Measures for allowing data portability and ensuring erasure Sample Clauses

Measures for allowing data portability and ensuring erasure. Encryption of Subscriber Data in transit across external untrusted networks when using Domo APIs and services utilizing industry standard cryptography and key management practices; • Where technically enforced, encryption of Subscriber Data and back-ups of Subscriber Data at rest utilizing industry standard cryptography and key management practices; • Encryption of authentication credentials at rest utilizing industry standard cryptography and key management practices. For transfers to Sub-processors, Domo, as processor, requires that its Sub-processors take appropriate technical and organizational measures to assist the controller and data exporter in protecting the security, confidentiality and integrity of Personal Data uploaded to the Services as follows:
AutoNDA by SimpleDocs
Measures for allowing data portability and ensuring erasure. ○ Lxxxx does not have procedures to facilitate data portability requests from data subjects. Lixte does not have this level of data.
Measures for allowing data portability and ensuring erasure. Pleo will provide assistance to the Customer as may reasonably be required under Applicable Data Protection Laws to respond to requests from individuals to exercise their rights under Applicable Data Protection Laws (e.g., rights of data access, rectification, erasure, restriction, portability and objection). For transfers to (sub-) processors, also describe the specific technical and organisational measures to be taken by the (sub-) processor to be able to provide assistance to the controller and, for transfers from a processor to a sub-processor, to the data exporter When Pleo engages a sub-processor under this Agreement, Pleo and the sub-processor enter into an agreement with data protection terms substantially similar to those contained herein. Each sub-processor agreement must ensure that Pleo is able to meet its obligations to the Customer. In addition to implementing technical and organisational measures to protect personal data, sub-processors must a) notify Pleo in the event of a Security Incident so Pleo may notify the Customer; b) delete data when instructed by Pleo in accordance with the Customer’s instructions to Pleo; c) not engage additional sub-processors without authorization; d) not change the location where data is processed; or e) process data in a manner which conflicts with the Customer’s instructions to Pleo SCHEDULE 4 SUB-PROCESSORS LIST Last updated: On commencement of the Agreement, the data controller authorises the engagement of the following sub-processors: Entity Description Location Amazon Web Services Hosting services EU data center Enfuce Payment processing EU data center Hubspot Inc. Customer Relationship Management system US based Intercom Inc. Customer support system US based G-suite, Google Inc. Cloud computing / email domain provider US based Segment Inc. Analytics functionalities US based Slack Inc. Internal communication US based Pleo Financial Services A/S Processing for compliance with legal obligations (AMLD) and delivering the product EU Pleo Technologies LTD Provision of the Pleo services in the local market UK Pleo Technologies GmbH Provision of the Pleo services in the local market EU Pleo Technologies AB Provision of the Pleo services in the local market EU Pleo Technologies SL Provision of the Pleo services in the local market EU
Measures for allowing data portability and ensuring erasure. Encryption of Subscriber Personal Data in transit across external untrusted networks when using Domo APIs and services utilizing industry standard cryptography and key management practices; • Where technically enforced, encryption of Subscriber Personal Data and back-ups of Subscriber Personal Data at rest utilizing industry standard cryptography and key management practices; • Encryption of authentication credentials at rest utilizing industry standard cryptography and key management practices.
Measures for allowing data portability and ensuring erasure. The Processor must be able to support Controller to fulfil its obligations about data portability as described in GDPR. The Processor shall have documented and implemented procedures to ensure that all Processor storage media devices are securely erased or physically destroyed by using generally accepted methods (e.g. NIST SP 800-88 guidelines for Media Sanitization) for secure information removal. ………………………………….. ANNEX IV List of sub-processors The Processor has been authorised by Controller to use the followingsubprocessors. Additions and/or changes to this list are regulated in the DPA including Annex 1 clause 7.7 (a):

Related to Measures for allowing data portability and ensuring erasure

  • Information Technology Accessibility Standards Any information technology related products or services purchased, used or maintained through this Grant must be compatible with the principles and goals contained in the Electronic and Information Technology Accessibility Standards adopted by the Architectural and Transportation Barriers Compliance Board under Section 508 of the federal Rehabilitation Act of 1973 (29 U.S.C. §794d), as amended. The federal Electronic and Information Technology Accessibility Standards can be found at: xxxx://xxx.xxxxxx-xxxxx.xxx/508.htm.

  • Electronic and Information Resources Accessibility and Security Standards a. Applicability: The following Electronic and Information Resources (“EIR”) requirements apply to the Contract because the Grantee performs services that include EIR that the System Agency's employees are required or permitted to access or members of the public are required or permitted to access. This Section does not apply to incidental uses of EIR in the performance of the Agreement, unless the Parties agree that the EIR will become property of the State of Texas or will be used by HHSC’s clients or recipients after completion of the Agreement. Nothing in this section is intended to prescribe the use of particular designs or technologies or to prevent the use of alternative technologies, provided they result in substantially equivalent or greater access to and use of a Product.

  • Provisions for Covered Entity to Inform Business Associate of Privacy Practices and Restrictions (a) Covered Entity shall notify Business Associate of any limitation(s) in the notice of privacy practices of Covered Entity under 45 CFR 164.520, to the extent that such limitation may affect Business Associate’s use or disclosure of protected health information.

  • Insurance and Fingerprint Requirements Information Insurance If applicable and your staff will be on TIPS member premises for delivery, training or installation etc. and/or with an automobile, you must carry automobile insurance as required by law. You may be asked to provide proof of insurance. Fingerprint It is possible that a vendor may be subject to Chapter 22 of the Texas Education Code. The Texas Education Code, Chapter 22, Section 22.0834. Statutory language may be found at: xxxx://xxx.xxxxxxxx.xxxxx.xxxxx.xx.xx/ If the vendor has staff that meet both of these criterion: (1) will have continuing duties related to the contracted services; and (2) has or will have direct contact with students Then you have ”covered” employees for purposes of completing the attached form. TIPS recommends all vendors consult their legal counsel for guidance in compliance with this law. If you have questions on how to comply, see below. If you have questions on compliance with this code section, contact the Texas Department of Public Safety Non-Criminal Justice Unit, Access and Dissemination Bureau, FAST-FACT at XXXX@xxxxx.xxxxx.xx.xx and you should send an email identifying you as a contractor to a Texas Independent School District or ESC Region 8 and TIPS. Texas DPS phone number is (000) 000-0000. See form in the next attribute to complete entitled: Texas Education Code Chapter 22 Contractor Certification for Contractor Employees

Time is Money Join Law Insider Premium to draft better contracts faster.