Input Control. The Personal Data source is under the control of the Customer, and Personal Data integration into the system, is managed by secured file transfer (i.e., via web services or entered into the application) from the Customer. Note that some Cloud Services permit Customers to use unencrypted file transfer protocols. In such cases, Customer is solely responsible for its decision to use such unencrypted field transfer protocols.
Appears in 5 contracts
Samples: Data Processing Agreement, Cloud Services Agreement, Data Processing Agreement
Input Control. The Personal Data source is under the control of the Customer, and Personal Data integration into the system, is managed by secured file transfer (i.e., via web services or entered into the application) from the Customer. Note As set forth in Section 9.4 above, note that some Cloud Services permit Customers to use unencrypted file transfer protocols. In such cases, Customer is solely responsible for its decision to use such unencrypted field transfer protocols.
Appears in 2 contracts
Samples: Data Processing Agreement, Data Processing Agreement
Input Control. The Personal Data source is under the control of the Customer, Customer and Personal Data integration into the system, is managed by secured file transfer (i.e., via web services or entered into the application) from the Customer. Note that some Cloud Services permit Customers to use unencrypted file transfer protocols. In such cases, Customer is solely responsible for its decision to use such unencrypted field transfer protocols.
Appears in 1 contract
Samples: Data Processing Addendum
Input Control. The Personal Data source is under the control of the Customer, and . Personal Data integration into the system, system is managed by secured file transfer (i.e., via web services or entered into the application) from the Customer. Note that some Cloud To the extent the applicable Services permit Customers Customer to use unencrypted file transfer protocols. In such cases, Customer is solely responsible for its decision to use such unencrypted field transfer protocols.
Appears in 1 contract