Input Controls. Data Processor shall take reasonable measures to provide that it is possible to check and establish whether and by whom service data has been entered into data processing systems, modified or removed. Data Processor shall take reasonable measures to ensure that (i) the Personal Data source is under the control of Data Controller; and (ii) Personal Data integrated into the Services is managed by secured transmission from Data Controller.
Input Controls. Detection: We designed our infrastructure to log extensive information about the system behavior, traffic received, system authentication, and other application requests. Internal systems aggregate log data and alert appropriate personnel of malicious, unintended, or anomalous activities. Our personnel, including security, operations, and support personnel, are responsive to known incidents. Response and tracking: We maintain a record of known security incidents that includes description, dates and times of relevant activities, and incident disposition. Suspected and confirmed security incidents are investigated by security, operations, and/or support personnel; and appropriate resolution steps are identified and documented. For any confirmed incidents, we will take appropriate steps to minimize product and customer damage or unauthorized disclosure. Notifications will be in accordance with the terms of the Agreement.
Input Controls. Our Sub-processors will take reasonable measures to ensure that it is possible to check and establish whether and by whom Service Data has been entered into data processing systems, modified or removed; and, any transfer of Service Data to a third-party service provider is made via a secure transmission.
Input Controls. Zendesk takes reasonable measures to provide that it is possible to check and establish whether and by whom Service Data has been entered into data processing systems, modified or removed; and, any transfer of Service Data to a third-party service provider is made via a secure transmission.
Input Controls. Aircall shall take reasonable measures to provide that it is possible to check and establish whether and by whom Service Data has been entered into data processing systems, modified or removed. Aircall shall take reasonable measures to ensure that (i) the Personal Data source is under the control of the Customer; and (ii) Personal Data is integrated into the Service is managed by secured file transfer from the Customer.
Input Controls. The Contractor shall warrant that it can be subsequently verified and established whether and by whom personal data have been input, modified or removed in data processing systems. This shall be done by: ● central logging and log evaluation systems ● each employee having only the necessary access to the data required within the scope of his or her function/role (principle of minimum rights) ● application-level firewalls and intrusion detection systems being used to prevent and detect attacks
Input Controls. Third-party service providers shall take reasonable measures designed to ensure that it is possible to check and establish whether and by whom Service Data has been entered into data processing systems, modified or removed; and, any of transfer of Service Data to a third-party service provider is made via a secure transmission.
Input Controls. Data Process shall take reasonable measures to provide that it is possible to check and establish whether and by whom Service Data has been entered into data processing systems, modified or removed; and, any transfer of Personal Data to a third-party service provider is made via a secure transmission.
Input Controls. 5.1 The Data Processor shall take use commercial best efforts to provide that it is possible to check and establish whether and by whom Service Data has been entered into data processing systems, modified or removed.
5.2 The Data Processor shall take reasonable measures to ensure that;
(a) the Personal Data source is under the control of the Data Controller; and
(b) Personal Data integrated into the Service is managed by secured transmission from the Data Controller for interactions with Data Processor’s User Interface (“UI”) or Application Programming Interface (“API”).
Input Controls. A. Customer completes the on-line work order (includes file specific information)
B. Successful transmission is indicated when system provides user with 8 digit number (ticket number)
C. Processing commences:
1. Page and invoice counts are verified against customer counts from on-line work order
2. Addresses are verified for deliverability and postal coded for presort mail discounts
D. Pre-production sampling is performed to check the accuracy of the invoice dates, messages, alignment, etc.
E. Once all input controls are verified, the file is scheduled for production