Common use of Security of processing Clause in Contracts

Security of processing. (a) The processor shall at least implement the technical and organisational measures specified in Annex III to ensure the security of the personal data. This includes protecting the data against a breach of security leading to accidental or unlawful destruction, loss, alteration, unauthorised disclosure or access to the data (personal data breach). In assessing the appropriate level of security, the Parties shall take due account of the state of the art, the costs of implementation, the nature, scope, context and purposes of processing and the risks involved for the data subjects. (b) The processor shall grant access to the personal data undergoing processing to members of its personnel only to the extent strictly necessary for implementing, managing and monitoring of the contract. The processor shall ensure that persons authorised to process the personal data received have committed themselves to confidentiality or are under an appropriate statutory obligation of confidentiality.

Appears in 80 contracts

Samples: Data Processing Addendum, Data Processing Agreement, Service Agreement

AutoNDA by SimpleDocs

Security of processing. (a) The processor shall at least implement the technical and organisational measures specified in Annex III to ensure the security of the personal data. This includes protecting the data against a breach of security leading to accidental or unlawful destruction, loss, alteration, unauthorised disclosure or access to the data (personal data breach). In assessing the appropriate level of security, the Parties shall take due account of the state of the art, the costs of implementation, the nature, scope, context and purposes of processing and the risks involved for the data subjects. (b) The processor shall grant access to the personal data undergoing processing to members of its personnel only to the extent strictly necessary for implementing, managing and monitoring of the contract. The processor shall ensure that persons authorised to process the personal data received have committed themselves to confidentiality or are under an appropriate statutory obligation of confidentiality.

Appears in 5 contracts

Samples: Data Processing Agreement, Data Processing Agreement, Data Processing Agreement

Security of processing. (a) The processor shall at least implement the technical and organisational measures specified in Annex III to ensure the security of the personal data. This includes protecting the data against a breach of security leading to accidental or unlawful destruction, loss, alteration, unauthorised disclosure disclosure, or access to the data (personal data breach). In assessing the appropriate level of security, the Parties shall take due account of the state of the art, the costs of implementation, the nature, scope, context and purposes of processing and the risks involved for the data subjects. (b) The processor shall grant access to the personal data undergoing processing to members of its personnel only to the extent strictly necessary for implementing, managing managing, and monitoring of the contract. The processor shall ensure that persons authorised to process the personal data received have committed themselves to confidentiality or are under an appropriate statutory obligation of confidentiality.

Appears in 4 contracts

Samples: Cost Action Grant Agreement, Grant Agreement, Cost Action Grant Agreement

Security of processing. (a) The processor shall at least implement the technical and organisational organizational measures specified in Annex III to ensure the security of the personal dataPersonal Data. This includes protecting the data against a breach of security leading to accidental or unlawful destruction, loss, alteration, unauthorised unauthorized disclosure or access to the data (personal data Personal Data breach). In assessing the appropriate level of security, the Parties shall take due account of the state of the art, the costs of implementation, the nature, scope, context and purposes of processing and the risks involved for the data subjects. (b) The processor shall grant access to the personal data Personal Data undergoing processing to members of its personnel only to the extent strictly necessary for implementing, managing and monitoring of the contractAgreement. The processor shall ensure that persons authorised authorized to process the personal data received Personal Data have committed themselves to confidentiality or are under an appropriate statutory obligation of confidentiality.

Appears in 3 contracts

Samples: Data Processing Agreement, Data Processing Agreement, Data Processing Agreement

Security of processing. (a) The processor shall at least implement the technical and organisational organizational measures specified in Annex III to ensure the security of the personal data. This includes protecting the data against a breach of security leading to accidental or unlawful destruction, loss, alteration, unauthorised unauthorized disclosure or access to the data (personal data breach). In assessing the appropriate level of security, the Parties shall take due account of the state of the art, the costs of implementation, the nature, scope, context and purposes of processing and the risks involved for the data subjects. (b) The processor shall grant access to the personal data undergoing processing to members of its personnel only to the extent strictly necessary for implementing, managing and monitoring of the contract. The processor shall ensure that persons authorised authorized to process the personal data received have committed themselves to confidentiality or are under an appropriate statutory obligation of confidentiality.

