Subprocessor Security. Prior to onboarding Subprocessors, the Data Importer conducts an audit of the security and privacy practices of Subprocessors to ensure Subprocessors provide a level of security and privacy appropriate to their access to data and the scope of the services they are engaged to provide. Once the Data Importer has assessed the risks presented by the Subprocessor, the Subprocessor is required to enter into appropriate security, confidentiality and privacy contract terms.
Appears in 8 contracts
Samples: Data Processing Agreement, Data Processing Agreement, Data Processing Agreement
Subprocessor Security. Prior to Before onboarding Subprocessors, the Data Importer conducts an audit of carefully reviews the security and privacy practices of Subprocessors to ensure Subprocessors provide a level of security and privacy appropriate to their access to data and the scope of the services they are engaged to provide. Once the Data Importer has assessed the risks presented by the Subprocessor, the Subprocessor is required to enter into enters an agreement providing appropriate security, confidentiality and privacy contract terms.
Appears in 1 contract
Samples: signup.artlogic.net
Subprocessor Security. Prior to onboarding Subprocessors, the Data Importer conducts an audit of the security and privacy practices of Subprocessors to help ensure Subprocessors provide a level of security and privacy appropriate to their access to data and the scope of the services they are engaged to provide. Once the Data Importer has assessed the risks presented by the Subprocessor, the Subprocessor is required to enter into appropriate security, confidentiality and privacy contract terms.
Appears in 1 contract
Samples: www.workfront.com
Subprocessor Security. Prior to onboarding Subprocessors, the Data Importer conducts an audit of the security and privacy practices of Subprocessors to ensure Subprocessors provide a level of security and privacy appropriate to their access to data and the scope of the services they are engaged to provide. Once the Data Importer has assessed the risks presented by the Subprocessor, the Subprocessor is required to enter into appropriate security, confidentiality and privacy contract terms.
Appears in 1 contract
Subprocessor Security. Prior to onboarding Subprocessors, the Data Importer conducts an audit of the security and privacy practices of Subprocessors to help ensure Subprocessors provide a level of security and privacy appropriate to their access to data and the scope of the services they are engaged to provide. Once the Data Importer has assessed the risks presented by the Subprocessor, the Subprocessor is required to enter into appropriate security, confidentiality and privacy contract terms. Data Privacy Officer. The Data Privacy Officer of the Data Importer can be contacted at xxxxxxx@xxxxxxxxx.xxx.
Appears in 1 contract
Samples: www.workfront.com
Subprocessor Security. Prior to onboarding Subprocessors, the Data Importer conducts an audit of the security and privacy practices of Subprocessors to ensure Subprocessors provide a level of security and privacy appropriate to their access to data and the scope of the services they are engaged to provide. Once the Data Importer has assessed the risks presented by the Subprocessor, the Subprocessor is required to enter into appropriate security, confidentiality and privacy contract terms.
Appears in 1 contract
Samples: Data Processing Addendum