Common use of Subprocessor Security Clause in Contracts

Subprocessor Security. Prior to onboarding Subprocessors, the Data Importer conducts an audit of the security and privacy practices of Subprocessors to ensure Subprocessors provide a level of security and privacy appropriate to their access to data and the scope of the services they are engaged to provide. Once the Data Importer has assessed the risks presented by the Subprocessor, the Subprocessor is required to enter into appropriate security, confidentiality and privacy contract terms.

Appears in 8 contracts

Samples: Data Processing Agreement, Data Processing Agreement, Data Processing Agreement

AutoNDA by SimpleDocs

Subprocessor Security. Prior to Before onboarding Subprocessors, the Data Importer conducts an audit of carefully reviews the security and privacy practices of Subprocessors to ensure Subprocessors provide a level of security and privacy appropriate to their access to data and the scope of the services they are engaged to provide. Once the Data Importer has assessed the risks presented by the Subprocessor, the Subprocessor is required to enter into enters an agreement providing appropriate security, confidentiality and privacy contract terms.

Appears in 1 contract

Samples: signup.artlogic.net

Subprocessor Security. Prior to onboarding Subprocessors, the Data Importer conducts an audit of the security and privacy practices of Subprocessors to help ensure Subprocessors provide a level of security and privacy appropriate to their access to data and the scope of the services they are engaged to provide. Once the Data Importer has assessed the risks presented by the Subprocessor, the Subprocessor is required to enter into appropriate security, confidentiality and privacy contract terms.

Appears in 1 contract

Samples: www.workfront.com

Subprocessor Security. Prior to onboarding Subprocessors, the Data Importer conducts an audit of the security and privacy practices of Subprocessors to ensure Subprocessors provide a level of security and privacy appropriate to their access to data and the scope of the services they are engaged to provide. Once the Data Importer has assessed the risks presented by the Subprocessor, the Subprocessor is required to enter into appropriate security, confidentiality and privacy contract terms.

Appears in 1 contract

Samples: Master Services Agreement Terms and Conditions

AutoNDA by SimpleDocs

Subprocessor Security. Prior to onboarding Subprocessors, the Data Importer conducts an audit of the security and privacy practices of Subprocessors to help ensure Subprocessors provide a level of security and privacy appropriate to their access to data and the scope of the services they are engaged to provide. Once the Data Importer has assessed the risks presented by the Subprocessor, the Subprocessor is required to enter into appropriate security, confidentiality and privacy contract terms. Data Privacy Officer. The Data Privacy Officer of the Data Importer can be contacted at xxxxxxx@xxxxxxxxx.xxx.

Appears in 1 contract

Samples: www.workfront.com

Subprocessor Security. Prior to onboarding Subprocessors, the Data Importer conducts an audit of the security and privacy practices of Subprocessors to ensure Subprocessors provide a level of security and privacy appropriate to their access to data and the scope of the services they are engaged to provide. Once the Data Importer has assessed the risks presented by the Subprocessor, the Subprocessor is required to enter into appropriate security, confidentiality and privacy contract terms.

Appears in 1 contract

Samples: Data Processing Addendum

Time is Money Join Law Insider Premium to draft better contracts faster.