Security Measures Outlined Sample Clauses

Security Measures Outlined. Give an outline of the security measures to be deployed for transmission, storage and accessing of personal data, in a manner that does not compromise those security measures.
AutoNDA by SimpleDocs
Security Measures Outlined. Give an outline of the security measures to be deployed for transmission, storage and accessing of personal data, in a manner that does not compromise those security measures. STEPS DESCRIPTION [Insert step here] [Define the security steps to be deployed for the transfer, storage and accessing of the shared personal data] The Department of Justice and the Revenue Commissioners’ systems restrict access to the information only to required personnel and the extracted information is further protected intransit and at rest by encryption controls. Paper based communications are protected by registered post. Table 11.2
Security Measures Outlined. Give an outline of the security measures to be deployed for transmission, storage and accessing of personal data, in a manner that does not compromise those security measures. STEPS DESCRIPTION [Insert step here] The Department of Justice and the Department of Foreign Affairs’ systems restrict access to the information only to required personnel and the extracted information is furtherprotected in transit and at rest by encryption controls. Table 11.2

Related to Security Measures Outlined

  • Security Measures Lessee hereby acknowledges that the rental payable to Lessor hereunder does not include the cost of guard service or other security measures, and that Lessor shall have no obligation whatsoever to provide same. Lessee assumes all responsibility for the protection of the Premises, Lessee, its agents and invitees and their property from the acts of third parties.

  • Protective Measures We have implemented and will maintain appropriate technical and organisational measures in relation to the Services taking into account the state of the art, the costs of implementation, and the nature, scope, context and purposes of Processing, as well as the likelihood and severity of risk to the rights and freedoms of data subjects. This includes measures relating to the physical security of Our facilities used to deliver them, measures to control access rights to Our assets and relevant networks, and processes for testing these measures. In accordance with Our obligations under applicable law, We may undertake digital forensic investigations in relation to the use of the Services and Subscriptions. You are responsible for using, and ensuring that your Users use, the controls and advice provided by the Services correctly and consistently.

  • Measures SAP protects its assets and facilities using the appropriate means based on the SAP Security Policy • In general, buildings are secured through access control systems (e.g., smart card access system). • As a minimum requirement, the outermost entrance points of the building must be fitted with a certified key system including modern, active key management. • Depending on the security classification, buildings, individual areas and surrounding premises may be further protected by additional measures. These include specific access profiles, video surveillance, intruder alarm systems and biometric access control systems. • Access rights are granted to authorized persons on an individual basis according to the System and Data Access Control measures (see Section 1.2 and 1.3 below). This also applies to visitor access. Guests and visitors to SAP buildings must register their names at reception and must be accompanied by authorized SAP personnel. • SAP employees and external personnel must wear their ID cards at all SAP locations.

Time is Money Join Law Insider Premium to draft better contracts faster.