Appears in 3 contracts

Samples: Data Processing Agreement, Data Processing Agreement, Data Protection Agreement

Security of processing. (a) The processor shall at least implement the technical and organisational measures specified in Annex III IV to ensure the security of the personal data. This includes protecting the data against a breach of security leading to accidental or unlawful destruction, loss, alteration, unauthorised disclosure or access to the data (personal data breach). In assessing the appropriate level of security, the Parties shall take due account of the state of the art, the costs of implementation, the nature, scope, context and purposes of processing and the risks involved for the data subjects. (b) The processor shall grant access to the personal data undergoing processing to members of its personnel only to the extent strictly necessary for implementing, managing and monitoring of the contract. The processor shall ensure that persons authorised to process the personal data received have committed themselves to confidentiality or are under an appropriate statutory obligation of confidentiality.

Appears in 3 contracts

Samples: Data Processing Agreement, Data Processing Agreement, Data Processing Agreement

Security of processing. (a) The processor shall at least implement the technical and organisational measures specified in Annex III to ensure the security of the personal data. This includes protecting the data against a breach of security leading to accidental or unlawful destruction, loss, alteration, unauthorised disclosure or access to the data (personal data breach). In assessing the appropriate level of security, the Parties shall take due account of the state of the art, the costs of implementation, the nature, scope, context and purposes of processing and the risks involved for the data subjects. (b) . The processor shall grant access to the personal data undergoing processing to members of its personnel only to the extent strictly necessary for implementing, managing and monitoring of the contract. The processor shall ensure that persons authorised to process the personal data received have committed themselves to confidentiality or are under an appropriate statutory obligation of confidentiality.

Appears in 2 contracts

Samples: Data Processing Agreement, Data Processing Agreement

Security of processing. (ai) The processor Processor shall at least implement the technical and organisational measures specified in Annex III Table A to ensure the security of the personal dataPersonal Data. This includes protecting the data against a breach of security leading to accidental or unlawful destruction, loss, alteration, unauthorised disclosure or access to the data (personal data breach)data. In assessing the appropriate level of security, the Parties shall take due account of the state of the art, the costs of implementation, the nature, scope, context and purposes of processing Processing and the risks involved for the data subjectsData Subjects. (bii) The processor Processor shall grant access to the personal data Personal Data undergoing processing Processing to members of its personnel only to the extent strictly necessary for implementing, managing and monitoring of the contractContract. The processor Processor shall ensure that persons authorised to process Process the personal data Personal Data received have committed themselves to confidentiality or are under an appropriate statutory obligation of confidentiality.

Appears in 2 contracts

Samples: Terms of Use and Data Processing Agreement, Terms of Use and Data Sharing Agreement

Security of processing. (a) The processor shall at least implement the technical and organisational measures specified in Annex III to ensure the security of the personal data. This includes protecting the data against a breach of security leading to accidental or unlawful destruction, loss, alteration, unauthorised disclosure or access to the data (personal data breach). In assessing the appropriate level of security, the Parties shall take due account of the state of the art, the costs of implementation, the nature, scope, context and purposes of processing and the risks involved for the data subjectssub- jects. (b) The processor shall grant access to the personal data undergoing processing to members of its personnel only to the extent strictly necessary for implementing, managing and monitoring of the contract. The processor shall ensure that persons authorised to process the personal data received have committed themselves to confidentiality or are under an appropriate statutory obligation of confidentiality.

