Kerahasiaan Data Sample Clauses

Kerahasiaan Data. Untuk pemrosesan Data Pribadi, SAP xxx Subprosesor-nya hanya akan menggunakan personel yang tunduk pada kewajiban yang mengikat untuk mematuhi kerahasiaan data atau kerahasiaan telekomunikasi, sejauh yang berlaku, sesuai dengan Undang-undang Perlindungan Data. SAP akan xxx harus mensyaratkan sendiri bahwa Subprosesor secara teratur melatih individu yang mereka berikan akses ke Data Pribadi pada keamanan data xxx privasi data.
AutoNDA by SimpleDocs
Kerahasiaan Data. The Personal Data Processing Agreement for SAP Cloud Services referenced in or attached to the Order Form does not apply to application support provided by Customer or Customer’s third-party support contractor, any third-party applications, third party web services, or any Customer-specific code or modifications to the Cloud Service. The EU Access option is not available for the Cloud Service./ Perjanjian Pemrosesan Data Pribadi untuk Layanan Cloud SAP yang dirujuk dalam atau dilampirkan pada Formulir Pemesanan tidak berlaku untuk dukungan aplikasi yang disediakan oleh Pelanggan atau kontraktor dukungan pihak ketiga Pelanggan, setiap aplikasi pihak ketiga, layanan web pihak ketiga, atau setiap modifikasi atau kode khusus Pelanggan untuk Layanan Cloud. Opsi Akses UE tidak tersedia untuk Layanan Cloud.

Related to Kerahasiaan Data

  • Information Technology Enterprise Architecture Requirements If this Contract involves information technology-related products or services, the Contractor agrees that all such products or services are compatible with any of the technology standards found at xxxxx://xxx.xx.xxx/iot/2394.htm that are applicable, including the assistive technology standard. The State may terminate this Contract for default if the terms of this paragraph are breached.

  • Vlastnictví Zdravotnické zařízení si ponechá a bude uchovávat Zdravotní záznamy. Zdravotnické zařízení a Zkoušející převedou na Zadavatele veškerá svá práva, nároky a tituly, včetně práv duševního vlastnictví k Důvěrným informacím (ve smyslu níže uvedeném) a k jakýmkoli jiným Studijním datům a údajům.

  • Information Technology The following applies to all contracts for information technology commodities and contractual services. “Information technology” is defined in section 287.012(15), F.S., to have the same meaning as provided in section 282.0041, F.S.

  • Trunk Group Architecture and Traffic Routing 5.2.1 The Parties shall jointly establish Access Toll Connecting Trunks between CLEC and CBT by which they will jointly provide Tandem-transported Switched Exchange Access Services to Interexchange Carriers to enable such Interexchange Carriers to originate and terminate traffic from and to CLEC's Customers. 5.2.2 Access Toll Connecting Trunks shall be used solely for the transmission and routing of Exchange Access and non-translated Toll Free traffic (e.g., 800/888) to allow CLEC’s Customers to connect to or be connected to the interexchange trunks of any Interexchange Carrier that is connected to the CBT access Tandem. 5.2.3 The Access Toll Connecting Trunks shall be one-way or two-way trunks, as mutually agreed, connecting an End Office Switch that CLEC utilizes to provide Telephone Exchange Service and Switched Exchange Access Service in the given LATA to an access Tandem Switch CBT utilizes to provide Exchange Access in the LATA.

  • Přetrvající platnost This Section 3 “

  • Data Storage Where required by applicable law, Student Data shall be stored within the United States. Upon request of the LEA, Provider will provide a list of the locations where Student Data is stored.

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • Database The LERG is available through Telcordia. ICONN is available through the Qwest web site.

  • DNSSEC Registry Operator shall sign its TLD zone files implementing Domain Name System Security Extensions (“DNSSEC”). During the Term, Registry Operator shall comply with RFCs 4033, 4034, 4035, 4509 and their successors, and follow the best practices described in RFC 4641 and its successors. If Registry Operator implements Hashed Authenticated Denial of Existence for DNS Security Extensions, it shall comply with RFC 5155 and its successors. Registry Operator shall accept public-­‐key material from child domain names in a secure manner according to industry best practices. Registry shall also publish in its website the DNSSEC Practice Statements (DPS) describing critical security controls and procedures for key material storage, access and usage for its own keys and secure acceptance of registrants’ public-­‐key material. Registry Operator shall publish its DPS following the format described in XXX 0000.

  • Přetrvávající platnost Tento odstavec 1.3 “Zdravotní záznamy a Studijní data a údaje” zůstane závazný i v případě zániku platnosti či vypršení platnosti této Smlouvy.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!