Description of Technical and Organizational Measures Sample Clauses

Description of Technical and Organizational Measures. Description of the technical and organisational security measures implemented by the data importer: • Physical Access Control No unauthorised access to Data Processing Facilities, e.g.: magnetic or chip cards, keys, electronic door openers, facility security services and/or entrance security staff, alarm systems, video/CCTV Systems • Electronic Access Control No unauthorised use of the Data Processing and Data Storage Systems, e.g.: (secure) passwords, automatic blocking/locking mechanisms, two-factor authentication, encryption of data carriers/storage mediaInternal Access Control (permissions for user rights of access to and amendment of data) No unauthorised Reading, Copying, Changes or Deletions of Data within the system, e.g. rights authorisation concept, need-based rights of access, logging of system access events • Isolation Control The isolated Processing of Data, which is collected for differing purposes, e.g. multiple Client support, sandboxing; and
AutoNDA by SimpleDocs
Description of Technical and Organizational Measures. As from the Terms Effective Date, Wisetail will implement and maintain the Securi- ty Measures set out in this Schedule 2. Wisetail may update or modify such Security Measures from time to time provided that such updates and modifications do not result in the degradation of the overall security of the Services. Wisetail employee competence is a key element of the control environment. Wise- tail is committed to training and developing its employees. This commitment to competence is expressed in the company's personnel policies and related human resource programs. At least annually, the Human Resources Team/Management per- forms a review of key talent by individual and role to ensure that critical talent is retained and to ensure that the organizational structure is aligned in a way that will support achievement of the company's objectives and strategies. Wisetail en- sures that personnel have the knowledge and training needed to perform their du- ties. New employees go through initial Security training during the New Hire Process. Wisetail personnel are required to conduct themselves in a manner consis- tent with the company’s guidelines regarding confidentiality, business ethics, ap- propriate usage, and professional standards. Wisetail conducts reasonably appro- priate backgrounds checks to the extent legally permissible and in accordance with applicable local labor law and statutory regulations. Personnel are required to ex- ecute a confidentiality agreement and must acknowledge receipt of, and compli- ance with, Wisetail confidentiality and privacy policies. Personnel are provided with security training. Personnel handling Customer Data are required to complete additional requirements appropriate to their role (eg., certifications). Wisetail personnel will not process Customer Data without authorization. Before onboarding Subprocessors, Wisetail conducts an audit of the security and privacy practices of Subprocessors to ensure Subprocessors provide a level of secu- rity and privacy appropriate to their access to data and the scope of the services they are engaged to provide. Once Wisetail has assessed the risks presented by the Subprocessor, then subject to the requirements of the Data Controller’s Require- ments for Subprocessor Engagement, the Subprocessor is required to enter into appropriate security, confidentiality and privacy contract terms, in accordance with Section 6 of the Data Processing Agreement.
Description of Technical and Organizational Measures. This Xxxxx describes the technical and organizational security measures implemented by Capsa in accordance with Clauses 4(d) and 5(c) of the Standard Contractual Clauses:
Description of Technical and Organizational Measures. As from the Terms Effective Date, Playerlync will implement and maintain the Security Measures set out in this Schedule 2. Playerlync may update or modify such Security Measures from time to time provided that such updates and modifications do not result in the degradation of the overall security of the Services. Playerlync employee competence is a key element of the control environment. Playerlync is committed to training and developing its employees. This commitment to competence is expressed in the company's personnel policies and related human resource programs. At least annually, the Human Resources Team/Management performs a review of key talent by individual and role to ensure that critical talent is retained and to ensure that the organizational structure is aligned in a way that will support achievement of the company's objectives and strategies. Playerlync ensures that personnel have the knowledge and training needed to perform their duties. New employees go through initial Security training during the New Hire Process. Playerlync personnel are required to conduct themselves in a manner consistent with the company’s guidelines regarding confidentiality, business ethics, appropriate usage, and professional standards. Playerlync conducts reasonably appropriate backgrounds checks to the extent legally permissible and in accordance with applicable local labor law and statutory regulations. Personnel are required to execute a confidentiality agreement and must acknowledge receipt of, and compliance with, Playerlync confidentiality and privacy policies. Personnel are provided with security training. Personnel handling Customer Data are required to complete additional requirements appropriate to their role (eg., certifications). Playerlync personnel will not process Customer Data without authorization. Before onboarding Subprocessors, Playerlync conducts an audit of the security and privacy practices of Subprocessors to ensure Subprocessors provide a level of security and privacy appropriate to their access to data and the scope of the services they are engaged to provide. Once Playerlync has assessed the risks presented by the Subprocessor, then subject to the requirements of the Data Controller’s Requirements for Subprocessor Engagement, the Subprocessor is required to enter into appropriate security, confidentiality and privacy contract terms, in accordance with Section 6 of the Data Processing Agreement. For the purposes of Article 26(2) of Directiv...

