Measures regarding security of processing Sample Clauses

Measures regarding security of processing. The processor shall primarily assist the controller in ensuring an adequate level of processing security, in accordance with Article 32 GDPR as well as Clause 7.4. by implementing technical and organisational measures to establish the necessary level of data security. Please see the attached Information Security Manual and latest ISAE 3402 Type II Assurance Report performed by an independent auditor regarding the implemented technical and organisational measures.
AutoNDA by SimpleDocs

Related to Measures regarding security of processing

  • Security of processing (a) The data importer and, during transmission, also the data exporter shall implement appropriate technical and organisational measures to ensure the security of the data, including protection against a breach of security leading to accidental or unlawful destruction, loss, alteration, unauthorised disclosure or access to that data (hereinafter ‘personal data breach’). In assessing the appropriate level of security, the Parties shall take due account of the state of the art, the costs of implementation, the nature, scope, context and purpose(s) of processing and the risks involved in the processing for the data subjects. The Parties shall in particular consider having recourse to encryption or pseudonymisation, including during transmission, where the purpose of processing can be fulfilled in that manner. In case of pseudonymisation, the additional information for attributing the personal data to a specific data subject shall, where possible, remain under the exclusive control of the data exporter. In complying with its obligations under this paragraph, the data importer shall at least implement the technical and organisational measures specified in Annex II. The data importer shall carry out regular checks to ensure that these measures continue to provide an appropriate level of security. (b) The data importer shall grant access to the personal data to members of its personnel only to the extent strictly necessary for the implementation, management and monitoring of the contract. It shall ensure that persons authorised to process the personal data have committed themselves to confidentiality or are under an appropriate statutory obligation of confidentiality. (c) In the event of a personal data breach concerning personal data processed by the data importer under these Clauses, the data importer shall take appropriate measures to address the breach, including measures to mitigate its adverse effects. The data importer shall also notify the data exporter without undue delay after having become aware of the breach. Such notification shall contain the details of a contact point where more information can be obtained, a description of the nature of the breach (including, where possible, categories and approximate number of data subjects and personal data records concerned), its likely consequences and the measures taken or proposed to address the breach including, where appropriate, measures to mitigate its possible adverse effects. Where, and in so far as, it is not possible to provide all information at the same time, the initial notification shall contain the information then available and further information shall, as it becomes available, subsequently be provided without undue delay. (d) The data importer shall cooperate with and assist the data exporter to enable the data exporter to comply with its obligations under Regulation (EU) 2016/679, in particular to notify the competent supervisory authority and the affected data subjects, taking into account the nature of processing and the information available to the data importer.

  • Description of Processing Include a description of how the disclosed information will be processed by each receiving party.

  • Duration of Processing Subject to any Section of the DPA and/or the Agreement dealing with the duration of the Processing and the consequences of the expiration or termination thereof, Data Processor will Process Personal Data for the duration of the Agreement, unless otherwise agreed upon in writing.

  • Terms of procurement Terms of submission: Electronic submission: Required Languages in which tenders or requests to participate may be submitted: English Electronic catalogue: Not allowed Deadline for receipt of tenders: 2024­02­19Z 12:00:00Z Information about public opening: Terms of contract: Electronic invoicing: Required

  • COMPLIANCE WITH BREACH NOTIFICATION AND DATA SECURITY LAWS Contractor shall comply with the provisions of the New York State Information Security Breach and Notification Act (General Business Law § 899-aa and State Technology Law § 208) and commencing March 21, 2020 shall also comply with General Business Law § 899-bb.

  • Security of State Information The Contractor represents and warrants that it has implemented and it shall maintain during the term of this Contract the highest industry standard administrative, technical, and physical safeguards and controls consistent with NIST Special Publication 800-53 (version 3 or higher) and Federal Information Processing Standards Publication 200 and designed to (i) ensure the security and confidentiality of State Data; (ii) protect against any anticipated security threats or hazards to the security or integrity of the State Data; and (iii) protect against unauthorized access to or use of State Data. Such measures shall include at a minimum: (1) access controls on information systems, including controls to authenticate and permit access to State Data only to authorized individuals and controls to prevent the Contractor employees from providing State Data to unauthorized individuals who may seek to obtain this information (whether through fraudulent means or otherwise); (2) industry-standard firewall protection; (3) encryption of electronic State Data while in transit from the Contractor networks to external networks; (4) measures to store in a secure fashion all State Data which shall include multiple levels of authentication; (5) dual control procedures, segregation of duties, and pre-employment criminal background checks for employees with responsibilities for or access to State Data; (6) measures to ensure that the State Data shall not be altered or corrupted without the prior written consent of the State; (7) measures to protect against destruction, loss or damage of State Data due to potential environmental hazards, such as fire and water damage; (8) staff training to implement the information security measures; and (9) monitoring of the security of any portions of the Contractor systems that are used in the provision of the services against intrusion on a twenty-four (24) hour a day basis.

  • Priority of Provisions If there is a conflict or inconsistency between any term, statement, requirement, or provision of any document or exhibit attached to, referenced by, or incorporated in this Agreement and any provision of Articles 1 through 11 of this Agreement, the provisions contained in Articles 1 through 11 shall prevail and be given effect.

  • Description of Projects Services a. Project/Services to be performed by A-E shall consist of the work as specified herein and as required in Attachment A. If in the event Attachment A shall be in conflict with any provision of this Contract, the wording as set forth in Attachment A shall prevail. b. A-E shall be responsible for submitting all Projects/Services to County in a form which has been thoroughly reviewed and checked for completeness, accuracy and consistency by the registered professional named in Section 1.1.2 herein; and, any Projects/Services not meeting this requirement will be returned to A-E prior to review by County.

  • Continuity of Supply A Service Order will continue until terminated in accordance with this Agreement. A change to a Service Order will not initiate a new Service Order, or cause the existing Service Order to terminate, unless expressly agreed in writing. In particular, a change to a Service Order that is implemented by the LFC electronically and does not require a physical visit to a site or Interconnection Point will not cause the Service Order to terminate.

  • COMPLIANCE WITH NEW YORK STATE INFORMATION SECURITY BREACH AND NOTIFICATION ACT Contractor shall comply with the provisions of the New York State Information Security Breach and Notification Act (General Business Law Section 899-aa; State Technology Law Section 208).

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!