Technical and Operational Security Measures. In addition to the technical and operational security measures in the Security Terms, Supplier shall maintain additional operational and technological processes and procedures to protect Personal Information as required by Applicable Law (which may include, but is not limited to, the pseudonymization and encryption of Personal Information). At the request of Qualcomm, Supplier shall produce to Qualcomm evidence that Supplier has complied with and continues to comply with such security requirements and as may be required by any competent independent public authority, including, without limitation, a supervisory authority under Applicable Law. Supplier acknowledges that security requirements and risks are constantly changing, and that effective security requires frequent monitoring and constant improvement. Supplier is therefore obliged to continuously monitor and update its security measures to maintain compliance with the requirements hereunder.
Appears in 3 contracts
Samples: Data Processing Agreement, Data Processing Agreement, Data Processing Agreement
Technical and Operational Security Measures. In addition to the technical and operational security measures in the Security Terms, Supplier shall maintain additional operational and technological processes and procedures to protect the Personal Information as required by Applicable Law (which may include, but is not limited to, the pseudonymization and encryption of Personal Information). At the request of Qualcomm, Supplier shall produce to Qualcomm evidence that Supplier has complied with and continues to comply with such security requirements and as may be required by any competent independent public authority, including, without limitation, a supervisory authority under Applicable Lawthe General Data Protection Regulation (Regulation (EU) 2016/679) (as may be amended from time to time). Supplier acknowledges that security requirements and risks are constantly changing, and that effective security requires frequent monitoring and constant improvement. Supplier is therefore obliged to continuously monitor and update its security measures to maintain compliance with the requirements hereunder.
Appears in 1 contract
Samples: Data Processing Agreement