Related to Description of Technical and Organizational Measures

  • Technical and Organizational Measures The following sections define SAP’s current technical and organizational measures. SAP may change these at any time without notice so long as it maintains a comparable or better level of security. Individual measures may be replaced by new measures that serve the same purpose without diminishing the security level protecting Personal Data.

  • Technical and Organisational Measures (1) Before the commencement of processing, the Supplier shall document the execution of the necessary Technical and Organisational Measures, set out in advance of the awarding of the Order or Contract, specifically with regard to the detailed execution of the contract, and shall present these documented measures to the Client for inspection. Upon acceptance by the Client, the documented measures become the foundation of the contract. Insofar as the inspection/audit by the Client shows the need for amendments, such amendments shall be implemented by mutual agreement. (2) The Supplier shall establish the security in accordance with Article 28 Paragraph 3 Point c, and Article 32 GDPR in particular in conjunction with Article 5 Paragraph 1, and Paragraph 2 GDPR. The measures to be taken are measures of data security and measures that guarantee a protection level appropriate to the risk concerning confidentiality, integrity, availability and resilience of the systems. The state of the art, implementation costs, the nature, scope and purposes of processing as well as the probability of occurrence and the severity of the risk to the rights and freedoms of natural persons within the meaning of Article 32 Paragraph 1 GDPR must be taken into account. [Details in Appendix 1] (3) The Technical and Organisational Measures are subject to technical progress and further development. In this respect, it is permissible for the Supplier to implement alternative adequate measures. In so doing, the security level of the defined measures must not be reduced. Substantial changes must be documented.

  • Certification Regarding Business with Certain Countries and Organizations Pursuant to Subchapter F, Chapter 2252, Texas Government Code, PROVIDER certifies it is not engaged in business with Iran, Sudan, or a foreign terrorist organization. PROVIDER acknowledges this Purchase Order may be terminated if this certification is or becomes inaccurate.

  • CONTRACTOR NAME CHANGE An amendment is required to change the Contractor's name as listed on this Agreement. Upon receipt of legal documentation of the name change the State will process the amendment. Payment of invoices presented with a new name cannot be paid prior to approval of said amendment.

  • DEVELOPMENT OR ASSISTANCE IN DEVELOPMENT OF SPECIFICATIONS REQUIREMENTS/ STATEMENTS OF WORK

  • Recognition of the U.S. Special Resolution Regimes (i) In the event that any Underwriter that is a Covered Entity becomes subject to a proceeding under a U.S. Special Resolution Regime, the transfer from such Underwriter of this Agreement, and any interest and obligation in or under this Agreement, will be effective to the same extent as the transfer would be effective under the U.S. Special Resolution Regime if this Agreement, and any such interest and obligation, were governed by the laws of the United States or a state of the United States. (ii) In the event that any Underwriter that is a Covered Entity or a BHC Act Affiliate of such Underwriter becomes subject to a proceeding under a U.S. Special Resolution Regime, Default Rights under this Agreement that may be exercised against such Underwriter are permitted to be exercised to no greater extent than such Default Rights could be exercised under the U.S. Special Resolution Regime if this Agreement were governed by the laws of the United States or a state of the United States. As used in this Section 16(e):

  • Abuse and Neglect of Children and Vulnerable Adults: Abuse Registry Party agrees not to employ any individual, to use any volunteer or other service provider, or to otherwise provide reimbursement to any individual who in the performance of services connected with this agreement provides care, custody, treatment, transportation, or supervision to children or to vulnerable adults if there has been a substantiation of abuse or neglect or exploitation involving that individual. Party is responsible for confirming as to each individual having such contact with children or vulnerable adults the non-existence of a substantiated allegation of abuse, neglect or exploitation by verifying that fact though (a) as to vulnerable adults, the Adult Abuse Registry maintained by the Department of Disabilities, Aging and Independent Living and (b) as to children, the Central Child Protection Registry (unless the Party holds a valid child care license or registration from the Division of Child Development, Department for Children and Families). See 33 V.S.A. §4919(a)(3) and 33 V.S.A. §6911(c)(3).

  • Governance and Anticorruption The Borrower, the Project Executing Agency, and the implementing agencies shall (a) comply with ADB’s Anticorruption Policy (1998, as amended to date) and acknowledge that ADB reserves the right to investigate directly, or through its agents, any alleged corrupt, fraudulent, collusive or coercive practice relating to the Project; and

  • Identification of Goods Identification of the goods shall not be deemed to have been made until both Buyer and Seller have agreed that the goods in question are to be appropriate to the performance of this Agreement.

  • Management of Special and Technical Environment Each certificated support person demonstrates an acceptable level of performance in managing and organizing the special materials, equipment and environment essential to the specialized programs.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!