Common use of Input Control Clause in Contracts

Input Control. The Personal Data source is under the control of the Customer, and Personal Data integration into the system, is managed by secured file transfer (i.e., via web services or entered into the application) from the Customer. Note that some Cloud Services permit Customers to use unencrypted file transfer protocols. In such cases, Customer is solely responsible for its decision to use such unencrypted field transfer protocols.

Appears in 5 contracts

Samples: Data Processing Agreement, Cloud Services Agreement, Data Processing Agreement

AutoNDA by SimpleDocs

Input Control. The Personal Data source is under the control of the Customer, and Personal Data integration into the system, is managed by secured file transfer (i.e., via web services or entered into the application) from the Customer. Note As set forth in Section 9.4 above, note that some Cloud Services permit Customers to use unencrypted file transfer protocols. In such cases, Customer is solely responsible for its decision to use such unencrypted field transfer protocols.

Appears in 2 contracts

Samples: Data Processing Agreement, Data Processing Agreement

Input Control. The Personal Data source is under the control of the Customer, Customer and Personal Data integration into the system, is managed by secured file transfer (i.e., via web services or entered into the application) from the Customer. Note that some Cloud Services permit Customers to use unencrypted file transfer protocols. In such cases, Customer is solely responsible for its decision to use such unencrypted field transfer protocols.

Appears in 1 contract

Samples: Data Processing Addendum

AutoNDA by SimpleDocs

Input Control. The Personal Data source is under the control of the Customer, and . Personal Data integration into the system, system is managed by secured file transfer (i.e., via web services or entered into the application) from the Customer. Note that some Cloud To the extent the applicable Services permit Customers Customer to use unencrypted file transfer protocols. In such cases, Customer is solely responsible for its decision to use such unencrypted field transfer protocols.

Appears in 1 contract

Samples: Master Services and Software Agreement

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!