files is available only to Xxxxxx or Client and those entities that process information contained in the Xxxxxx or Client files in order for Ridge to execute the Services (e.g., Canadian stock exchanges, clearing agencies, NYSE and DTC). Subject to the foregoing and Section 16 (Laws and Governmental Regulations), Broadridge and Ridge reserve the right to issue and change procedures from time to time to improve file security. Broadridge or Ridge, as applicable, will notify Xxxxxx or Client, as applicable, prior to making any such changes and obtain Xxxxxx’x or Client’s prior consent (which consent shall not be unreasonably withheld) with respect to the change only if such consent is required by Law.
Data Security Measures. Without prejudice to Data Controller’s security risk assessment obligations under Section 3.2 (Security Risk Assessment) above, Data Processor shall maintain the Security Policy Framework. Data Processor regularly tests, assess and evaluates the effectiveness of its Security Policy Framework and may periodically review and update the Security Policy Framework to address new and evolving security technologies, changes to industry standard practices, and changing security threats.
Data Security Measures. 12.1 In relation to the processing of the Protected Data, TDL will implement and maintain, at its cost and expense, appropriate technical and organisational measures to ensure for the Protected Data a level of security appropriate to the risks presented by the processing, taking into account the state of the art, the cost of implementation and the nature, scope, context and purpose of the processing of the Protected Data as well as the risk of varying likelihood and severity of the rights and freedoms of natural persons.
Data Security Measures. In order to protect your Confidential Information, we will: (a) implement and maintain all reasonable security measures appropriate to the nature of the Confidential Information including without limitation, technical, physical, administrative and organizational controls, and will maintain the confidentiality, security and integrity of such Confidential Information; (b) implement and maintain industry standard systems and procedures for detecting, mitigating, and responding to attacks, intrusions, or other systems failures and regularly test or otherwise monitor the effectiveness of the safeguards' key controls, systems, and procedures; (c) designate an employee or employees to coordinate implementation and maintenance of its Security Measures (as defined below); and (d) identify reasonably foreseeable internal and external risks to the security, availability, confidentiality, and integrity of Confidential Information that could result in the unauthorized disclosure, misuse, alteration, destruction or other compromise of such information, and assess the sufficiency of any safeguards in place to control these risks (collectively, Security Measures). Client acknowledges and agrees that Xxxxx’x obligations with respect to Security Measures is subject to Section B(4.2) above.
Data Security Measures. Druva shall maintain appropriate technical and organizational safeguards and reasonable security measures and practices to protect the security, confidentiality and integrity of Customer Data, including any Personal Data contained therein, as described in Exhibit C. Such measures are designed to protect Customer Data from loss, alteration, unauthorized access, acquisition, use, disclosure, or accidental or unlawfuldestruction.
Data Security Measures. Famic shall implement and maintain commercially reasonable security measures to protect User's information. These measures shall include, but are not limited to, administrative, physical, and technical safeguards designed to prevent unauthorized access, use, or disclosure of User's Data. Famic will ensure that all security measures comply with applicable laws and regulations, including data protection and privacy laws. Famic will also follow industry best practices to continuously improve security of its Infrastructure. Famic shall use reputable third-party service providers that adhere to industry standards for Cloud security. These providers will be required to maintain security measures that meet or exceed those used by Famic.
Data Security Measures. Without prejudice to Data Controller’s security risk assessment obligations under Section 3.2 (Security Risk Assessment) above, Data Processor shall maintain appropriate technical and organizational safeguards to protect the security, confidentiality, and integrity of Customer Data, including any Personal Data contained therein, as described in Section 2 (Physical, Technical, and Administrative Security Measures) of the Data Security Guide. Such measures are designed to protect Customer Data from loss, alteration, unauthorized access, 4.3. データ・セキュリティの手段 上記 3 条 2 項(セキュリティリスク評価)に基づくデータ管理者のセキュリティリスク評価義務に影響を及ぼすことなく、データ処理者は、データ・セキュリティ・ガイドの 2 条(物理的、技術的および管理上のセキュリティ対策)に規定される個人データを含む顧客データのセキュリティ、機密性および完全性の保護のための適切な技術上および組織的なセキュリティ対策を維持するものとします。かかる措置は、損失、変更、権✲のないアクセス、取得、使用、開示または偶然もしくは違法な破棄 acquisition, use, disclosure, or accidental or unlawful destruction, and include: から顧客データを保護するよう策定され、以下を含 みます。
Data Security Measures. The Contractor shall implement appropriate technical and organisational measures to protect the Personal Data and to ensure a level of security appropriate to the risk, including inter alia as appropriate:
(a) pseudonymisation and encryption of the Personal Data, if possible;
(b) the ability to ensure the ongoing confidentiality, integrity, availability and resilience of Processing systems and services;
(c) the ability to restore the availability and access to the Personal Data in a timely manner in the event of physical or technical incident; and
(d) process for regular testing, assessing and evaluating the effectiveness of technical and organisational measures for ensuring the security of the Processing. The Contractor implements appropriate technical and organizational measures to protect the Personal Data, considering the risks that are presented by the Processing, such as accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to, the Personal Data transmitted, stored or otherwise Processed. The technical options and the costs of the options in relation to the special risks connected with the Processing of and sensitive nature of the Personal Data, of which the Company has informed or in writing brought out, must be taken into account when organizing the security measures. The Company must ensure that the Contractor is informed of all matters regarding the Personal Data provided by the Company, such as Processing of special categories of data, which may affect the technical and organizational measures in accordance with this DPA. The Contractor ensures that the personnel of the Contractor or its Sub-Processors, that take part in the Processing of the Personal Data, maintains appropriate confidentiality. On the Company’s demand and without unreasonable delay, the Contractor shall provide the Company with a documented description of the Contractor’s implemented technical, organisational and security measures.
Data Security Measures. The following describes Coupa’s Security Program as of the Effective Date. The following terms may be updated from time to time, however, for each Order Form, terms effective as of execution of the Order Form shall apply for the duration of the applicable Subscription Term.