Appears in 1 contract

Samples: Administrative Support Services Agreement

Security of processing. (a) The processor shall at least implement the technical and organisational measures specified spec- ified in Annex III Xxxxx XXX to ensure the security of the personal data. This includes protecting the data against a breach of security leading to accidental or unlawful destruction, loss, alterationalter- ation, unauthorised disclosure or access to the data (personal data breach). In assessing the appropriate level of security, the Parties shall take due account of the state of the art, the costs of implementation, the nature, scope, context and purposes of processing and the risks involved for the data subjects. (b) The processor shall grant access to the personal per- xxxxx data undergoing processing to members mem- bers of its personnel only to the extent strictly necessary for implementing, managing and monitoring of the contract. The processor shall ensure that persons authorised to process pro- cess the personal data received have committed com- mitted themselves to confidentiality or are under un- der an appropriate statutory obligation of confidentialitycon- fidentiality.

Appears in 1 contract

Samples: End User License Agreement

Security of processing. (a) The processor shall at least implement the technical and organisational measures specified in Annex III IV to ensure the security of the personal data. This includes protecting the data against a breach of security leading to accidental or unlawful destruction, loss, alteration, unauthorised disclosure or access to the data (personal data breach). In assessing the appropriate level of security, the Parties shall take due account of the state of the art, the costs of implementation, the nature, scope, context and purposes of processing and the risks involved for the data subjects. (b) The processor shall grant access to the personal data undergoing processing pro- cessing to members of its personnel only to the extent strictly necessary for implementing, managing and monitoring of the contract. The processor shall ensure that persons authorised to process the personal data received have committed themselves to confidentiality or are under an appropriate statutory obligation of confidentiality.

Appears in 1 contract

Samples: Data Processing Agreement

Security of processing. (a) The processor Processor shall at least implement the technical and organisational measures specified in Annex III to ensure the security of the personal data. This includes protecting the data against a breach of security leading to accidental or unlawful destruction, loss, alteration, unauthorised disclosure or access to the data (personal data breach). In assessing the appropriate level of security, the Parties shall take due account of the state of the art, the costs of implementation, the nature, scope, context and purposes of processing and the risks involved for the data subjects. (b) The processor Processor shall grant access to the personal data undergoing processing to members of its personnel only to the extent strictly necessary for implementing, managing and monitoring of the contract. The processor Processor shall ensure that persons authorised to process the personal data received have committed themselves to confidentiality or are under an appropriate statutory obligation of confidentiality.

Appears in 1 contract

Samples: Data Processing Agreement

AutoNDA by SimpleDocs

Security of processing. (a) A. The processor shall at least implement the technical and organisational measures specified in Annex III to ensure the security of the personal data. This includes protecting the data against a breach of security leading to accidental or unlawful destruction, loss, alteration, unauthorised disclosure or access to the data (personal data breach). In assessing the appropriate ap- propriate level of security, the Parties shall take due account of the state of the art, the costs of implementation, the nature, scope, context and purposes of processing and the risks involved in- volved for the data subjects. (b) B. The processor shall grant access to the personal data undergoing processing to members of its personnel only to the extent strictly necessary for implementing, managing and monitoring moni- toring of the contract. The processor shall ensure that persons authorised to process the personal data received have committed themselves to confidentiality or are under an appropriate ap- propriate statutory obligation of confidentiality.

Appears in 1 contract

Samples: Data Processor Agreement

Security of processing. (a) The processor shall at least implement the technical and organisational measures specified specified in Annex III to ensure the security of the personal data. This includes protecting the data against a breach of security leading to accidental or unlawful destruction, loss, alteration, unauthorised disclosure or access to the data (personal data breach). In assessing the appropriate level of security, the Parties shall take due account of the state of the art, the costs of implementation, the nature, scope, context and purposes of processing and the risks involved for the data subjects. (b) The processor shall grant access to the personal data undergoing processing to members of its personnel only to the extent strictly necessary for implementing, managing and monitoring of the contract. The processor shall ensure that persons authorised to process the personal data received have committed themselves to confidentiality confidentiality or are under an appropriate statutory obligation of confidentialityconfidentiality.

