Sub-processor Security Sample Clauses

Sub-processor Security. Algolia conducts audits of security and privacy practices of Sub-processors prior to onboarding the Sub- processors in order to ensure adequate level of security and privacy to data and scope of services they are engaged to provide. Once the Sub-processor audit is performed and associated risk is evaluated, the Sub- processor enters into appropriate privacy, confidentiality and security contract terms.
AutoNDA by SimpleDocs
Sub-processor Security. Prior to onboarding sub-processors that will handle any data provided by a Data Exporter, the Data Importer conducts an assessment of the security and privacy practices of the sub-processor to help ensure that the sub-processor provides a level of security and data protection controls appropriate to their access to data and the scope of the services they are engaged to provide.
Sub-processor Security. Sightengine will only onboard Sub-processors who provide adequate levels of security and privacy to data and scope of services they are engaged to provide. Sightengine maintains an up-to-date list of Sub-processors on its website.
Sub-processor Security. Where Company subcontracts its obligations, it shall do so only by way of a written agreement with the sub-processor which imposes contractual obligations that are at least equivalent to those obligations imposed on Company under this Addendum.
Sub-processor Security. Before engagement, all Sub-processors must go through an internal vendor review and approval process which includes review by Sprout Social’s security, legal, privacy, and finance teams. The Sprout Social security team performs due diligence of our Sub-processors on an annual basis to ensure continued compliance with information security controls.

Related to Sub-processor Security

  • Contractor Security Clearance Customers may designate certain duties and/or positions as positions of “special trust” because they involve special trust responsibilities, are located in sensitive locations, or have key capabilities with access to sensitive or confidential information. The designation of a special trust position or duties is at the sole discretion of the Customer. Contractor or Contractor’s employees and Staff who, in the performance of this Contract, will be assigned to work in positions determined by the Customer to be positions of special trust, may be required to submit to background screening and be approved by the Customer to work on this Contract.

  • Mobile Deposit Security You will complete each deposit promptly. If you are unable to complete your deposit promptly, you will ensure that your mobile device remains securely in your possession until the deposit has been completed. It is your responsibility to establish and maintain procedures to safeguard against unauthorized deposits. You will notify us immediately by telephone with written confirmation if you learn of any loss or theft of original checks. You will ensure the safety and integrity of original checks from the time of receipt until the time of destruction. If warranted in our reasonable judgment, we may audit and monitor you, and you agree to cooperate with us to permit such monitoring, to confirm that you have satisfied your obligations under this Agreement.

Time is Money Join Law Insider Premium to draft better contracts faster.