Input Control Sample Clauses

Input Control. The possibility to subsequently verify and determine whether, and by whom, personal data was entered into, changed or removed from data processing systems must be ensured. • Definition of entry authorisation • Logging of logins
AutoNDA by SimpleDocs
Input Control. Detection: We designed our infrastructure to log extensive information about the system behavior, traffic received, system authentication, and other application requests. Internal systems aggregate log data and alert appropriate employees of malicious, unintended, or anomalous activities. Our personnel, including security, operations, and support personnel, are responsive to known incidents. Response and tracking: We maintain a record of known security incidents that includes description, dates and times of relevant activities, and incident disposition. Suspected and confirmed security incidents are investigated by security, operations, or support personnel; and appropriate resolution steps are identified and documented. For any confirmed incidents, we will take appropriate steps to minimize product and Customer damage or unauthorized disclosure. Notification to you will be in accordance with the terms of the Agreement.
Input Control. It must be possible to assign the input, change, and deletion of personal data to the acting employee. The system must limit the change and deletion of datasets in order to effectively prevent accidental change or deletion. The company has implemented the requirements as follows: Traceability of inputs, changes, and deletions by personalized users Traceability in assigning, changing, and deleting user authorizations Monitoring and logging automated data processing Random check of automated data processing
Input Control. Measures to ensure that it is possible to check and establish whether and by whom Customer Data has been input into data processing systems or removed, to include: a. authentication of the authorized personnel; b. protective measures for the data input into memory, as well as for the reading, alteration and deletion of stored data; c. Segregation and protection of stored data via database schemas and logical access controls; d. utilization of user codes (passwords); e. proof established within data importer’s organization of the input authorization; and f. providing that entries to data processing facilities (the rooms housing the computer hardware and related equipment) are capable of being locked.
Input Control. The Personal Data source is under the control of the Customer, and Personal Data integration into the system, is managed by secured file transfer (i.e., via web services or entered into the application) from the Customer. Note that some Cloud Services permit Customers to use unencrypted file transfer protocols. In such cases, Customer is solely responsible for its decision to use such unencrypted field transfer protocols.
Input Control. It must be ensured that it can be subsequently checked and determined whether and by whom personal data have been entered into data processing systems, changed or removed.
Input Control. The input control is intended to document who is responsible for (un)permitted or erroneous data entry. The goal is the auditability of the input of personal data into the DP system, which also includes non-networked individual workstations, such as PCs. The data entry to be checked includes the first-time storage as well as the change and deletion (removal) of data.
AutoNDA by SimpleDocs
Input Control. Detection: Insycle designed its infrastructure to log extensive information about the system behavior, traffic received, system authentication, and other application requests. Internal systems aggregated log data and alert appropriate employees of malicious, unintended, or anomalous activities. Insycle personnel, including security, operations, and support personnel, are responsive to known incidents. Response and tracking: Insycle maintains a record of known security incidents that includes description, dates and times of relevant activities, and incident disposition. Suspected and confirmed security incidents are investigated by security, operations, or support personnel; and appropriate resolution steps are identified and documented. For any confirmed incidents, Insycle will take appropriate steps to minimize product and Customer damage or unauthorized disclosure. Communication: If Insycle becomes aware of unlawful access to Customer data stored within its products, Insycle will: 1) notify the affected Customers of the incident; 2) provide a description of the steps Insycle is taking to resolve the incident; and 3) provide status updates to the Customer contact, as Insycle deems necessary. Notification(s) of incidents, if any, will be delivered to one or more of the Customer’s contacts in a form Insycle selects, which may include via email or telephone.
Input Control. XXXXxx.xxx has implemented suitable measures to ensure that it is possible to check and establish whether and by whom Personal Data have been input into Personal Data Processing systems or removed. This is accomplished by: ● Authentication of the authorized personnel; ● Protective measures for Personal Data input into memory, as well as for the reading, alteration and deletion of stored Personal Data, including by documenting or logging material changes to account data or account settings; ● Segregation and protection of all stored Personal Data via database schemas, logical access controls, and/or encryption; ● Utilization of user identification credentials; ● Physical security of data processing facilities; ● Session timeouts.
Input Control. The entry, modification and deletion of personal data processed by Xxxxxxxxxx.Xxx on behalf is gen- erally logged. Employees are required to work with their own accounts at all times. User accounts may not be shared or used jointly with other persons.
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!