Processor Personnel definition

Processor Personnel means all directors, officers, employees, agents, consultants and Agreementors of the Processor and/or of any Sub-Processor engaged in the performance of its obligations under this Agreement;
Processor Personnel means all directors, officers, employees, agents, consultants and contractors of the Processor and/or of any Sub-Processor engaged in the performance of its obligations under this Agreement;
Processor Personnel all directors, officers, employees, agents, consultants and suppliers of the Processor and/or of any Subprocessor engaged in the performance of its obligations under the Contract;

Examples of Processor Personnel in a sentence

  • If the background investigation reveals that the Data Processor Personnel are not suited to access Personal Data, then Data Processor shall not provide the Data Processor Personnel with access to Personal Data.

  • The Controllers rights under this Clause 12.2 include a right for the Controller, or its designated auditor, to access premises used by or on behalf of the Processor, and to access and interview any Processor Personnel.

  • Such Data Processor Personnel have committed themselves to confidentiality or are under an appropriate statutory obligation of confidentiality.

  • If an access to Confidential Information and Personal Data and the systems by the Data Processor Personnel is agreed upon, the Data Processor shall keep an up-to-date list of the Data Processor Personnel with an access to Confidential Information and the scope of rights each person has.

  • Processor Personnel: means all directors, officers, employees, agents, consultants and Recipients of the Processor and/or of any sub-Processor engaged in the performance of its obligations under these Conditions.


More Definitions of Processor Personnel

Processor Personnel means all directors, officers, employees, agents, consultants and Recipients of the Processor and/or of any Sub-Processor engaged in the performance of its obligations under these Conditions. Protective Measures: appropriate technical and organisational measures which may include: pseudonymising and encrypting Personal Data, ensuring confidentiality, integrity, availability and resilience of systems and services, ensuring that availability of and access to Personal Data can be restored in a timely manner after an incident, and regularly assessing and evaluating the effectiveness of the such measures adopted by it including the adoption of any measures and standards relating to the protection of Personal Data which the Authority communicates to the Grant Recipient from time to time. Sub-processor: any Third Party appointed to process Personal Data on behalf of that Processor related to these Conditions. ANNEX 8
Processor Personnel means all directors, officers, employees, agents, consultants and Recipients of the Processor and/or of any sub-Processor engaged in the performance of its obligations under these Conditions. Protective Measures: appropriate technical and organisational measures which may include: pseudonymising and encrypting Personal Data, ensuring confidentiality, integrity, availability and resilience of systems and services, ensuring that availability of and access to Personal Data can be restored in a timely manner after an incident, and regularly assessing and evaluating the effectiveness of the such measures adopted by it. Sub-processor: any Third Party appointed to process Personal Data on behalf of that Processor related to these Conditions. DATA PROTECTION
Processor Personnel means all directors, officers, employees, agents, consultants and Suppliers of the Processor and/or of any Sub-Processor engaged in the performance of its obligations under this Framework Agreement. Prohibited Act To directly or indirectly offer, promise or give any person working for or engaged by a Buyer or CCS a financial or other advantage to: ● induce that person to perform improperly a relevant function or activity ● reward that person for improper performance of a relevant function or activity ● commit any offence: o under the Bribery Act 2010 o under legislation creating offences concerning Fraud o at common Law concerning Fraud o committing or attempting or conspiring to commit Fraud Protective Appropriate technical and organisational measures which may include: Measures pseudonymisation of and encrypting Personal Data, ensuring confidentiality, integrity, availability and resilience of systems and services, ensuring that availability of and access to Personal Data can be restored in a timely manner after an incident, and regularly assessing and evaluating the effectiveness of the such measures adopted by it.
Processor Personnel. “ means all directors, officers, employees, agents, consultants and contractors of the Processor and/or of any Sub- processor engaged in the performance of its obligations under this Contract. “Protective Measuresappropriate technical and organisational measures which may include: pseudonymising and encrypting Personal Data, ensuring confidentiality, integrity, availability and resilience of systems and services, ensuring that availability of and access to Personal Data can be restored in a timely manner after an incident, and regularly assessing and evaluating the effectiveness of the such measures adopted by it including those outlined in the Terms and Conditions of the Contract.
Processor Personnel means all personnel of the Processor and/or of any Sub-Processor engaged in the performance of its obligations under the Contract.
Processor Personnel all directors, officers, employees, agents, consultants and contractors of the Suppliers and/or of any sub-contractor who are either partially or fully assigned to or engaged in the performance of the Processor’s obligations under this DPS Framework Agreement;
Processor Personnel all directors, officers, employees, agents, consultants and suppliers of the Processor and/or of any Subprocessor engaged in the performance of its obligations under the Contract; "Protective Measures" technical and organisational measures which must take account of: (a) the nature of the data to be protected (b) harm that might result from Data Loss Event; (c) state of technological development (d) the cost of implementing any measures including pseudonymising and encrypting Personal Data, ensuring confidentiality, integrity, availability and resilience of systems and services, ensuring that availability of and access to Personal Data can be restored in a timely manner after an incident, and regularly assessing and evaluating the effectiveness of the such measures adopted by it;