Security risk Sample Clauses

Security risk. If a party becomes aware of or suspects a security risk, it needs to take the steps specified in this clause. If either party becomes aware or suspects that:
AutoNDA by SimpleDocs
Security risk. The Data Processor must take the measures necessary to identify, evaluate and limit any reasonably foreseeable internal and external risks to the availability, confidentiality or integrity of all personal data covered by the Data Processing Agreement. The Data Processor must take appropriate technical steps to limit the risk of any unauthorised access. The Data Processor must evaluate and improve the effectiveness of these precautions when necessary. The Data Processor must document identified risks, as well as when a risk is reduced to an acceptable level. The above obligation involves the Data Processor carrying out a risk evaluation followed by measures to counter identified risks. This could include any relevant measures from the following list: Pseudonymisation and encryption of personal data Capability to ensure continued confidentiality, integrity, availability and resilience of processing systems and services Capability to correctly re-establish availability of and access to personal data in the case of a physical or technical incident A procedure for regular trial, assessment and evaluation of the effectiveness of the technical and organisational measures for ensuring security of processing. The Data Processor must have formal procedures for handling security incidents. Authorisation and access control Authorisations must state to which extent users may request, input or delete personal data. Only authorised persons may access personal data processed under the Data Processing Agreement. The Data Processor must be able to document which employees are authorised to access personal data processed under the Data Processing Agreement. Authorised persons must carry picture ID when processing data on-site at the Data Controller’s premises. Only persons engaged in purposes for which the personal data is being processed may be authorised. Individual users must not be authorised for uses they do not require. Authorisation may also be given to persons who require access to personal data for auditing, operational or systems tasks. Each authorised user is provided with a personal user ID and a personal password, which must be used every time the user accesses the data processing. Passwords must be changed every 6 months. Passwords must be sufficiently long and complex. Generally, 2-factor authentication must be used to access systems with sensitive personal data by internet or unsecured network. The authentication method can be, for example, Nem-id, SMS token,...
Security risk. 11.1 The Client accepts that security systems, including but not limited to smoke, heat and intruder detectors installed to/at their premises:
Security risk. 3.3.1. The Data Processor must take the measures necessary to identify, evaluate and limit any reasonably foreseeable internal and external risks to the availability, confidentiality or integrity of all personal data covered by the Data Processing Agreement.
Security risk. (a) The Exhibitor uses the Venue, the Site, the Stand and the premises and its facilities at its own risk.
Security risk. Any student identified as a security risk or having a history of problems with other computer systems may be denied access.
Security risk. Dealing in a security by sale or purchase in the same session requires a detailed study of the movement of their trading prices during a specific period that allows studying the levels of their trading prices and learning of the price extent of their movement during the trading session, in addition to the importance of gaining knowledge of their maximum and minimum trading prices during the period of the study. The trading of the investor in a security by the intra day trading system without a technical study of its trading movement and determining the appropriate time for purchase or sale during the session, taking into consideration the limited number of trading hours and the necessity of making the investment decision quickly in addition to the lack of knowledge of the Client to the above, may lead to maximizing its losses, let alone the other risks entailing from substantial events that could be declared by the Company during the trading session with which the investor is assumed to react or by which its decision may be influenced. This requires the investor to be fully aware of the trading markets, their strategies, their investment methods and their correlated risks.
AutoNDA by SimpleDocs
Security risk. It is not possible for RBC to eliminate all security risks. You are responsible for keeping your RBC Account password safe, and you may be responsible for all the transactions under your RBC Account, whether you authorised them or not. Transactions in Digital Assets may be irreversible, and losses due to fraudulent or unauthorised transactions may not be recoverable.
Security risk. Some countries and regions in which the Emerging Bond Fund invests have experienced security concerns. Incidents involving a country’s or region’s security may cause uncertainty in these markets and may adversely affect their economies and the Emerging Bond Fund’s investments.
Security risk. Some countries and regions in which the Fund invests have experienced security concerns, such as terrorism and strained international relations. Incidents involving a country’s or region’s security may cause uncertainty in its markets and may adversely affect its economy and the Fund’s investments.
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!