Common use of Security reviews of the operations environment Clause in Contracts

Security reviews of the operations environment. The operations environment is repeatedly reviewed in design and actual execution. The latter is accomplished using penetration tests that are carried out by Treasure Data and external service providers. A summary of those reviews can be shared with Customer provided that the content may be redacted as necessary to ensure the confidentiality and security of the environment for other Treasure Data customers. Treasure Data has experience in supporting external audits by third parties on behalf of customers. In such situations, some of the internal security review material can be shared with the external auditor to facilitate a more thorough review for lesser costs.

Appears in 4 contracts

Samples: Data Processing Addendum, Data Processing Addendum, Data Processing Addendum

AutoNDA by SimpleDocs
Time is Money Join Law Insider Premium to draft better contracts faster.