Common use of Subprocessor Security Clause in Contracts

Subprocessor Security. Before onboarding Subprocessors, Google conducts an audit of the security and privacy practices of Subprocessors to ensure Subprocessors provide a level of security and privacy appropriate to their access to data and the scope of the services they are engaged to provide. Once Google has assessed the risks presented by the Subprocessor, then subject to the requirements described in Section 11.3 (Requirements for Subprocessor Engagement) of this Data Processing Amendment, the Subprocessor is required to enter into appropriate security, confidentiality and privacy contract terms.

Appears in 14 contracts

Samples: lttudor.ro, dealerdesk.com, www.icesperia.it

AutoNDA by SimpleDocs

Subprocessor Security. Before onboarding Subprocessors, Google conducts an audit of the security and privacy practices of Subprocessors to ensure Subprocessors provide a level of security and privacy appropriate to their access to data and the scope of the services they are engaged to provide. Once Google has assessed the risks presented by the SubprocessorSubprocessor then, then subject always to the requirements described set out in Section 11.3 (Requirements for Subprocessor Engagement) of this Data Processing Amendment), the Subprocessor is required to enter into appropriate security, confidentiality and privacy contract terms.

Appears in 12 contracts

Samples: Processing Terms, Processing Terms, Processing Terms

Subprocessor Security. Before Prior to onboarding Subprocessors, Google conducts an audit of the security and privacy practices of Subprocessors to ensure Subprocessors provide a level of security and privacy appropriate to their access to data and the scope of the services they are engaged to provide. Once Google has assessed the risks presented by the Subprocessor, then subject always to the requirements described set out in Section 11.3 11.2 (Requirements for Subprocessor EngagementSubprocessing Restrictions) of this Data Processing Amendment, the Subprocessor is required to enter into appropriate security, confidentiality and privacy contract terms.

Appears in 3 contracts

Samples: Enterprise Online Agreement, campussuite-storage.s3.amazonaws.com, Suite Agreement

Subprocessor Security. Before onboarding Subprocessors, Google conducts an audit of the security and privacy practices of Subprocessors to ensure Subprocessors provide a level of security and privacy appropriate to their access to data and the scope of the services they are engaged to provide. Once Google has assessed the risks presented by the Subprocessor, then subject always to the requirements described set out in Section 11.3 (Requirements for Subprocessor Engagement) of this Data Processing Amendment, the Subprocessor is required to enter into appropriate security, confidentiality and privacy contract terms.

Appears in 3 contracts

Samples: radiosphere.de, www.aquacloud.net, www.middletonprimaryschool.co.uk

Subprocessor Security. Before Prior to onboarding Subprocessors, Google conducts an audit of the security and privacy practices of Subprocessors to ensure Subprocessors provide a level of security and privacy appropriate to their access to data and the scope of the services they are engaged to provide. Once Google has assessed the risks presented by the Subprocessor, then subject always to the requirements described set out in Section 11.3 (Requirements for Subprocessor Engagement) 11.2 of this Data Processing Amendment, the Subprocessor is required to enter into appropriate security, confidentiality and privacy contract terms.

Appears in 2 contracts

Samples: Google Apps Agreement, Google Apps Agreement

Subprocessor Security. Before onboarding Subprocessors, Google conducts an audit of the security and privacy practices of Subprocessors to ensure Subprocessors provide a level of security and privacy appropriate to their access to data and the scope of the services they are engaged to provide. Once Google has assessed the risks presented by the Subprocessor, then subject to the requirements described in Section 11.3 (Requirements for Subprocessor Engagement) of this Data Processing Amendmentthese Addendum, the Subprocessor is required to enter into appropriate security, confidentiality and privacy contract terms.”

Appears in 1 contract

Samples: sdpc.a4l.org

Subprocessor Security. Before onboarding Subprocessors, Google conducts an audit of the security and privacy practices of Subprocessors to ensure Subprocessors provide a level of security and privacy appropriate to their access to data and the scope of the services they are engaged to provide. Once Google has assessed the risks presented by the Subprocessor, then subject to the requirements described in Section 11.3 (Requirements for Subprocessor Engagement) of this Data Processing Amendment, the Subprocessor is required to enter into appropriate security, confidentiality and privacy contract terms, subject to the requirements set out in Section 11.3 (Requirements for Subprocessor Engagement).

Appears in 1 contract

Samples: Processing Terms

Subprocessor Security. Before onboarding Subprocessors, Google conducts an audit of the security and privacy practices of Subprocessors to ensure Subprocessors provide a level of security and privacy appropriate to their access to data and the scope of the services they are engaged to provide. Once Google has assessed the risks presented by the Subprocessor, then subject to the requirements described in Section 11.3 (Requirements for Subprocessor Engagement) of this Data Processing Amendmentthese Terms, the Subprocessor is required to enter into appropriate security, confidentiality and privacy contract terms.