Appears in 1 contract

Samples: Data Processing and Transfer Agreements

Security of processing. (a) 6.4.1 The processor shall at least implement the technical and organisational measures specified in Annex III to ensure the security of the personal dataPersonal Data. This includes protecting the data against a breach of security leading to accidental or unlawful destruction, loss, alteration, unauthorised disclosure or access to the data (personal data breacha “Personal Data Breach”). In assessing the appropriate level of security, the Parties shall take due account of the state of the art, the costs of implementation, the nature, scope, context and purposes of processing and the risks involved for the data subjects. (b) 6.4.2 The processor shall grant access to the personal data Personal Data undergoing processing to members of its personnel only to the extent strictly necessary for implementing, managing and monitoring of the contractthis Agreement. The processor shall ensure that persons authorised authorized to process the personal data Personal Data received have committed themselves to confidentiality or are under an appropriate statutory obligation of confidentiality.

Appears in 1 contract

Samples: Consultancy Agreement (Centogene N.V.)

Security of processing. (a) The processor shall at least implement the technical and organisational measures specified in Annex III to ensure the security of the personal data. This includes protecting the data against a breach of security leading to accidental or unlawful destruction, loss, alteration, unauthorised disclosure or access oraccess to the data (personal data breach). In assessing the appropriate level of security, the Parties shall take due account of the state of the art, the costs of implementation, the nature, scope, context and purposes of processing and the risks involved for the data subjects. (b) The processor shall grant access to the personal data undergoing processing to members of its personnel only to the extent strictly necessary for implementing, managing and monitoring of the contract. The processor shall ensure that persons authorised personsauthorised to process the personal data received have committed thepersonaldata receivedhavecommitted themselves to confidentiality or are orare under an appropriate statutory obligation of confidentiality.

Appears in 1 contract

Samples: Data Processing Agreement

Security of processing. (a) The processor Processor shall at least implement the technical and organisational organizational measures specified in Annex III II to ensure the security of the personal data. This includes protecting the data against a breach of security leading to accidental or unlawful destruction, loss, alteration, unauthorised unauthorized disclosure or access to the data (personal data breach). In assessing the appropriate level of security, the Parties shall take due account of the state of the art, the costs of implementation, the nature, scope, context and purposes of processing and the risks involved for the data subjects. (b) The processor Processor shall grant access to the personal data undergoing processing to members of its personnel only to the extent strictly necessary for implementing, managing and monitoring of the contract. The processor Processor shall ensure that persons authorised authorized to process the personal data received have committed themselves to confidentiality or are under an appropriate statutory obligation of confidentiality.

Appears in 1 contract

Samples: Data Processing Agreement

Security of processing. (a) The processor shall at least implement the technical and organisational organizational measures specified in Annex III Xxxxx XXX to ensure the security of the personal data. This includes protecting the data against a breach of security leading to accidental or unlawful destruction, loss, alteration, unauthorised unauthorized disclosure or access to the data (personal data breach). In assessing the appropriate level of security, the Parties shall take due account of the state of the art, the costs of implementation, the nature, scope, context and purposes of processing and the risks involved for the data subjects. (b) The processor shall grant access to the personal data undergoing processing to members of its personnel only to the extent strictly necessary for implementing, managing and monitoring of the contract. The processor shall ensure that persons authorised authorized to process the personal data received have committed themselves to confidentiality or are under an appropriate statutory obligation of confidentiality.

Appears in 1 contract

Samples: Data Processing Agreement

Security of processing. (a1) The processor Processor shall at least implement the technical and organisational organizational measures specified in Annex III Schedule II to ensure the security of the personal data. This includes protecting the data against a breach of security leading to accidental or unlawful destruction, loss, alteration, unauthorised disclosure unauthorized disclosure, or access to the data (personal data breach). In assessing the appropriate level of security, the Parties shall take due account of the state of the state-of-the-art, the costs of implementation, the nature, scope, context and purposes of processing and the risks involved for the data subjects. (b2) The processor Processor shall grant access to the personal data undergoing processing to members of its personnel only to the extent strictly necessary for implementing, managing managing, and monitoring of the contract. The processor Processor shall ensure that the persons authorised authorized to process the personal data received have committed themselves to confidentiality or are under an appropriate statutory obligation of confidentiality.

Appears in 1 contract

Samples: Data Processing Agreement

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!