Personal Data Security Sample Clauses

Personal Data Security. 5.1 Taking into account the state of the art, the costs of implementation and the nature, scope, context and purposes of Processing as well as the risk of varying likelihood and severity for the rights and freedoms of natural persons, the Processor shall implement appropriate technical and organizational measures (Annex 2) to ensure a level of Controller Personal Data security appropriate to the risk, including but not limited to:
AutoNDA by SimpleDocs
Personal Data Security. Each of the Parties undertakes to implement the appropriate technical means to ensure the security of the personal data. TEHTRIS undertakes to implement technical and organizational measures to prevent any access to or fraudulent use of the personal data and to prevent any loss, alteration or destruction of the personal data, in particular all of the undertakings set out in the TEHTRIS Quality Charter, attached to this Agreement.
Personal Data Security. 13.1. In the course of providing the services and delivering the Products, the Company collects personal data from the Clients and in particular the following data : - names ; - first names ; - e-mail address ; - address ; - phone number ; - details of your correspondence with us, including assistance ;
Personal Data Security. The Parties acknowledge that they shall protect the Personal Data against any unauthorised or unlawful processing and against the accidental loss, destruction or damage. Each party is responsible on its own for the implementation of appropriate technical and organisational measures in order to guarantee the integrity and confidentiality of Personal Data, in accordance with article 32 of the GDPR.
Personal Data Security. Without limiting Service Provider’s obligations under this Agreement or respective Service Agreements with respect to data security, Service Provider shall:
Personal Data Security. 1. In order to assure the personal data security, Processor certain defensive mechanisms which penetrate one another were introduced. Such mechanisms include physical securities, equipment related measures, organizational procedures and IT solutions.
Personal Data Security. 13.1. In the course of providing the services and delivering the Products, the Company collects personal data from the Clients and in particular the following data: • names; • first names; • e-mail address; • address; • phone number; • details of your correspondence with us, including assistance; 13.2. The Company invites Customers to refer to the Company's privacy policy available here. 13.3. In this regard, Customers are informed that the Company attaches great importance to privacy and takes all necessary measures to ensure the confidentiality and security of Customers' personal data. Specifically, the Company undertakes to: • to maintain a double authentication security level, • to keep the infrastructures up to date, to limit access to the data according to the needs, • to prohibit the capture of sensitive information, • to securely manage data backup and restoration mechanisms. In addition, the Company is committed to: • Maintain a secure and up-to-date fleet of machines within the entire team. • Train team members to detect risky practices (downloading third-party tools, screen sharing, password management, telephone solicitation). • Ensure maximum discretion regarding exchanges of personal information. • Use secure and standardized means of communication within the team (email client, instant messaging, internal wiki, etc.) 13.4. In the course of providing the Products, Customers are informed that they are using a software application on which personal data may be transmitted: • Data present in the MYFOODHUB application: • By default: sensor values, data sending times, user IDs, SIGFOX IDs, approximate GPS coordinates, greenhouse types, options, greenhouse photos. • For those who have agreed to share information for visits: phone number, email address, preferred time for contact. • Data present in the MYFOODAPP application: • Sensor values, data sending times, technical logs • Data present in the MYFOOD online store : • Identifiers, delivery address, cart contents. • Data present on the internal ERP system : • Customer file, orders, invoices, after-sales service communication history. These applications are secure, and the Company makes the following commitments in this regard: • To use and share anonymized data (no reference to the identity of Customers or their location, unless implicitly agreed). • Protect the integrity and content of the database, secure the platform against potential threats. 13.5. Finally, Customers are informed that the Comp...
AutoNDA by SimpleDocs
Personal Data Security. 2.1. The data processor applies the following technical and organisational security measures:
Personal Data Security. 20.5.1 ntl shall provide to IBM sufficient information about all processing of personal data, including information about the risks to individuals presented by such processing, that IBM is obliged to perform during the Term, to enable IBM to make an assessment of the level of personal data security that is required. Subject to Clause 20.5.2 below but otherwise without prejudice to IBM's other obligations in respect of information security (and except as provided to the contrary in Schedule 27 (Separation Issues)), IBM shall:
Personal Data Security. 3.1. HotelREZ shall ensure that it has in place appropriate technical and organisational measures to protect against unauthorised or unlawful processing of Personal Data and against accidental loss or destruction of, or damage to, Personal Data, appropriate to the harm that might result from the unauthorised or unlawful processing or accidental loss, destruction or damage and the nature of the data to be protected, having regard to the state of technological development and the cost of implementing any measures (those measures may include, where appropriate, pseudonymising and encrypting Personal Data, ensuring confidentiality, integrity, availability and resilience of its systems and HotelREZ Services, ensuring that availability of and access to Personal Data can be restored in a timely manner after an incident, and regularly assessing and evaluating the effectiveness of the technical and organisational measures adopted by it).
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!