Information Security Measures. Xxxx takes information security seriously. This information security overview applies to Dell’s corporate controls for safeguarding personal data which is processed and transferred amongst Dell group companies. Dell’s information security program enables the workforce to understand their responsibilities. Some customer solutions may have alternate safeguards outlined in the statement of work as agreed with each customer.
Information Security Measures. Dell takes information security seriously. This information security overview applies to Dell’s corporate controls for safeguarding personal data which is processed and transferred amongst Dell group companies. Dell’s information security program enables the workforce to understand their responsibilities. Some customer solutions may have alternate safeguards outlined in the statement of work as agreed with each customer.
Information Security Measures. This information security overview applies to Provider’s corporate controls for safeguarding Personal Data. Provider’s information security program enables the workforce to understand their responsibilities.
Information Security Measures. Vendor is committed to ensuring that information security control is implemented and properly managed to protect the confidentiality, integrity and availability of Personal Data processed on behalf of and under the instruction of NTT.
Information Security Measures. 7.1 The Processor shall take appropriate technical and organisational precautions to ensure the secure Processing of the Controller’s Personal Data, especially to prevent and protect the Personal Data from accidental loss, modification, destruction or damage. When assessing the appropriate level of such information security measures, the Processor must take into account the risks related to Processing the Personal Data, the level of technology, the implementation costs, the nature, scope, context, and purposes of the Processing, and the risks affecting the rights and freedoms of natural persons, which vary in likelihood and severity. At a minimum, the Processor undertakes to:
7.1.1 pseudonymise and encrypt the Personal Data to uphold their confidentiality, if necessary;
7.1.2 guarantee the continuous confidentiality, integrity, availability and fault-tolerance of the processing systems and services;
7.1.3 ensure the capability to restore availability and access to the Personal Data within a reasonable time in the event of a physical or technical failure;
7.1.4 create an operating model for testing, investigating and regularly assessing the effectiveness of the technical and organisational measures to ensure secure data processing; and
7.1.5 conduct information security audits on the Personal Data processing functions.
7.2 The Processor understands that the Personal Data is confidential and should be treated accordingly. The Processor shall ensure that the Personal Data is only processed by persons who are entitled to process them to provide the Service agreed upon in the Service Agreement. The Processor shall ensure that the persons entitled to process the Personal Data have undertaken to comply with a confidentiality obligation or are covered by an appropriate statutory confidentiality obligation.
Information Security Measures. In addition to, and not in lieu of, any information security requirements set forth in the Agreements, Supplier shall implement appropriate technical, administrative and organizational measures to ensure that Personal Data is protected against accidental or unlawful Processing, destruction, loss, alteration, unauthorized disclosure of, or access to such Personal Data, and such measures to the extent appropriate under the circumstances and taking into account the state of the art, the costs of implementation and the nature, scope, context and purposes of the Processing shall include but not limited to the requirements of the Information Security and Privacy Requirements found here: xxxxx://xxx.XxxxxxxXxxx.xxx/en-us/about/doing-business-with-CenturyLink.html, as well as:
a. Pseudonymizing and/or encrypting Personal Data;
b. Reasonable steps to ensure reliability and integrity of any Supplier personnel or permitted Sub- Processor who have access to Personal Data and appropriate measures to ensure that such parties are informed of the confidential nature of Personal Data and comply with the obligations set forth in this Addendum;
c. Testing, assessing and evaluating the effectiveness of information systems for ensuring the security of Processing;
d. Reasonable steps to ensure the ability to restore the availability and access to Personal Data in a timely manner in the event of a physical or technical incident; and
e. Reasonable steps to ensure the ongoing confidentiality, integrity, availability and resilience of systems and services utilized to Process Personal Data.
Information Security Measures. 4.1. Administrative, technical, and physical safeguards designed to ensure the security, confidentiality, reliability, and integrity of Personal Data, as well as any Systems, facilities, or software that Vendor accesses or supports in connections with the Agreement. Such safeguards are:
4.1.1. commensurate with the type and amount of Personal Data Processed by Vendor, having regard to the state of the art and industry standards, and should, at minimum, protect Personal Data and Systems against reasonably anticipated threats or hazards, including from unauthorized access, loss, theft, destruction, use, modification, collection, attack, or disclosure;
4.1.2. in accordance with globally recognized security control standards such as ISO, SOC, NIST or similar certification; and
4.1.3. compliant with the any applicable specific industry standards as may apply to the Personal Data being Processed by Vendor
4.2. A written security program and policy that meets or exceeds the requirements imposed under Data Protection Legislation and aligns with established industry practices. Such security program and policy should address, at a minimum, the following:
Information Security Measures. During the term of this Agreement and thereafter as long as BNYMCM retains any Confidential Information, BNYMCM shall maintain security procedures that are commercially reasonable and appropriate to safeguard the security of the systems in which it processes and stores Confidential Information. These information security measures must include, among other things, physical, technical, and administrative safeguards designed to (i) ensure 4811-8715-9740 5 the security and confidentiality of Confidential Information, (ii) identify potential threats or hazards to the security or integrity of Confidential Information and protect against them, (iii) protect against unauthorized access to or use of Confidential Information, and (iv) ensure appropriate disposal of Confidential Information.
Information Security Measures. During the term of this Agreement and thereafter as long as the Settlement Agent retains any Confidential Information, the Settlement Agent shall maintain security procedures that are commercially reasonable and appropriate to safeguard the security of the systems in which it processes and stores Confidential Information. These information security measures must include, among other things, physical, technical, and administrative safeguards designed to (i) ensure the security and confidentiality of Confidential Information, (ii) identify potential threats or hazards to the security or integrity of Confidential Information and protect against them, (iii) protect against unauthorized access to or use of Confidential Information, and (iv) ensure appropriate disposal of Confidential Information.
Information Security Measures. For the duration of the Agreement ForgeRock shall comply with the measures set forth in Appendix 1, which is hereby incorporated into this DPA.