List of Authorized Sub-Processors Sample Clauses

List of Authorized Sub-Processors. Sub-processor Address Contact person’s name, position and contact details Location of Processing of Personal Data Description of processing Duration of Processing DPA/SCC in place with sub-processor Amazon Web Services Corporatio n located in USA Xxxx Xxxxxxxxx- Senior Data Privacy Compliance Manager at Amazon Hosted by AWS either in Ireland, USA, India or Singapore (customer’s choice) Cloud hosting for data sent by customers As per retention period requested and agreed upon with each customer Yes Alphabet Inc (holding company of Google LLC) Corporatio n located in USA Xxxx Xxxxxxx- DPO xxxxx://xxx.xxxxxx.xxx /about/datacenters/loca tions/index.html Google Workspace- general data of employees and customers As per Coralogix business requirements Yes Google Analytics- Data sent only reflects user behavior and does not include personally identifiable data Salesforce Corporatio xxxxxxx@xxxxxxxxxx.xxx Hosted by AWS in USA CRM and Contracts For lifetime of Yes n located contracts and in USA thereafter as per audit and regulatory requirements, and as per Coralogix business requirements Slack Technologies Corporatio xxx@xxxxx.xxx Hosted by AWS in USA Messaging service As per Coralogix Yes Inc. n located for employees and business requirements in USA customers Snowflake Corporatio n located in USA xxx@xxxxxxxxx.xxx Hosted by AWS in EU (Ireland) BI backend datastore As per Coralogix business requirements Yes Atlassian Pty Ltd (Jira) Corporatio n located in USA Xxxxx Xxxxxxxxx dataprotection@atlassi xx.xxx Hosted by AWS in EU Internal support collaboration As per Coralogix business requirements Yes Xxxxxx.xxx Corporatio n located in Israel Xxxx Xxxxxxxxxx xxx@xxxxxx.xxx Hosted by AWS in USA (Northern Virginia) Workflow/projects management, CRM As per Coralogix business requirements Yes Stripe Corporatio xxxxxxx@xxxxxx.xxx Hosted by AWS in USA Card processor Until erasure of Yes n located customer after which in USA customer data will be anonymized and only transactional data will be kept for tax purposes Intercom Corporatio n located in USA xxxxx@xxxxxxxx.xxx Hosted by AWS in USA Chat support As per Coralogix business requirement Yes Annex 4 Technical and Organizational Measures Technical and organizational measures including such measures to ensure the security of the data.
AutoNDA by SimpleDocs
List of Authorized Sub-Processors. The List of Authorized Sub-Processors is available at xxxxx://xxx.xxxxxx.xx/xxxx-xx-xxx-xxxxxxxxxx. Exhibit B Description of the Technical and Organizational Security Measures implemented by the Company The following includes the information required by Xxxxx XX of the EU SCCs. Troops has maintained SOC 2 Type II certification since 2016. Additional details about Security and Privacy measure can be found at xxx.xxxxxx.xx/xxxxxxxx, xxx.xxxxxx.xx/xxxxxxxx-xxx,
List of Authorized Sub-Processors. Company may use the following sub-processors to process personal data in connection with providing the Prefect Cloud services: Name of Authorized Sub-Processor Types of data transferred Description of processing Google Cloud Console All Cloud provider hosting our secure servers and services. Okta User credentials User authentication Sendgrid Email automations Email notifications from the platform Reblaze Web traffic IPS, WAF, DDoS Cloudflare Web traffic DNS management Exhibit C Description of the Technical and Organisational Security Measures implemented by the Data Importer The following includes the information required by Xxxxx XX of the EU SCCs and Appendix 2 of the UK SCCs. On Customer’s request and subject to appropriate confidentiality obligations Prefect will provide to Customer a copy of its current SOC 2 audit report and other applicable certifications. Technical and Organizational Security Measure Details Measures of pseudonymisation and encryption of personal data Processing is conducted on secure servers hosted on Google Cloud Platform. All storage systems are encrypted with industry standard algorithms. Data is encrypted in transit at all times. Access to Prefect systems is based on least privilege and a minimal set of engineers have access to Prefect production systems based on role. All laptops are encrypted and enforced using MDM. Measures for ensuring ongoing confidentiality, integrity, availability and resilience of processing systems and services Prefect runs highly available cloud services on Google Cloud Platform. Prefect conducts an annual penetration test with a third party and runs annual company wide disaster recovery and business continuity playbook simulations. Audits of system access logs and user access logs are conducted quarterly for critical production systems and bi-annualy for all other systems. Measures for ensuring the ability to restore the availability and access to personal data in a timely manner in the event of a physical or technical incident Prefect runs a highly available, multi-regional database system on Google Cloud Platform. Prefect tests disaster recovery simulations annually. Processes for regularly testing, assessing and evaluating the effectiveness of technical and organizational measures in order to ensure the security of the processing Prefect attained SOC 2 Type II certification in February 2022. The SOC 2 Type II report is available upon request and outlines our company-wide controls for the security...
List of Authorized Sub-Processors. The Company’s Authorized Sub-Processors are available here: xxxxx://xxxxx.xxx/help/gdpr-compliance#third-parties. Exhibit C Description of the Technical and Organisational Security Measures implemented by the Data Importer The following includes the information required by Annex II of the EU SCCs and Appendix 2 of the UK SCCs.
List of Authorized Sub-Processors. A list of our sub-processors can be found here xxxxx://xxx.xxxxxxxx.xx/legal/subprocessors Exhibit C Description of the Technical and Organisational Security Measures implemented by the Data Importer The following includes the information required by Xxxxx XX of the EU SCCs and Appendix 2 of the UK SCCs. Technical and Organizational Security Measure Details Measures of pseudonymisation and encryption of personal data All personal data at rest is encrypted using Advanced Encryption Standard (AES) 256-bit encryption. Any personal data that is transmitted outside of the Noteable Platform is encrypted using TLS 1.2+ (Transport Layer Security). Measures for ensuring ongoing confidentiality, integrity, availability and resilience of processing systems and services For confidentiality, we make use of RBAC systems to enforce prevention of unauthorized access, in conjunction with Auth0. Integrity of the systems are ensured through monitoring and underlying storage systems in AWS. Availability and resilience of the processing systems and services is provided at the hardware level through AWS and at the software level through Kubernetes. We also regularly perform backups on all data systems and practice restoration to ensure that the backups work. Measures for ensuring the ability to restore the availability and access to personal data in a timely manner in the event of a physical or technical incident Backups are performed at least daily for all data systems and restoration is practiced on a regular basis to ensure that restoration can be performed in a timely manner. Processes for regularly testing, assessing and Noteable performs yearly security penetration tests evaluating the effectiveness of technical and and is in the process of obtaining a SOC 2 Type 2 organizational measures in order to ensure the report that requires regular auditing once a year. security of the processing Measures for user identification and authorization Authentication and authorization are initiated through Auth0. The user permissions are then managed through Noteable’s RBAC system. Measures for the protection of data during All data that is transmitted outside of the Noteable transmission Platform is encrypted using TLS 1.2+ (Transport Layer Security). Measures for the protection of data during storage All data at rest is encrypted using Advanced Encryption Standard (AES) 256-bit encryption. Measures for ensuring physical security of locations at which personal data are processed Contro...

