We use cookies on our site to analyze traffic, enhance your experience, and provide you with tailored content.

For more information visit our privacy policy.

Common use of Input Control Clause in Contracts

Input Control. Measures to ensure that it is possible to check and establish whether and by whom Customer Data has been input into data processing systems or removed, to include: a. authentication of the authorized personnel; b. protective measures for the data input into memory, as well as for the reading, alteration and deletion of stored data; c. Segregation and protection of stored data via database schemas and logical access controls; d. utilization of user codes (passwords); e. proof established within data importer’s organization of the input authorization; and f. providing that entries to data processing facilities (the rooms housing the computer hardware and related equipment) are capable of being locked.

Appears in 6 contracts

Samples: Data Processing Addendum, Data Processing Addendum, Data Processing Addendum

Input Control. Measures to ensure that it is possible to check and establish whether and by whom Customer Client Data has been input into data processing systems or removed, to include: a. authentication of the authorized personnel; b. protective measures for the data input into memory, as well as for the reading, alteration and deletion of stored data; c. Segregation and protection of stored data via database schemas and logical access controls; d. utilization of user codes (passwords); e. proof established within data importer’s organization of the input authorization; and f. providing that entries to data processing facilities (the rooms housing the computer hardware and related equipment) are capable of being locked.

Appears in 2 contracts

Samples: Data Processing Addendum, Data Processing Addendum

Input Control. Measures to ensure that it is possible to check and establish whether and by whom Customer Personal Data has been input into data processing systems or removed, to include: a. authentication of the authorized personnel; b. protective measures for the data input into memory, as well as for the reading, alteration and deletion of stored data; c. Segregation and protection of stored data via database schemas and logical access controls; d. utilization of user codes (passwords); e. proof established within data importer’s organization of the input authorization; and f. providing that entries to data processing facilities (the rooms housing the computer hardware and related equipment) are capable of being locked.

Appears in 1 contract

Samples: Data Processing Agreement