Technical and Organizational Security Measures Sample Clauses

Technical and Organizational Security Measures. Okta shall maintain administrative, physical and technical safeguards for protection of the security, confidentiality and integrity of Customer Data, including Personal Data, as set forth in the Trust & Compliance Documentation. Okta regularly monitors compliance with these safeguards. Okta will not materially decrease the overall security of the Service during a subscription term. DATA EXPORTER Name…….……………………………… Authorised Signature …………………… DATA IMPORTER Name: Xxx Xxxxxx Authorised Signature
AutoNDA by SimpleDocs
Technical and Organizational Security Measures. The Technical and Organizational Security Measures can be found at the following link: xxxxx://xxx.xxxxxxx.xxx/en-us/about/legal.html
Technical and Organizational Security Measures. 9.1 The Data Processor shall perform its obligations and actions under this DPA with all due skill, care and diligence.
Technical and Organizational Security Measures. Cloudflare has implemented and shall maintain an information security program in accordance with ISO/IEC 27000 standards. Cloudflare’s security program shall include: Measures of encryption of Personal Data Cloudflare implements encryption to adequately protect Personal Data using: ● state-of-the-art encryption protocols designed to provide effective protection against active and passive attacks with resources known to be available to public authorities; ● trustworthy public-key certification authorities and infrastructure; ● effective encryption algorithms and parameterization, such as a minimum of 128-bit key lengths for symmetric encryption, and at least 2048-bit RSA or 256-bit ECC key lengths for asymmetric algorithms. Measures for ensuring ongoing confidentiality, integrity, availability and resilience of processing systems and services Cloudflare enhances the security of processing systems and services in production environments by: ● employing a code review process to increase the security of the code used to provide the Services; and testing code and systems for vulnerabilities before and during use; ● maintaining an external bug bounty program; ● using checks to validate the integrity of encrypted data, and ● employing preventative and reactive intrusion detection. Cloudflare deploys high-availability systems across geographically-distributed data centers. Cloudflare implements input control measures to protect and maintain the confidentiality of Personal Data including: ● an authorization policy for the input, reading, alteration and deletion of data; ● authenticating authorized personnel using unique authentication credentials (passwords) and hard tokens; ● automatically signing-out user IDs after a period of inactivity; ● protecting the input of data, as well as the reading, alteration and deletion of stored data; and ● requiring that data processing facilities (the rooms housing the computer hardware and related equipment) are kept locked and secure. Measures for ensuring the ability to restore the availability and access to Personal Data in a timely manner in the event of a physical or technical incident Cloudflare implements measures to ensure that Personal Data is protected from accidental destruction or loss, including by maintaining: ● disaster-recovery and business continuity plans and procedures; ● geographically-distributed data centers; ● redundant infrastructure, including power supplies and internet connectivity; ● backups stored at...
Technical and Organizational Security Measures. The Processor has taken the following technical and organizational security measures:
Technical and Organizational Security Measures. Taking into account the state of the art, the costs of implementation and the nature, scope, context and purposes of Processing as well as the risk of varying likelihood and severity for the rights and freedoms of natural persons, Abnormal will in relation to the Personal Data implement appropriate technical and organizational measures to ensure a level of security of the Personal Data appropriate to the risk presented by Processing, as further described on Xxxxx XX to Exhibit 1 of this Addendum. In assessing the appropriate level of security, Abnormal will take into account in particular the risks that are presented by Processing, in particular from accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to Personal Data transmitted, stored or otherwise Processed.
Technical and Organizational Security Measures. The physical, organizational and technical safeguards which HTC has implemented for the HTC Offerings are set forth in HTC Corporate Information Security Policy.
AutoNDA by SimpleDocs
Technical and Organizational Security Measures. (A) Data Processing The Parties must assess and reduce the scope of data access and processing limited to what is strictly necessary for the performance of the Agreement.
Technical and Organizational Security Measures. 1. DocuWare shall maintain administrative, physical and technical safeguards for protection of the security, confidentiality and integrity of personal data as it determines in its reasonable discretion. Schedule 2Business Associate Agreement This Schedule 2 is included as part of the DocuWare Cloud Services Agreement (the “Cloud Services Agreement”) by and between DocuWare (as defined in the Cloud Services Agreement) and Customer (as defined in the Cloud Services Agreement). This Business Associate Agreement (this “Agreement”) is made as of the Effective Date of the Cloud Services Agreement, by and between DocuWare and Customer, each individually a “Party” and together the “Parties.”
Technical and Organizational Security Measures. 5.1 DDW has implemented appropriate technical and organizational measures to protect Your Personal Data against accidental or unlawful destruction or accidental loss, alteration, unauthorized disclosure or access, in particular where the processing involves the transmission of Your Personal Data over a network, and against all other unlawful forms of processing. Having regard to the state of the art and the cost of their implementation, such measures shall ensure a level of security appropriate to the risks represented by the processing and the nature of the data to be protected.
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!