Related to List of Authorized Sub-Processors

  • Authorized Sub-processors Customer agrees that MailChimp may engage Sub- processors to process Customer Data on Customer's behalf. The Sub-processors currently engaged by MailChimp and authorized by Customer are listed in Annex A.

  • Access by and Authentication of Authorized Users Authorized Users of the Participating Institutions shall be granted access to the Licensed Materials pursuant to the following:

  • Breach of Authorized User Not Breach of Centralized Contract. An Authorized User’s breach shall not be deemed a breach of the Centralized Contract, rather it shall be deemed a breach of the Authorized User’s performance under the terms and conditions of the Centralized Contract.

  • LIST OF SUB-PROCESSORS The controller has authorised the use of the following sub-processors:

  • Letter of Authorization Each Party is responsible for obtaining a Letter of Authorization (LOA) from each End User initiating transfer of service from one Party to the other Party in accordance with applicable law. The Party obtaining the LOA from the End User will furnish it to the other Party upon request. The Party obtaining the LOA is required to maintain the original document, for a minimum of twenty-four (24) months from the date of signature. If there is a conflict between an End User and Carrier regarding the disconnection or provision of services, Frontier will honor the latest dated Letter of Authorization. If the End User’s service has not been disconnected and services have not yet been established, Carrier will be responsible to pay the applicable service order charge for any order it has placed. If the End User’s service has been disconnected and the End User’s service is to be restored with Frontier, Carrier will be responsible to pay the applicable nonrecurring charges as set forth in Frontier applicable tariff to restore the End User’s prior service with Frontier.

  • Certification of Authority The undersigned certify that the persons executing this agreement on behalf of City and SDA have legal authority to enter into this agreement on behalf of City and SDA respectively and have full authority to bind City and SDA in a valid Agreement on the terms herein.

  • Lines of Authority The Owner shall establish and maintain lines of authority for his personnel and shall provide this definition to the Construction Manager and all other affected parties.

  • EXTENT OF AUTHORITY may manage a work area; • exercise a degree of autonomy (advice available on complex or unusual matters); • manage significant projects and/or functions and/or works programmes.

  • CERTIFICATE OF AUTHORITY The Trust, the Adviser and the Sub-Adviser shall furnish to each other from time to time certified copies of the resolutions of their Boards of Trustees/Directors or executive committees, as the case may be, evidencing the authority of officers and employees who are authorized to act on behalf of the Trust, a Fund Account, the Adviser and/or the Sub-Adviser.

  • Scope of Authority Committee meetings will be used for communications between the parties, to share information and to address concerns. The committee will have no authority to conduct any negotiations or modify any provision of this Agreement. The committee’s activities and discussions will not be subject to the grievance procedure in Article 30.

Time is Money Join Law Insider Premium to draft better contracts faster.