Security of the Data. 6.1. Taking into account the state of the art, the costs of implementation and the nature, scope, context and purposes of processing to be carried out by Wonde, as well as the risk of varying likelihood and severity for the rights and freedoms of natural persons, Wonde shall in relation to the School Data implement appropriate technical and organisational measures to ensure a level of security appropriate to that risk.
6.2. In assessing the appropriate level of security, Wonde shall take account in particular of the risks that are presented by processing of the School Data, in particular from a Personal Data Breach.
Security of the Data. 6.1. Taking into account the state of the art, the costs of implementation and the nature, scope, context and purposes of processing to be carried out by eSchools, as well as the risk of varying likelihood and severity for the rights and freedoms of natural persons, eSchools shall in relation to the School Data implement appropriate technical and organisational measures to ensure a level of security appropriate to that risk.
6.2. In assessing the appropriate level of security, eSchools shall take account in particular of the risks that are presented by processing of the School Data, in particular from a Personal Data Breach.
Security of the Data. 7.1. You acknowledge that we shall have no responsibility to maintain the security of any Personal Data to the extent it is held or processed outside of the HolidayActivities Platform or our direct control.
7.2. You and us shall both implement appropriate technical and organisational measures as stipulated in Data Protection Laws and/or measures imposed on each party to ensure an appropriate level of security as outlined in Schedule 2, which shall protect against the unauthorised or unlawful processing of, and against the accidental loss or destruction of, or damage to, the Personal Data, having regard to the state of technological development and the cost of implementing any such measures.
Security of the Data. The parties will comply with any applicable legislation, regulations and legal requirements in connection with the transfer, collection, use and disclosure of the Data that it receives pursuant to this agreement. The parties will take all reasonable steps to protect the security, confidentiality and privacy of the Data it receives pursuant to this agreement, including the use of adequate and appropriate physical, organizational and technological measures. If any Data is stolen, lost or accessed by unauthorized persons, the Receiving Party shall notify the Disclosing Party at the earliest opportunity.
Security of the Data. 6.1 Taking into account the state of the art, the costs of implementation and the nature, scope, context and purposes of processing to be carried out by Wonde, as well as the risk of varying likelihood and severity for the rights and freedoms of natural persons, Wonde shall in relation to the School Data implement appropriate technical and organisational measures to ensure a level of security appropriate to that risk.
6.2 In assessing the appropriate level of security, Wonde shall take account in particular of the risks that are presented by processing of the School Data, in particular from a Personal Data Breach and to preserve the security and confidentiality of the School Data, in accordance with Wonde’s Privacy Notice. Further details of Wonde’s security policies and processes are available on request.
Security of the Data. 6.1. Rockerbox News shall, in relation to the School Data, implement appropriate technical and organisational measures to ensure a level of security appropriate to any risk.
6.2. In assessing the appropriate level of security, Rockerbox News shall take account in particular the risks that are presented by processing of the School Data, in particular from a Personal Data Breach.
Security of the Data. 6.1. Taking into account the state of the art, the costs of implementation and the nature, scope, context and purposes of processing to be carried out by DC360, as well as the risk of varying likelihood and severity for the rights and freedoms of natural persons, DC360 shall in relation to the School Data implement appropriate technical and organisational measures to ensure a level of security appropriate to that risk.
6.2. In assessing the appropriate level of security, DC360 shall take account the risks that are presented by processing of the School Data and, in particular, from a Personal Data Breach.
6.3. Taking into account and assessing the complexity of the system, DC360 shall not be held liable for Personal Data Breach, either resulting from the acts or negligence of the users or otherwise; but will act accordingly to rectify any issue swiftly and inform the necessary parties as required, including but not limited to the School affected and the Information Commissioner's Office.
6.4. Whilst every attempt is made to ensure data is backed up and can be restored, DC360 will not be held responsible for any loss of coursework or data. The School should ensure that a copy of all vital work such as coursework or assessment grades in school is retained by keeping its own backup. The site allows copies of the submitted work and all grades to be downloaded, including the automatically marked grades.
6.5. DC360 operates a number of backups to ensure restoration of both data and files. Our main backups are held in the UK, but some backups maybe held on servers outside the UK.
Security of the Data. 6.1. Taking into account the state of the art, the costs of implementation and the nature, scope, context and purposes of processing to be carried out by Web Buster Education (Deliver Computing 360), as well as the risk of varying likelihood and severity for the rights and freedoms of natural persons, Web Buster Education (Deliver Computing 360) shall in relation to the School Data implement appropriate technical and organisational measures to ensure a level of security appropriate to that risk.
6.2. In assessing the appropriate level of security, Web Buster Education (Deliver Computing 360) shall take account in particular of the risks that are presented by processing of the School Data, in particular from a Personal Data Breach.
6.3. Taking into account and assessing the complexity of the system, Web Buster Education (Deliver Computing 360) shall not be held responsible for any data breach but will act accordingly to rectify any issues swiftly. The School shall indemnify Web Buster Education (Deliver Computing 360) against all costs, claims, damages, expenses, losses and liabilities incurred by Web Buster Education (Deliver Computing 360) arising out of or in connection with any data issues or breaches. However, only limited data is stored within Web Buster Education (Deliver Computing 360) and schools can omit data they feel is un-necessary.
6.4. Whilst every attempt is made to ensure data is backed up and can be restored, Web Buster Education (Deliver Computing 360) will not be held responsible for any loss of coursework or data. The School should ensure that a copy of all vital work such as coursework or assessment grades in school is retained by keeping its own backup. The site allows copies of the submitted work and all grades to be downloaded, This includes the automatically marked grades from our system.
6.5. Web Buster Education (Deliver Computing 360) operates a number of backups to ensure restoration of both data and files. Our main backups are held in the UK, but some backups maybe held on servers outside the UK.
Security of the Data. 6.1. Taking into account the state of the art, the costs of implementation and the nature, scope, context and purposes of processing to be carried out by Succeedin and its’ Third Party Providers, as well as the risk of varying likelihood and severity for the rights and freedoms of natural persons, Succeedin shall in relation to the School Data implement appropriate technical and organisational measures to ensure a level of security appropriate to that risk.
6.2. In assessing the appropriate level of security, Succeedin shall take account in particular of the risks that are presented by processing of the School Data, in particular from a Personal Data Breach.
Security of the Data. 9.1 Outputs from the Longitudinal Study will be processed in accordance with Annex A, Longitudinal Study Outputs
9.2 Users of the VML must have attended an appropriate training course
9.3 Users of the VML must comply with the procedures in the VML User Guide, in the VML Remote Site Instructions for Users, and in the training course.
9.4 The use and security of the data are fully compliant with the National Statistics Code of Practice, and Protocol on Data Access and Confidentiality.