Common use of Security of Personal Data Clause in Contracts

Security of Personal Data. 6.1 Taking into account the state of the art, the costs of implementation and the nature, scope, context and purposes of Processing as well as the risk of varying likelihood and severity for the rights and freedoms of natural persons, Zoom shall maintain appropriate technical and organizational measures to ensure a level of security appropriate to the risk of Processing Personal Data, including, but not limited to, the security measures set out in Exhibit B. 6.2 The Zoom shall implement such measures to ensure a level of security appropriate to the risk involved, including as appropriate: 6.2.1 the pseudonymisation and encryption of personal data; 6.2.2 the ability to ensure the ongoing confidentiality, integrity, availability and resilience of processing systems and services; 6.2.3 the ability to restore the availability and access to personal data in a timely manner in the event of a physical or technical incident; and 6.2.4 a process for regularly testing, assessing and evaluating the effectiveness of security measures.

Appears in 3 contracts

Samples: Data Processing Addendum, Data Processing Addendum, Data Processing Addendum

AutoNDA by SimpleDocs

Security of Personal Data. 6.1 5.1 Taking into account the state of the art, the costs of implementation and the nature, scope, context and purposes of Processing as well as the risk of varying likelihood and severity for the rights and freedoms of natural persons, Zoom Processor shall maintain appropriate technical and organizational measures to ensure a level of security appropriate to the risk of Processing Personal Data, including, but not limited to, the security measures set out in Exhibit B.Appendix 2 6.2 5.2 The Zoom Processor shall implement such measures to ensure a level of security appropriate to the risk involved, including as appropriate: 6.2.1 5.2.1 the pseudonymisation and encryption of personal data; 6.2.2 5.2.2 the ability to ensure the ongoing confidentiality, integrity, availability and resilience of processing systems and services; 6.2.3 5.2.3 the ability to restore the availability and access to personal data in a timely manner in the event of a physical or technical incident; and 6.2.4 5.2.4 a process for regularly testing, assessing and evaluating the effectiveness of security measures.

Appears in 1 contract

Samples: Data Processing Addendum

AutoNDA by SimpleDocs
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!