SECURITY RISK ASSESSMENT Sample Clauses

SECURITY RISK ASSESSMENT. Data Controller agrees that in accordance with Data Protection Laws and before submitting any Personal Data to the Subscription Service, Data Controller will perform an appropriate risk assessment to determine whether the security measures within the Subscription Service provide an adequate level of security, taking into account the nature, scope, context and purposes of the processing, the risks associated with the Personal Data and the applicable Data Protection Laws. Data Processor shall provide Data Controller reasonable assistance by providing Data Controller with information requested by Data Controller to conduct Data Controller’s security risk assessment. Data Controller is solely responsible for determining the adequacy of the security measures within the Subscription Service in relation to the Personal Data Processed. As further described in Section 7.1 (Product Capabilities) of the Data Security Guide, the Subscription Service includes, without limitation, column level encryption functionality and role-based access control, which Data Controller may use in its sole discretion to ensure a level of security appropriate to the risk of the Personal Data. For clarity, Data Controller may influence the scope and the manner of Processing of its Personal Data by its own implementation, configuration (i.e., different types of encryption) and use of the Subscription Service, including any other products or services offered by ServiceNow and third-party integrations.
AutoNDA by SimpleDocs
SECURITY RISK ASSESSMENT. Data Controller agrees that in accordance with Data Protection Laws and before submitting any Personal Data to Data Processor under the Agreement, Data Controller will perform an appropriate risk assessment to determine whether the Security Policy Framework provides an adequate level of security, taking into account the nature, scope, context and purposes of the processing, the risks associated with the Personal Data and the applicable Data Protection Laws. Data Processor shall provide Data Controller reasonable assistance by providing Data Controller with information requested by Data Controller to conduct Data Controller’s security risk assessment. Data Controller is solely responsible for determining the adequacy of the Security Policy Framework in relation to the Personal Data Processed.
SECURITY RISK ASSESSMENT. Data Controller agrees that in accordance with Data Protection Laws and before submitting any Personal Data to the Subscription Service, Data Controller will perform an appropriate risk assessment to determine whether the security measures within the Subscription Service provide an adequate level of security, taking into account the nature, scope, context and purposes of the processing, the risks associated with the Personal Data and the applicable Data Protection Laws. Data Processor shall provide Data Controller reasonable assistance by providing Data Controller with information requested by Data Controller to conduct Data Controller’s security risk assessment. Data Controller is solely responsible for determining the adequacy of the security measures within the Subscription Service in relation to the Personal Data Processed. As further described in Section 7.1 (Product Capabilities) of the Data Security Guide, the Subscription Service includes, without limitation, column level encryption functionality and role-based access control, which Data Controller may use in its sole discretion to ensure a level of security appropriate to the risk of the Personal Data. For clarity, Data Controller may influence the scope and the manner of Processing of its Personal Data by its own implementation, configuration (i.e., different types of encryption) and use of the Subscription Service, including any other products or services offered by ServiceNow and third-party integrations. 3.2. セキュリティ・リスク評価 データ管理者は、データ保護法に準拠して、何らかの個人データをサブスクリプション・サービスに提出する前に、処理の性質、範囲、状況および目的、個人データに関連するリスクならびに適用されるデータ保護法を考慮した上で、サブスクリプション・サービス内のセキュリティ対策が、十分なレベルのセキュリティを提供しているかどうかを判断するために適切なリスク評価を実施することに同意するものとします。データ処理者は、データ管理者がセキュリティリスク評価を実施するためにデータ管理者によって要求される情報をデータ管理者に提供することによって、データ管理者に対し合理的な支援をします。データ管理者は、処理される個人データに関連してサブスクリプション・サービス内でのセキュリティ対策の十分性を判断することについてすべての責任を負います。データ・セキュリティ・ガイドの 7 条 1 項(製品機能)に規定されるように、サブスクリプション・サービスは、列レベル暗号化機能およびロールベースのアクセス制御を含みますが、これらに限られず、データ管理者は、個人データのリスクに適切なセキュリティのレベルを保証するため、その単独の裁量により、それらを使用できます。明確化のため付言すると、データ管理者は、データ管理者独自の実装、設定(例えば、異なる種類の暗号化)、ならびにサブスクリプション・サービス (ServiceNow および第三者のインテグレーションによって提供されるその他の製品またはサービスを含む。)の使用によって、その個人データの処理範囲および方法に影響を及ぼすことができます。
