Security of the Processing. Factorial shall implement and maintain appropriate technical and organisational measures to protect Client Personal Data against unauthorised or unlawful processing and against accidental loss, destruction, damage, theft, alteration or disclosure, in accordance with the DPA. Such measures shall be appropriate to the harm that could result from any unauthorised or unlawful processing, accidental loss, destruction, damage or theft of the Client Personal Data and appropriate to the nature of the Client Personal Data to be protected. In this sense, Factorial may update the technical and organisational measures, provided that such modifications do not diminish the general level of security. If Factorial becomes aware of and confirms any accidental, unauthorised or unlawful destruction, loss, alteration, disclosure or access to your Client Personal Data ("Security Breach") that we process in the course of providing the Platform we will notify you without undue delay and in any event no later than 48 hours.
Security of the Processing. 4.1 We shall implement the technical and organizational measures specified at xxxxx://xxx.xxxxxxx.xxx/terms-and-conditions/. To demonstrate adequate levels of protection, We have also obtained third-party certification and audits of Our information security and data privacy management systems , e.g. DIN ISO/IEC 27001:2015 and ISO/IEC 27701:2019. All available certificates can be found at xxxxx://xxx.xxxxxxx.xxx/trust-center/. We reserve the right to update the measures and safeguards implemented, provided, however, that the level of security shall not materially decrease during Your Subscription Term.
Security of the Processing. 5.1 The Beyuna Independent Sales Representative takes the technical and organisational security measures as described in Appendix 2.
Security of the Processing. 4.1 We shall implement the technical and organizational measures specified at xxxxx://xxx.xxxxxxx.xxx/terms-and-conditions/. To demonstrate adequate levels of protection, We have also obtained third-party certification and audits of Our information security and data privacy management systems , e.g. DIN ISO/IEC 27001:2015 and hacerlo. Ud. también podrá dar instrucciones posteriores a lo largo de la duración del tratamiento de sus Datos Personales, siempre que dichas instrucciones estén dentro del alcance del Contrato y xxxx documentadas.
Security of the Processing. 5.1 Without prejudice to article 2.3 of this Data Processing Agreement, the Counterparty will implement the technical and organisational security measures described in Schedule 2.
Security of the Processing. The Processor is ISO 27001 certified. For an outline of Processor’s technical and organizational measures, please refer to Processor’s Information Security Policy. SUB-PROCESSORS Name and address Location CityNetwork International AB, 556630-7806 Xxxxxxxxxxxxxxxx 00, 000 00 Xxxxxxxxxx Xxxxxx Xxxxxx Outpost24 UK Ltd 5363691 Second floor (south) 000-000 Xxxxx Xxxxxxxx Xxxxxx, X0X0 XX Xxxxxx, Xxxxxx Xxxxxxx Xxxxxx Xxxxxxx Outpost 24, Inc. 00-0000000 00 Xxxxx, Xxxxxxxxxx, Xxxxx 000, Xxxxxxxxxx XX 00000XX 33132, USA USA Outpost24 Benelux BV 34177399 Xxxxxxxxxxxxxxx 00X, 0000 XX Xxxxxxxxx, xxx Xxxxxxxxxxx Xxxxxxxxxxx Outpost24 Belgium BVBA 670497157 Ubicenter, Xxxxxxxxxxx 0 xxx 00, 0000 Xxxxxx, Xxxxxxx Xxxxxxx Leap In Value, S.L.,(Blueliv) B-64969181 Plaça de Gal·la Xxxxxxxx, 0-0, xxxxxxx 000 00000 Xxxxxxxxx, Xxxxx Spain Snowflake, Inc. 000 Xxxxxx Xxxxx Xxx Xxxxx, XX, 00000 XXX Ireland and USA
Security of the Processing. 6.1 The PROCESSOR shall implement the necessary security measures in accordance with Art. 32 GDPR to ensure both a level of protection commensurate to the risk and safeguarding of data from abuse and loss by means of a proper implementation of and compliance with the appropriate technical and organisational measures described in further detail in Attachment C.
Security of the Processing. (1) The Processor shall take at least the technical and organisational measures listed in Annex 2 to ensure the security of personal data. This includes the protection of the data against a breach of security which, whether accidental or unlawful, results in the destruction, loss, alteration or unauthorised disclosure of or access to the data (hereinafter referred to as "personal data breach"). In assessing the appropriate level of protection, the parties shall take into account the state of the art, the implementation costs the nature, scope, circumstances and purposes of the processing and the risks to the data subjects.
Security of the Processing. (1) The level of security shall take into account:
Security of the Processing. 3.1 In an annex to this DPA (hereinafter referred to as “XXX annex”), the Contractual Partners shall agree on technical and organizational measures to adequately protect the data pursuant to Article 32 of the GDPR (hereinafter referred to as “XXX”), taking into account the state of the art; the costs of implementation; the nature, scope, circumstances and purposes of the processing; and the varying likelihood and severity of threats to the rights and freedoms of natural persons.