Details of Processing 3.1. For details of how personal data is processed under this Agreement, please register to see our "GDPR Portal" at xxxxx://xxxxxx- xxxxxxx.xxxxx.xxx/Xxxxxxx/x/xxxx-xxx. You may also request a copy of the Product Fact Sheet from Your Access Account Manager.
Other Methods of Procurement of Goods The following table specifies the methods of procurement, other than International Competitive Bidding, which may be used for goods. The Procurement Plan shall specify the circumstances under which such methods may be used: Procurement Method
Particular Methods of Procurement of Goods Works and Services (other than Consultants’ Services)
Publication of Procurement Contract 48.1 Within fourteen days after signing the contract, the Procuring Entity shall publish and publicize the awarded contract at its notice boards, entity website; and on the Website of the Authority in manner and format prescribed by the Authority. At the minimum, the notice shall contain the following information:
Description of Processing Include a description of how the disclosed information will be processed by each receiving party.
Selection of projects and financial parameters 4.1 Open calls and availability of funds (including number of calls, duration of calls, and estimated size):
Records of Processing Activities 6.1 The Data Processor shall keep records of all categories of processing activities performed on behalf of the Data Controller. Records of Processing activities shall include at least the following:
Duration of Processing The Parties will Process Shared Personal Data during the Term of the underlying RRA to which this this Data Processing Addendum is applicable, but will abide by the terms of this Data Processing Addendum for the duration of the Processing if in excess of that term, and unless otherwise agreed upon in writing.
Particular Methods of Procurement of Goods and Works International Competitive Bidding. Goods and works shall be procured under contracts awarded on the basis of International Competitive Bidding.
Security of processing (a) The data importer and, during transmission, also the data exporter shall implement appropriate technical and organisational measures to ensure the security of the data, including protection against a breach of security leading to accidental or unlawful destruction, loss, alteration, unauthorised disclosure or access to that data (hereinafter ‘personal data breach’). In assessing the appropriate level of security, the Parties shall take due account of the state of the art, the costs of implementation, the nature, scope, context and purpose(s) of processing and the risks involved in the processing for the data subjects. The Parties shall in particular consider having recourse to encryption or pseudonymisation, including during transmission, where the purpose of processing can be fulfilled in that manner. In case of pseudonymisation, the additional information for attributing the personal data to a specific data subject shall, where possible, remain under the exclusive control of the data exporter. In complying with its obligations under this paragraph, the data importer shall at least implement the technical and organisational measures specified in Annex II. The data importer shall carry out regular checks to ensure that these measures continue to provide an appropriate level of security.