SECURITY MEASURES TAKEN BY QUDINI Sample Clauses

SECURITY MEASURES TAKEN BY QUDINI. HR Security: Qudini has controls in place to inform employees and contractors of their responsibilities and confirm that such individuals are suitable for the roles for which they are considered, this includes: ☐ Screening ☐ Terms and Conditions of employmentManagement responsibilities ☐ Security/DPO consultant ☐ Information Security and Data Protection awareness, education and trainingDisciplinary process ☐ Termination and change of employment responsibilities Physical Security: Qudini has processes in place to prevent unauthorized physical access, damage and interference to the data controller’s information and information processing facilities. This includes: ☐ Physical security perimeterPhysical entry controls ☐ Protection against external and environmental threats ☐ Security staff ☐ Surveillance facilities (alarm system, CCTV ) ☐ Classification and handling proceduresClear desk and clear screen procedures Access Control: Qudini has controls in place to confirm authorized user access and to prevent unauthorized access to systems and services. This includes: ☐ User registration and de-registration ☐ Management of privileged access rightsReview of user access rights ☐ Removal or adjustment of access rights ☐ Use of secret authentication information ☐ Information access restriction ☐ Secure log-on procedures ☐ Password management system ☐ Use of privileged utility programs ☐ Access control to program source code Communications Security: Qudini has controls in place to the protection of information in networks and its supporting information processing facilities. This includes: ☐ Network controlSecurity of network services. ☐ Segregation in networks
AutoNDA by SimpleDocs

Related to SECURITY MEASURES TAKEN BY QUDINI

  • Security Measures Lessee hereby acknowledges that the rental payable to Lessor hereunder does not include the cost of guard service or other security measures, and that Lessor shall have no obligation whatsoever to provide same. Lessee assumes all responsibility for the protection of the Premises, Lessee, its agents and invitees and their property from the acts of third parties.

  • Updates to Security Measures Customer is responsible for reviewing the information made available by MailChimp relating to data security and making an independent determination as to whether the Services meet Customer’s requirements and legal obligations under Data Protection Laws. Customer acknowledges that the Security Measures are subject to technical progress and development and that MailChimp may update or modify the Security Measures from time to time provided that such updates and modifications do not result in the degradation of the overall security of the Services purchased by the Customer.

  • Safety Measures Awarded vendor shall take all reasonable precautions for the safety of employees on the worksite, and shall erect and properly maintain all necessary safeguards for protection of workers and the public. Awarded vendor shall post warning signs against all hazards created by the operation and work in progress. Proper precautions shall be taken pursuant to state law and standard practices to protect workers, general public and existing structures from injury or damage.

  • Protective Measures We have implemented and will maintain appropriate technical and organisational measures in relation to the Services taking into account the state of the art, the costs of implementation, and the nature, scope, context and purposes of Processing, as well as the likelihood and severity of risk to the rights and freedoms of data subjects. This includes measures relating to the physical security of Our facilities used to deliver them, measures to control access rights to Our assets and relevant networks, and processes for testing these measures. In accordance with Our obligations under applicable law, We may undertake digital forensic investigations in relation to the use of the Services and Subscriptions. You are responsible for using, and ensuring that your Users use, the controls and advice provided by the Services correctly and consistently.

  • Interim Measures 6.1 The Parties acknowledge that the British Columbia Claims Task Force made the following recommendation concerning interim measures:

  • NO PREJUDICIAL OR RESTRICTIVE MEASURES 1 Neither of the Contracting Parties shall apply prejudicial or restrictive measures based on harmful tax practices to residents or nationals of either Contracting Party so long as this Agreement is in force and effective.

  • Interim Measures of Protection A Tribunal may order an interim measure of protection to preserve the rights of a disputing party, or to facilitate the conduct of arbitral proceedings, including an order to preserve evidence in the possession or control of a disputing party. A Tribunal may not order attachment or enjoin the application of the measure alleged to constitute a breach referred to in paragraph 1 of Article 76.

  • REGISTRY PERFORMANCE SPECIFICATIONS

  • System Security and Data Safeguards When SAP is given access to Licensee’s systems and data, SAP shall comply with Licensee’s reasonable administrative, technical, and physical safeguards to protect such data and guard against unauthorized access. In connection with such access, Licensee shall be responsible for providing Consultants with user authorizations and passwords to access its systems and revoking such authorizations and terminating such access, as Licensee deems appropriate from time to time. Licensee shall not grant SAP access to Licensee systems or personal information (of Licensee or any third party) unless such access is essential for the performance of Services under the Agreement. The parties agree that no breach of this provision shall be deemed to have occurred in the event of SAP non-conformance with the aforementioned safeguard but where no personal information has been compromised.

  • Duration of processing and erasure or return of data Processing by the data importer shall only take place for the duration specified in Annex I.B. After the end of the provision of the processing services, the data importer shall, at the choice of the data exporter, delete all personal data processed on behalf of the controller and certify to the data exporter that it has done so, or return to the data exporter all personal data processed on its behalf and delete existing copies. Until the data is deleted or returned, the data importer shall continue to ensure compliance with these Clauses. In case of local laws applicable to the data importer that prohibit return or deletion of the personal data, the data importer warrants that it will continue to ensure compliance with these Clauses and will only process it to the extent and for as long as required under that local law. This is without prejudice to Clause 14, in particular the requirement for the data importer under Clause 14(e) to notify the data exporter throughout the duration of the contract if it has reason to believe that it is or has become subject to laws or practices not in line with the requirements under Clause 14(a).

Time is Money Join Law Insider Premium to draft better contracts faster.