Appears in 1 contract

Samples: www.appsheet.com

Subprocessor Security. Before onboarding Subprocessors, Google conducts an audit of the security and privacy practices of Subprocessors to ensure Subprocessors provide a level of security and privacy appropriate to their access to data and the scope of the services they are engaged to provide. Once Google has assessed the risks presented by the SubprocessorSubprocessor then, then subject always to the requirements described set out in Section 11.3 (Requirements for Subprocessor Engagement) of this Data Processing Amendment), the Subprocessor is required to enter into appropriate security, confidentiality and privacy contract terms.. Google Ads Data Processing Terms, Version 1.2 12 October 2017 Help Privacy

Appears in 1 contract

Samples: Processing Terms

Subprocessor Security. Before onboarding Subprocessors, Google conducts an audit of the security and privacy practices of Subprocessors to ensure Subprocessors provide a level of security and privacy appropriate to their access to data and the scope of the services they are engaged to provide. Once Google has assessed the risks presented by the Subprocessor, then subject to the requirements described in Section 11.3 (Requirements for Subprocessor Engagement) of this Data Processing Amendmentthese Terms, the Subprocessor is required to enter into appropriate security, confidentiality and privacy contract terms.is

Appears in 1 contract

Samples: cloud.google.com

AutoNDA by SimpleDocs

Subprocessor Security. Before onboarding Subprocessors, Google conducts an audit of the security and privacy practices of Subprocessors to ensure Subprocessors provide a level of security and privacy appropriate to their access to data and the scope of the services they are engaged to provide. Once Google has assessed the risks presented by the Subprocessor, then subject to the requirements described set out in Section 11.3 (Requirements for Subprocessor Engagement) of this Data Processing Amendmentthese Terms, the Subprocessor is required to enter into appropriate security, confidentiality and privacy contract terms.

Appears in 1 contract

Samples: cloud.google.com

Subprocessor Security. Before onboarding Subprocessors, Google conducts an audit of the security and privacy practices of Subprocessors to ensure Subprocessors provide a level of security and privacy appropriate to their access to data and the scope of the services they are engaged to provide. Once Google has assessed the risks presented by the Subprocessor, then subject to the requirements described in Section 11.3 (Requirements for Subprocessor Engagement) of this Data Processing Amendment), the Subprocessor is required to enter into appropriate security, confidentiality and privacy contract terms.

Appears in 1 contract

Samples: Google Cloud Master Agreement

Subprocessor Security. Before onboarding Subprocessors, Google conducts an audit of the security and privacy practices of Subprocessors to ensure Subprocessors provide a level of security and privacy appropriate to their access to data and the scope of the services they are engaged to provide. Once Google has assessed the risks presented by the SubprocessorSubprocessor then, then subject always to the requirements described set out in Section 11.3 (Requirements for Subprocessor Engagement) of this Data Processing Amendment), the Subprocessor is required to enter into appropriate security, confidentiality and privacy contract terms.. Google Ads Data Processing Terms, Version 1.2 12 October 2017

Appears in 1 contract

Samples: Processing Terms

Subprocessor Security. Before onboarding Subprocessors, Google conducts an audit of the security and privacy practices of Subprocessors to ensure Subprocessors provide a level of security and privacy appropriate to their access to data and the scope of the services they are engaged to provide. Once Google has assessed the risks presented by the Subprocessor, then subject to the requirements described set out in Section 11.3 10.3 (Requirements for Subprocessor Engagement) of this Data Processing Amendmentthese Terms, the Subprocessor is required to enter into appropriate security, confidentiality and privacy contract terms.

Appears in 1 contract

Samples: static.googleusercontent.com

Subprocessor Security. Before Prior to onboarding Subprocessors, Google conducts an audit of the security and privacy practices of Subprocessors to ensure Subprocessors provide a level of security and privacy appropriate to their access to data and the scope of the services they are engaged to provide. Once Google has assessed the risks presented by the Subprocessor, then subject to the requirements described set out in Section 11.3 11.2 (Requirements for Subprocessor EngagementSubprocessing Restrictions) of this Data Processing Amendmentthese Terms, the Subprocessor is required to enter into appropriate security, confidentiality and privacy contract terms.

Appears in 1 contract

Samples: static.carahsoft.com

Subprocessor Security. Before onboarding Subprocessors, Google conducts an audit of the security and privacy practices of Subprocessors to ensure Subprocessors provide a level of security and privacy appropriate to their access to data and the scope of the services they are engaged to provide. Once Google has assessed the risks presented by the Subprocessor, then subject to the requirements described in Section 11.3 (Requirements for Subprocessor Engagement) of this Data Processing AmendmentAddendum, the Subprocessor is required to enter into appropriate security, confidentiality and privacy contract terms.. Previous versions of Data Processing and Security Terms:

Appears in 1 contract

Samples: www.slomsek.it

Time is Money Join Law Insider Premium to draft better contracts faster.