Common use of Technical and Operational Security Measures Clause in Contracts

Technical and Operational Security Measures. In addition to the technical and operational security measures in the Security Terms, Supplier shall maintain additional operational and technological processes and procedures to protect Personal Information as required by Applicable Law (which may include, but is not limited to, the pseudonymization and encryption of Personal Information). At the request of Qualcomm, Supplier shall produce to Qualcomm evidence that Supplier has complied with and continues to comply with such security requirements and as may be required by any competent independent public authority, including, without limitation, a supervisory authority under Applicable Law. Supplier acknowledges that security requirements and risks are constantly changing, and that effective security requires frequent monitoring and constant improvement. Supplier is therefore obliged to continuously monitor and update its security measures to maintain compliance with the requirements hereunder.

Appears in 3 contracts

Samples: Qualcomm Data Processing Terms, Qualcomm Data Processing Terms, Processing Terms

AutoNDA by SimpleDocs

Technical and Operational Security Measures. In addition to the technical and operational security measures in the Security Terms, Supplier shall maintain additional operational and technological processes and procedures to protect the Personal Information as required by Applicable Law (which may include, but is not limited to, the pseudonymization and encryption of Personal Information). At the request of Qualcomm, Supplier shall produce to Qualcomm evidence that Supplier has complied with and continues to comply with such security requirements and as may be required by any competent independent public authority, including, without limitation, a supervisory authority under Applicable Lawthe General Data Protection Regulation (Regulation (EU) 2016/679) (as may be amended from time to time). Supplier acknowledges that security requirements and risks are constantly changing, and that effective security requires frequent monitoring and constant improvement. Supplier is therefore obliged to continuously monitor and update its security measures to maintain compliance with the requirements hereunder.

Appears in 1 contract

Samples: Qualcomm Data Processing Terms

AutoNDA by SimpleDocs
Time is Money Join Law Insider Premium to draft better contracts faster.