Security of Personal Data. 5.1. Taking into account the state of the art, the costs of implementation and the nature, scope, context and purposes of Processing as well as the risk of varying likelihood and severity for the rights and freedoms of natural persons, Processor shall maintain appropriate technical and organizational measures to ensure a level of security appropriate to the risk of Processing Personal Data.
Security of Personal Data. Taking into account the state of the art, the costs of implementation and the nature, scope, context and purposes of processing as well as the risk of varying likelihood and severity for the rights and freedoms of natural persons, Company shall maintain appropriate technical and organizational measures to ensure a level of security appropriate to the risk of processing Personal Data. Exhibit C sets forth additional information about Company’s technical and organizational security measures.
Security of Personal Data a. The Processor shall at a minimum implement the technical and organizational measures specified in Appendix 2 to ensure the security of the Personal Data. This includes protecting the Personal Data against a breach of security leading to accidental or unlawful destruction, loss, alteration, unauthorized disclosure or access to the Personal Data. In assessing the appropriate level of security, the parties shall take due account of the state of the art, the costs of implementation, the nature, scope, context and purposes of processing and the risks involved for the Data Subjects.
Security of Personal Data. 6.1 Taking into account the state of the art, the costs of implementation and the nature, scope, context and purposes of Processing as well as the risk of varying likelihood and severity for the rights and freedoms of natural persons, Zoom shall maintain appropriate technical and organizational measures to ensure a level of security appropriate to the risk of Processing Personal Data, including, but not limited to, the security measures set out in Exhibit B.
Security of Personal Data. 6.1 Zoom may not update the Services in a way that would remove Customer's choice to apply end to end encryption to Meetings, introduce any functionality that would purposefully allow anyone not authorized by the Customer to gain access to Customer encryption keys or Customer content, or remove the ability to store recordings locally.
Security of Personal Data. We will take appropriate technical, physical and organisational measures to protect the Personal Data collected through the Website from misuse or accidental, unlawful or unauthorised destruction, loss, alteration, disclosure, acquisition or access, that are consistent with applicable privacy and data security laws and regulations. However, no internet-based site can be 100% secure and we cannot be held responsible for unauthorised or unintended access that is beyond our control. Our Website may contain links to other websites. We are not responsible for the privacy practices, content or security used by such other websites, which shall not be governed by this Privacy Policy. We advise you to always carefully read the privacy policies on these other websites.
Security of Personal Data a. Adobe has implemented and maintains reasonable and appropriate Technical and Organizational Measures for Cloud Services regarding the protection of Personal Data Processed under these terms, assessable via this link: xxxxx://xxx.xxxxx.xxx/go/CloudSvcsTOSM.
Security of Personal Data. (a) To effect the purposes of this Master Agreement, COMPANY, BPPR, or one of their respective Subsidiaries may from time to time provide EVERTEC with Personal Data in order for EVERTEC to provide the Services. EVERTEC shall comply with all Legal Requirements (including Legal Requirements regarding the protection, privacy and confidentiality of Personal Data) applicable to EVERTEC’s use, storage and other processing (including Data Processing) of Personal Data.
Security of Personal Data. 1. Considering the scope of technical knowledge, cost of implementation, and the character, scope, context and purposes of processing, as well as the risk of violation of the rights and freedoms of physical persons of different probabilities and seriousness levels, The Data Processor shall implement proper technical and organizational means to ensure that processing of Personal Data takes place in compliance with GDPR.
Security of Personal Data. 4.4.1. PROVIDER warrants that it maintains and shall continue to maintain adequate security measures (technical and organisational) to protect Personal Data against accidental loss, destruction, damage, alteration, unauthorized disclosure of, or access to, and against all other unlawful forms of processing, considering (i) the nature, scope, context, and purposes of the processing, (ii) risks posed to Data Subjects, (iii) the state-of-the-art, and (iv) implementation expenses, including, inter alia, as appropriate: • the pseudonymisation and/or encryption of Personal Data when possible/appropriate; • the ability to ensure the ongoing confidentiality, integrity, availability, and resilience of processing systems and services; • the ability to restore the availability of and access to Personal Data in a timely manner in the event of a physical or technical incident; • an established process for regularly testing, assessing, and evaluating the effectiveness of technical and organisational measures; • measures to identify vulnerabilities with regards to the processing of Personal Data in systems used to provide PROVIDER Services to the COMPANY; • other reasonable security measures agreed upon by the Parties. A specification of technical and organisational measures implemented by PROVIDER is available at xxxxx://xxx.xxxxxxx.xxx/assets/downloads/Technical_and_organisational_measures.pdf, and a list of certifications is available at xxxxx://xxx.xxxxxxx.xxx/company.