Security, risk and impact of the processing Sample Clauses

Security, risk and impact of the processing. All relevant Security Policies applicable to the parties and systems used in this proposal are available and listed in Appendix 1. A suitable process to document and monitor the security risk described in the Information Security and Governance Policies listed in Appendix 1. A Data Protection Impact assessment has been produced and is available as listed in Appendix 1. A competent, independent and free of conflicts of interests Data Protection Officer has been designated to inform the Data Controllers on the adequacy of this agreement and the corresponding compliance and any residual risks documented in the Data Protection Impact Assessment. The security measures put in place across the parties ensure that: [N/A] Wherever special categories of data are processed, the data will be encrypted at rest and in transit. [N/A] Wherever special categories of data are transmitted over network, Transport Layer Security (TLS) protocols will be applied. Exceptions will be documented in the DPIA and any residual risk will require approval by the SIRO of each organisation prior to processing such data. [ x ] If personal data is accidentally lost, altered or destroyed, it can be recovered to prevent any damage or distress to the individuals concerned. This is achieved through the following work instructions, policies and procedures (also listed in Appendix 1): The security controls applicable by each organisation will be: Jointly agreed between the parties x Independently decided by each party
AutoNDA by SimpleDocs
Security, risk and impact of the processing. ‌ [ ] All relevant Security Policies applicable to the parties and systems used in this proposal are available and listed in Appendix 1. [ ] A qualified Information Security Officer has reviewed the adequacy of the attached Security Policies and has advised on the technical and organisational security risk level. [ ] A suitable process to document and monitor the security risk described in the Information Security and Governance Policies listed in Appendix 1. [ ] A Data Protection Impact assessment has been produced and is available as listed in Appendix 1. [ ] A competent, independent and free of conflicts of interests Data Protection Officer has been designated to inform the Data Controllers on the adequacy of this agreement and the corresponding compliance and any residual risks documented in the Data Protection Impact Assessment. [ ] A Data Protection Impact assessment has been produced and is available as listed in Appendix 1. The security measures put in place across the parties ensure that: [ ] Wherever special categories of data are processed, the data will be encrypted at rest and in transit. [ ] Wherever special categories of data are transmitted over network, Transport Layer Security (TLS) protocols will be applied. Exceptions will be documented in the DPIA and any residual risk will require approval by the SIRO of each organisation prior to processing such data. [ ] only authorised individuals can access, alter, disclose or destroy data. This is achieved through the following work instructions, policies and procedures (also listed in Appendix 1): In the bullet points below, list any relevant policies/procedures that explain the arrangements between the parties for these controls.  [ ] authorised individuals act only within the scope of their authority. This is achieved through the following work instructions, policies and procedures (also listed in Appendix 1): In the bullet points below, list any relevant policies/procedures that explain the arrangements between the parties for these controls. [ ] if personal data is accidentally lost, altered or destroyed, it can be recovered to prevent any damage or distress to the individuals concerned. This is achieved through the following work instructions, policies and procedures (also listed in Appendix 1): In the bullet points below, list any relevant policies/procedures that explain the arrangements between the parties for these controls.  The security controls applicable by each organisation will ...

Related to Security, risk and impact of the processing

  • Watering C.10.1. The Contractor shall water lawns, flowers, shrubs, and trees to provide for moisture penetration to a depth of 7 centimeters. If natural precipitation is sufficient to fulfill this requirement, the Contractor may request the COR's permission to suspend watering to avoid too much water in the soil.

  • Storage The ordering agency is responsible for storage if the contractor delivers within the time required and the agency cannot accept delivery.

  • GARBAGE DISPOSAL, RECYCLING, AND BIODEGRADABLE MATERIALS A. Concessionaire shall be responsible for maintaining the cleanliness of the Concession Premises. Concessionaire shall ensure placement of all garbage and trash generated by the Concession Operation in designated containers and that said containers are emptied daily, or as more frequently required by Department, at a location within the Area designated by Department. Disposal costs from this latter location shall be borne by Department. Concessionaire shall provide such additional trash containers as may be required to keep the immediate Concession Premises clean at all times. The type of trash containers provided by Concessionaire shall be approved by Department prior to use.

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If CBB chooses to subtend a Verizon access Tandem, CBB’s NPA/NXX must be assigned by CBB to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG.

  • Incident Reporting and Client Risk Prevention An incident report shall be created and maintained at the AGENCY for the following: in the event the AGENCY’S staff or subcontractor becomes aware of an occurrence of any incident of injury to a client receiving program services through the COUNTY, requiring medical treatment by a licensed physician; any lawsuit entered into or against the AGENCY, all allegations of any kind of abuse, neglect, or exploitation of the AGENCY’S clients with the exception of those AGENCIES whose primary function is working with those that have been abused, neglected or exploited unless the allegation is against an AGENCY staff member; media coverage relating to the media expressing an interest in a case or issue concerning a client of the AGENCY or an employee on the AGENCY premises, a fire, hostage situation, bomb threat, epidemic or any circumstance which may impact the service provision. All occurrences shall be verbally communicated directly to COUNTY staff no later than 10:00 a.m. the following business day via telephone to the COUNTY. All incident reports shall be made available to the COUNTY upon request and maintained at the AGENCY. These reporting requirements shall in no way supersede the requirements for notification of allegations of abuse/neglect/exploitations to the State of Florida Abuse Hotline, as mandated in Chapter(s) 39 and 415, Florida Statutes.

  • Dewatering 4.7.1 Where a part of a site is affected by surface water following a period of rain, thus rendering some areas unsafe for productive work, consistent with the Employer’s obligations under the OH&S Act, all non- trades employees shall assist in ‘dewatering’ their own work site or area if it is so affected. Such work to be paid at single time rates. Productive work will continue in areas not so affected.

  • Name Collision Report Handling 6.3.1 During the first two years after delegation of the TLD, Registry Operator’s emergency operations department shall be available to receive reports, relayed by ICANN, alleging demonstrably severe harm from collisions with overlapping use of the names outside of the authoritative DNS.

  • Transportation Transportation expenses include, but are not limited to, airplane, train, bus, taxi fares, rental cars, parking, mileage reimbursement, and tolls that are reasonably and necessarily incurred as a result of conducting State business. Each State agency shall determine the necessity for travel, and the mode of travel to be reimbursed.

  • Drainage Systems (1) Clear culvert inlets, outlets, and sediment catching basins.

  • Infrastructure (a) The Borrower has and will maintain a sufficient infrastructure to conduct its business as presently conducted and as contemplated to be conducted following its execution of this Agreement.

Time is Money Join Law Insider Premium to draft better contracts faster.