Personal Data Security Sample Clauses

Personal Data Security. 5.1 Taking into account the state of the art, the costs of implementation and the nature, scope, context and purposes of Processing as well as the risk of varying likelihood and severity for the rights and freedoms of natural persons, the Processor shall implement appropriate technical and organizational measures (Annex 2) to ensure a level of Controller Personal Data security appropriate to the risk, including but not limited to:
AutoNDA by SimpleDocs
Personal Data Security. Each of the Parties undertakes to implement the appropriate technical means to ensure the security of the personal data. TEHTRIS undertakes to implement technical and organizational measures to prevent any access to or fraudulent use of the personal data and to prevent any loss, alteration or destruction of the personal data, in particular all of the undertakings set out in the TEHTRIS Quality Charter, attached to this Agreement.
Personal Data Security. 13.1. In the course of providing the services and delivering the Products, the Company collects personal data from the Clients and in particular the following data : - names ; - first names ; - e-mail address ; - address ; - phone number ; - details of your correspondence with us, including assistance ;
Personal Data Security. The Parties acknowledge that they shall protect the Personal Data against any unauthorised or unlawful processing and against the accidental loss, destruction or damage. Each party is responsible on its own for the implementation of appropriate technical and organisational measures in order to guarantee the integrity and confidentiality of Personal Data, in accordance with article 32 of the GDPR.
Personal Data Security. Without limiting Service Provider’s obligations under this Agreement or respective Service Agreements with respect to data security, Service Provider shall:
Personal Data Security. 1. In order to assure the personal data security, the Processor has established certain defense mechanisms that are interrelated. These mechanisms include physical securities, equipment- related measures, organizational procedures and IT solutions. The Parties agree that by appropriate technical and organizational measures they mean the safeguards indicated below.
Personal Data Security. 2.1. The data processor applies the following technical and organisational security measures:
AutoNDA by SimpleDocs
Personal Data Security. 8.1 The Data Processor commits to ensuring the application of appropriate technical and organizational measures so that the processing complies with legal requirements, specifically ensuring an adequate level of security in accordance with the risk and the protection of the rights of data subjects. This consideration shall take into account the latest techniques, the costs of implementation, the nature, scope, context, and purposes of the processing, as well as the varying risks to the rights and freedoms of individuals, including:
Personal Data Security. Taking into account the costs of implementation and the nature, scope, context and purposes of Processing as well as the risk of varying likelihood and severity for the rights and freedoms of natural persons, the Processor shall implement appropriate technical and organisational measures (Annex 2) to ensure a level of Controller Personal Data security appropriate to the risk, including but not limited to: • Pseudonymization and encryption; • The ability to ensure the ongoing confidentiality, integrity, availability and resilience of processing systems and services; • The ability to restore the availability and access to Controller Personal Data in a timely manner in the event of a physical or technical incident; and • A process for regularly testing, assessing and evaluating the effectiveness of technical and organizational measures for ensuring the security of the Processing. In assessing the appropriate level of security, the Processor shall take into account the risks that are presented by processing, in particular from accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to Controller Personal Data transmitted, stored or otherwise processed.
Personal Data Security. 20.5.1 ntl shall provide to IBM sufficient information about all processing of personal data, including information about the risks to individuals presented by such processing, that IBM is obliged to perform during the Term, to enable IBM to make an assessment of the level of personal data security that is required. Subject to Clause 20.5.2 below but otherwise without prejudice to IBM's other obligations in respect of information security (and except as provided to the contrary in Schedule 27 (Separation Issues)), IBM shall:
Time is Money Join Law Insider Premium to draft better contracts faster.