SECURITY RISK ASSESSMENT. Data Controller agrees that in accordance with Data Protection Laws and before submitting any Personal Data to the Subscription Service, Data Controller will perform an appropriate risk assessment to determine whether the security measures within the Subscription Service provide an adequate level of security, taking into account the nature, scope, context and purposes of the processing, the risks associated with the Personal Data and the applicable Data Protection Laws. Data Controller is solely responsible for determining the adequacy of the security measures within the Subscription Service in relation to the Personal Data Processed. As further described in Section 7.1 (Product Capabilities) of the Data Security Guide, the Subscription Service includes, without limitation, column level encryption functionality and role-based access control, which Data Controller may use in its sole discretion to ensure a level of security appropriate to the risk of the Personal Data. For clarity, Data Controller may influence the scope and the manner of Processing of its Personal Data by its own implementation, configuration and use of the Subscription Service, including any other products or services offered by MobiChord and ServiceNow third-party integrations.
SECURITY RISK ASSESSMENT. Data Controller agrees that in accordance with Data Protection Laws and before submitting any Personal Data to the Subscription Service, Data Controller will perform an appropriate risk assessment to determine whether the security measures within the Subscription Service provide an adequate level of security, taking into account the nature, scope, context and purposes of the processing, the risks associated with the Personal Data and the applicable Data Protection Laws. Data Processor shall provide Data Controller reasonable assistance by providing Data Controller with information requested by Data Controller to conduct Data Controller’s security risk assessment. Data Controller is solely responsible for determining the adequacy of the security measures within the Subscription Service in relation to the Personal Data Processed. As further described in Section
SECURITY RISK ASSESSMENT. The Contractor must conduct assessments of risks and identify the damage that could result from unauthorized access, use, disclosure, disruption, modification, or destruction of information and information systems that support the operations and assets of the Department of Treasury. Security controls should be implemented based on the potential risks. The Contractor must ensure that reassessments occur whenever there are significant modifications to the information system and that risk assessment information is updated.
SECURITY RISK ASSESSMENT. Data Controller agrees that in accordance with Data Protection Laws and before submitting any Personal Data to the Subscription Service, Data Controller will perform an appropriate risk assessment to determine whether the security measures within the Subscription Service provide an adequate level of security, taking into account the nature, scope, context and purposes of the processing, the risks associated with the Personal Data and the applicable Data Protection Laws. Data Processor shall provide Data Controller reasonable assistance by providing Data
AutoNDA by SimpleDocs
SECURITY RISK ASSESSMENT. RC Service Provider shall assess vulnerabilities and threats associated with and including, but not limited to, how the vulnerabilities and threats combine to form risks and recommending steps for remediation of the risks. RC Service Provider shall provide recommendations to the Customer on timeframes for conducting periodic reviews, remediation, audits, security vulnerability assessments, and security Risk Assessments of the Customer’s environment, processes, and practices. Customer and RC Service Provider will mutually determine the frequency of these services.
SECURITY RISK ASSESSMENT. University of Elbasan has been the first to conduct a preliminary security risk assessment before implementing and installing all the devices. The specific goal was to perform an initial analysis for a combined risk assessment method, which required efforts in each of the following steps:

