Personal Data Security Sample Clauses

Personal Data Security. Each of the Parties undertakes to implement the appropriate technical means to ensure the security of the personal data. TEHTRIS undertakes to implement technical and organizational measures to prevent any access to or fraudulent use of the personal data and to prevent any loss, alteration or destruction of the personal data, in particular all of the undertakings set out in the TEHTRIS Quality Charter, attached to this Agreement.
AutoNDA by SimpleDocs
Personal Data Security. 13.1. In the course of providing the services and delivering the Products, the Company collects personal data from the Clients and in particular the following data : - names ; - first names ; - e-mail address ; - address ; - phone number ; - details of your correspondence with us, including assistance ; 13.2. The Company invites Customers to refer to the Company's privacy policy available here. 13.3. In this regard, Customers are informed that the Company attaches great importance to privacy and takes all necessary measures to ensure the confidentiality and security of Customers' personal data. Specifically, the Company undertakes to: • to maintain a double authentication security level, • to keep the infrastructures up to date, to limit access to the data according to the needs, • to prohibit the capture of sensitive information, • to securely manage data backup and restoration mechanisms. In addition, the Company is committed to : • Maintain a secure and up-to-date fleet of machines within the entire team. • Train team members to detect risky practices (downloading third-party tools, screen sharing, password management, telephone solicitation). • Ensure maximum discretion regarding exchanges of personal information. • Use secure and standardized means of communication within the team (email client, instant messaging, internal wiki, etc.) 13.4. In the course of providing the Products, Customers are informed that they are using a software application on which personal data may be transmitted : • Data present in the MYFOODHUB application : o By default : sensor values, data sending times, user IDs, SIGFOX IDs, approximate GPS coordinates, greenhouse types, options, greenhouse photos. o For those who have agreed to share information for visits: phone number, email address, preferred time for contact. • Data present in the MYFOODAPP application : o Sensor values, data sending times, technical logs • Data present in the MYFOOD online store : o Identifiers, delivery address, cart contents. • Data present on the internal ERP system : o Customer file, orders, invoices, after-sales service communication history. These applications are secure and the Company makes the following commitments in this regard: • To use and share anonymized data (no reference to the identity of Customers or their location, unless implicitly agreed). • Protect the integrity and content of the database, secure the platform against potential threats. 13.5. Finally, Customers are informed th...
Personal Data Security. The Parties acknowledge that they shall protect the Personal Data against any unauthorised or unlawful processing and against the accidental loss, destruction or damage. Each party is responsible on its own for the implementation of appropriate technical and organisational measures in order to guarantee the integrity and confidentiality of Personal Data, in accordance with article 32 of the GDPR.
Personal Data Security. 5.1 Taking into account the state of the art, the costs of implementation and the nature, scope, context and purposes of Processing as well as the risk of varying likelihood and severity for the rights and freedoms of natural persons, the Processor shall implement appropriate technical and organizational measures (Annex 2) to ensure a level of Controller Personal Data security appropriate to the risk, including but not limited to:
Personal Data Security. 5.1 Taking into account the state of the art, the costs of implementation and the nature, scope, context and purposes of Processing as well as the risk of varying likelihood and severity for the rights and freedoms of natural persons, the Processor shall implement appropriate technical and organizational measures (Annex 2) to ensure a level of Controller Personal Data security appropriate to the risk, including but not limited to: 5.1.1. Pseudonymization and encryption; 5.1.2. The ability to ensure the ongoing confidentiality, integrity, availability and resilience of processing systems and services; 5.1.3. The ability to restore the availability and access to Controller Personal Data in a timely manner in the event of a physical or technical incident; and 5.1.4. A process for regularly testing, assessing and evaluating the effectiveness of technical and organizational measures for ensuring the security of the Processing.
Personal Data Security. 5.1. Taking into account the state of the art, the costs of implementation and the nature, scope, context and purposes of Processing as well as the risk of varying likelihood and severity for the rights and freedoms of natural persons, the Processor shall implement appropriate technical and organizational measures (Annex 2) to ensure a level of Controller Personal Data security appropriate to the risk, including but not limited to: 5.1.1. Pseudonymization and encryption; 5.1.2. The ability to ensure the ongoing confidentiality, integrity, availability and resilience of processing systems and services; 5.1.3. The ability to restore the availability and access to Controller Personal Data in a timely manner in the event of a physical or technical incident; and 5.1.4. A process for regularly testing, assessing and evaluating the effectiveness of technical and organizational measures for ensuring the security of the Processing. 5.2. In assessing the appropriate level of security, the Processor shall take into account the risks that are presented by processing, in particular from accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to Controller Personal Data transmitted, stored or otherwise processed.
Personal Data Security. Without limiting Service Provider’s obligations under this Agreement or respective Service Agreements with respect to data security, Service Provider shall: (i) regarding the state of technological development and the cost of implementing any measures, provide a level of security (including appropriate technical and organizational measures (e.g., encryption)) appropriate to: (A) the harm that might result from unauthorized or unlawful processing of such County Personal Data, or accidental loss, destruction or damage of such County Personal Data; and (B) the nature of the County Personal Data; (ii) take commercially reasonable steps to ensure the reliability of Service Provider Personnel who have access to the County Personal Data; (iii) provide County with such information, assistance and cooperation, and execute such documents and additional terms, as County may reasonably require from time to time to establish Service Provider’s and/or County’s compliance with the obligations relating to security contained in the Privacy Laws; and (iv) inform County as soon as reasonably practicable of any particular risk to the security of any of Service Provider’s computer networks of which it becomes aware and of the categories of County Personal Data and individuals that may be affected.
AutoNDA by SimpleDocs
Personal Data Security. 1. In order to assure the personal data security, the Processor has established certain defense mechanisms that are interrelated. These mechanisms include physical securities, equipment- related measures, organizational procedures and IT solutions. The Parties agree that by appropriate technical and organizational measures they mean the safeguards indicated below. 2. The Processor assures that the physical securities include, in particular: 1) Access to personal data by the authorized persons only; 2) Storing physical data collections in the locked cabinets / premises, including servers that store data in electronic form;
Personal Data Security. 2.1. The data processor applies the following technical and organisational security measures:
Personal Data Security. 20.5.1 ntl shall provide to IBM sufficient information about all processing of personal data, including information about the risks to individuals presented by such processing, that IBM is obliged to perform during the Term, to enable IBM to make an assessment of the level of personal data security that is required. Subject to Clause 20.5.2 below but otherwise without prejudice to IBM's other obligations in respect of information security (and except as provided to the contrary in Schedule 27 (Separation Issues)), IBM shall: (a) having regard to the state of technological development and to the cost of implementing any measures provide a level of security (including appropriate technical and organisational measures) appropriate to: (i) the harm that might result from: (aa) unauthorised or unlawful processing of such personal data; or (bb) accidental loss, destruction or damage of such personal data; and
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!