Personal Data Security. 5.1 Taking into account the state of the art, the costs of implementation and the nature, scope, context and purposes of Processing as well as the risk of varying likelihood and severity for the rights and freedoms of natural persons, the Processor shall implement appropriate technical and organizational measures (Annex 2) to ensure a level of Controller Personal Data security appropriate to the risk, including but not limited to:
Appears in 4 contracts
Samples: Supplier Data Processing Agreement, Data Processing Agreement, Supplier Data Processing Agreement
Personal Data Security. 5.1 5.1. Taking into account the state of the art, the costs of implementation and the nature, scope, context and purposes of Processing as well as the risk of varying likelihood and severity for the rights and freedoms of natural persons, the Processor shall implement appropriate technical and organizational measures (Annex 2) to ensure a level of Controller Personal Data security appropriate to the risk, including but not limited to:
Appears in 2 contracts
Samples: www.trustbuilder.com, www.trustbuilder.com
Personal Data Security. 5.1 5.1. Taking into account the state of the art, the costs of implementation and the nature, scope, context and purposes of Processing as well as the risk of varying likelihood and severity for the rights and freedoms of natural persons, the Processor shall in relation to the Controller Personal Data implement appropriate technical and organizational measures (Annex 2) to ensure a level of Controller Personal Data security appropriate to the that risk, including but not limited to:as appropriate, the measures referred to in Article 32(1) of the GDPR,
Appears in 1 contract
Samples: Data Processing Agreement
Personal Data Security. 5.1 7.1 Taking into account the state of the art, the costs of implementation and the nature, scope, context and purposes of Processing as well as the risk of varying likelihood and severity for the rights and freedoms of natural persons, the Processor shall implement appropriate technical and organizational measures (Annex 2) to ensure a level of Controller Personal Data security appropriate to the risk, including but not limited to:
Appears in 1 contract
Samples: Preferred Agreement
Personal Data Security. 5.1 Taking into account the state of the art, the costs of implementation and the nature, scope, context and purposes of Processing as well as the risk of varying likelihood and severity for the rights and freedoms of natural persons, the Processor shall implement appropriate technical and organizational organisational measures (Annex 2) to ensure a level of Controller Personal Data security appropriate to the risk, including but not limited to:
Appears in 1 contract
Samples: Supplier Data Processing Agreement
Personal Data Security. 5.1 6.1. Taking into account the state of the art, the costs of implementation and the nature, scope, context and purposes of Processing as well as the risk of varying likelihood and severity for the rights and freedoms of natural persons, the Processor shall implement appropriate technical and organizational measures (Annex 2) to ensure a level of Controller Personal Data security appropriate to the riskrisk in accordance with Article 32 of the GDPR, including but not limited to:
Appears in 1 contract
Samples: Data Processing Agreement