Related to SECURITY RISK ASSESSMENT

  • Periodic Risk Assessment Provider further acknowledges and agrees to conduct periodic risk assessments and remediate any identified security and privacy vulnerabilities in a timely manner.

  • Risk Assessment An assessment of any risks inherent in the work requirements and actions to mitigate these risks.

  • Risk Assessments a. Risk Assessment - DST shall, at least annually, perform risk assessments that are designed to identify material threats (both internal and external) against Fund Data, the likelihood of those threats Schedule 10.2 p.2 occurring and the impact of those threats upon DST organization to evaluate and analyze the appropriate level of information security safeguards (“Risk Assessments”). b. Risk Mitigation - DST shall use commercially reasonable efforts to manage, control and remediate threats identified in the Risk Assessments that it believes are likely to result in material unauthorized access, copying, use, processing, disclosure, alteration, transfer, loss or destruction of Fund Data, consistent with the Objective, and commensurate with the sensitivity of the Fund Data and the complexity and scope of the activities of DST pursuant to the Agreement. c. Security Controls Testing - DST shall, on approximately an annual basis, engage an independent external party to conduct a review (including information security) of DST’s systems that are related to the provision of services. DST shall have a process to review and evaluate high risk findings resulting from this testing.

  • Security Assessment If Accenture reasonably determines, or in good faith believes, that Supplier’s security practices or procedures do not meet Supplier’s obligations under the Agreement, then Accenture will notify Supplier of the deficiencies. Supplier will without unreasonable delay: (i) correct such deficiencies at its own expense; (ii) permit Accenture, or its duly authorized representatives, to assess Supplier’s security-related activities that are relevant to the Agreement; and (iii) timely complete a security questionnaire from Accenture on a periodic basis upon Accenture’s request. Security issues identified by Accenture will be assigned risk ratings and an agreed-to timeframe to remediate. Supplier will remediate all the security issues identified within the agreed to timeframes. Upon Supplier’s failure to remediate any high or medium rated security issues within the stated timeframes, Accenture may terminate the Agreement in accordance with Section 8 above.

  • Builder’s Risk Insurance Contractor shall provide a Builder’s Risk Policy to be made payable to the Owner and Contractor, as their interests may appear. The policy amount should be equal to 100% of the Contract Sum, written on a Builder’s Risk “All Risk”, or its equivalent. The policy shall be endorsed as follows: The following may occur without diminishing, changing, altering or otherwise affecting the coverage and protection afforded the insured under this policy: (i) Furniture and equipment may be delivered to the insured premises and installed in place ready for use; and (ii) Partial or complete occupancy by Owner; and (iii) Performance of work in connection with construction operations insured by the Owner, by agents or lessees or other Contractors of the Owner or Using Agency In the event that the Contract is for renovation, addition or modification of an existing structure and Builders Risk Insurance is not available, the Owner will accept an Installation Floater Insurance Policy with the above endorsements in lieu of the Builders' Risk Insurance Policy. Such floater must insure loss to materials and equipment prior to acceptance by Owner and must be on an ALL RISK BASIS with the policy written on a specific job site.

  • Builder’s Risk additional provisions The insurance specified shall be maintained in force until final acceptance of the project by the State. (5) Umbrella Excess Liability Policies may be used in conjunction with primary policies to comply with any of the limit requirements specified above. (6) Claims-made" coverage forms are not acceptable without the express written prior consent of the State. Each policy furnished shall contain a rider or non-cancellation clause reading in substance as follows: Anything herein to the contrary notwithstanding, notice of any cancellation, termination or alteration to the insurance contracts must be delivered by registered mail to the Commissioner, Department of Buildings and General Services, State of Vermont, Montpelier, Vermont, at least 60 days before effective cancellation, termination or alteration date unless all work required to be performed under the terms of the Contract is satisfactorily completed as evidenced by the formal acceptance by the State of Vermont. (7) No warranty is made that the coverages and limits listed herein are adequate to cover and protect the interests of the Contractor for the Contractor’s operations. These are solely minimums that have been set to protect the interests of the State. 11.3 The State shall have power to adjust and settle any loss with the insurers.

  • Loss Assessment We will pay up to $1000 for your share of loss assessment charged during the policy period against you by a corporation or as- sociation of property owners, when the assess- ment is made as a result of:

  • Needs Assessment The determination of whether the Annual Income of a family or individual occupying or seeking to occupy a Qualifying Unit complies with the requirements for Extremely Low-Income Households or Low- to Moderate-Income Households shall be made by the applicable housing authority in the CDBG-DR Program area prior to admission of such family or individual to occupancy of a Qualifying Unit.

  • Data Protection Impact Assessment If, pursuant to Data Protection Law, Customer (or its Controllers) are required to perform a data protection impact assessment or prior consultation with a regulator, at Customer’s request, SAP will provide such documents as are generally available for the Cloud Service (for example, this DPA, the Agreement, audit reports or certifications). Any additional assistance shall be mutually agreed between the Parties.

  • Data Loss Prevention DST shall implement a data leakage program that is designed to identify, detect, monitor and document Fund Data leaving DST’s control without authorization in place.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!